Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe

Overview

General Information

Sample name:SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe
Analysis ID:1521531
MD5:b1382f20fc2ac8ee00bc5d35cfe2a883
SHA1:92dbed9a976191f17357082391fd69c38847875e
SHA256:abecc0256e95bbe633bd3139e6baf60b95db22b8271878f3f35ae3c412ff557d
Tags:AdwareInstallCoreexe
Infos:

Detection

Score:29
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Uses shutdown.exe to shutdown or reboot the system
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004531A4 FindFirstFileA,GetLastError,1_2_004531A4
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00476120 FindFirstFileA,FindNextFileA,FindClose,1_2_00476120
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004648D0 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004648D0
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00464D4C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464D4C
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00463344 FindFirstFileA,FindNextFileA,FindClose,1_2_00463344
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0049998C FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_0049998C
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp, 00000001.00000000.1444817104.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp.0.drString found in binary or memory: http://www.innosetup.com/
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe, 00000000.00000003.1444240891.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe, 00000000.00000003.1444389296.00000000020A8000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp, 00000001.00000000.1444817104.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe, 00000000.00000003.1444240891.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe, 00000000.00000003.1444389296.00000000020A8000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp, 00000001.00000000.1444817104.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp.0.drString found in binary or memory: http://www.remobjects.com/psU

System Summary

barindex
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpProcess created: C:\Windows\SysWOW64\shutdown.exe "shutdown.exe" -r -f -t 0
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0042F9C0 NtdllDefWindowProc_A,1_2_0042F9C0
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00423FD4 NtdllDefWindowProc_A,1_2_00423FD4
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00412A28 NtdllDefWindowProc_A,1_2_00412A28
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00479D08 NtdllDefWindowProc_A,1_2_00479D08
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00457D90 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_00457D90
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0042ED84: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042ED84
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: 0_2_004098E8 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_004098E8
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00455D80 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_00455D80
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: 0_2_004088880_2_00408888
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004680341_2_00468034
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004880301_2_00488030
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0046A0881_2_0046A088
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004521001_2_00452100
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0043E1F01_2_0043E1F0
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004307FC1_2_004307FC
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004449681_2_00444968
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00434A641_2_00434A64
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00444F101_2_00444F10
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00488F901_2_00488F90
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004313881_2_00431388
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004456081_2_00445608
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004716881_2_00471688
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0048F6BC1_2_0048F6BC
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004357681_2_00435768
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0045F8C01_2_0045F8C0
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0045B9701_2_0045B970
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00445A141_2_00445A14
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: String function: 00446274 appears 45 times
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: String function: 0040596C appears 114 times
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: String function: 00453AAC appears 97 times
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: String function: 0043497C appears 32 times
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: String function: 00458718 appears 79 times
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: String function: 00403400 appears 62 times
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: String function: 0040905C appears 45 times
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: String function: 00407D44 appears 43 times
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: String function: 00446544 appears 58 times
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: String function: 0045850C appears 100 times
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: String function: 00403494 appears 84 times
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: String function: 0040357C appears 33 times
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: String function: 00406F14 appears 45 times
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: String function: 00403684 appears 229 times
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe, 00000000.00000003.1444240891.00000000023B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe, 00000000.00000003.1444389296.00000000020A8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: sus29.rans.winEXE@6/2@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: 0_2_004098E8 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_004098E8
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00455D80 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_00455D80
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004565A8 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_004565A8
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00456DD4 CoCreateInstance,CoCreateInstance,SysFreeString,SysFreeString,1_2_00456DD4
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: 0_2_0040A0D4 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_0040A0D4
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5652:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeFile created: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmpJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeString found in binary or memory: need to be updated. /RESTARTAPPLICATIONS Instructs Setup to restart applications. /NORESTARTAPPLICATIONS Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file after having checked t
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeString found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe "C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeProcess created: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp "C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp" /SL5="$103E6,76800,76800,C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe"
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpProcess created: C:\Windows\SysWOW64\shutdown.exe "shutdown.exe" -r -f -t 0
Source: C:\Windows\SysWOW64\shutdown.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeProcess created: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp "C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp" /SL5="$103E6,76800,76800,C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpProcess created: C:\Windows\SysWOW64\shutdown.exe "shutdown.exe" -r -f -t 0Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\shutdown.exeSection loaded: shutdownext.dllJump to behavior
Source: C:\Windows\SysWOW64\shutdown.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00450994 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00450994
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: 0_2_00406A18 push 00406A55h; ret 0_2_00406A4D
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: 0_2_004093B4 push 004093E7h; ret 0_2_004093DF
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: 0_2_00408580 push ecx; mov dword ptr [esp], eax0_2_00408585
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00409D9C push 00409DD9h; ret 1_2_00409DD1
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0041A078 push ecx; mov dword ptr [esp], ecx1_2_0041A07D
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00452100 push ecx; mov dword ptr [esp], eax1_2_00452105
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0040A273 push ds; ret 1_2_0040A29D
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004062C4 push ecx; mov dword ptr [esp], eax1_2_004062C5
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0040A29F push ds; ret 1_2_0040A2A0
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00460518 push ecx; mov dword ptr [esp], ecx1_2_0046051C
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00496594 push ecx; mov dword ptr [esp], ecx1_2_00496599
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004587B4 push 004587ECh; ret 1_2_004587E4
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00410930 push ecx; mov dword ptr [esp], edx1_2_00410935
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00486A94 push ecx; mov dword ptr [esp], ecx1_2_00486A99
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00478D50 push ecx; mov dword ptr [esp], edx1_2_00478D51
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00412D78 push 00412DDBh; ret 1_2_00412DD3
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0040D288 push ecx; mov dword ptr [esp], edx1_2_0040D28A
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0040F7E8 push ecx; mov dword ptr [esp], edx1_2_0040F7EA
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004438E0 push ecx; mov dword ptr [esp], ecx1_2_004438E4
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00459ACC push 00459B10h; ret 1_2_00459B08
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0049BD44 pushad ; retf 1_2_0049BD53
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeFile created: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpFile created: C:\Users\user\AppData\Local\Temp\is-2KP2F.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0042405C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_0042405C
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0042405C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_0042405C
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0041811E IsIconic,SetWindowPos,1_2_0041811E
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00418120 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00418120
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004245E4 IsIconic,SetActiveWindow,1_2_004245E4
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0042462C IsIconic,SetActiveWindow,SetFocus,1_2_0042462C
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004187D4 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_004187D4
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00422CAC SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_00422CAC
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00484D28 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_00484D28
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0042F71C IsIconic,GetWindowLongA,GetWindowLongA,GetActiveWindow,MessageBoxA,SetActiveWindow,GetActiveWindow,MessageBoxA,SetActiveWindow,1_2_0042F71C
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004179E8 IsIconic,GetCapture,1_2_004179E8
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0041F568 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F568
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-2KP2F.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-6079
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-52222
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004531A4 FindFirstFileA,GetLastError,1_2_004531A4
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00476120 FindFirstFileA,FindNextFileA,FindClose,1_2_00476120
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_004648D0 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004648D0
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00464D4C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464D4C
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00463344 FindFirstFileA,FindNextFileA,FindClose,1_2_00463344
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0049998C FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_0049998C
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: 0_2_0040A018 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_0040A018
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00450994 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00450994
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0047974C ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_0047974C
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0042F254 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateMutexA,1_2_0042F254
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_0042E4EC AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E4EC
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: GetLocaleInfoA,0_2_0040565C
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: GetLocaleInfoA,0_2_004056A8
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: GetLocaleInfoA,1_2_004089B8
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: GetLocaleInfoA,1_2_00408A04
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00458DC4 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_00458DC4
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
Source: C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmpCode function: 1_2_00455D38 GetUserNameA,1_2_00455D38
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exeCode function: 0_2_00404654 GetModuleHandleA,GetVersion,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetProcessDEPPolicy,0_2_00404654
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium11
System Shutdown/Reboot
CredentialsDomainsDefault Accounts3
Native API
Boot or Logon Initialization Scripts1
Access Token Manipulation
1
Access Token Manipulation
LSASS Memory1
Application Window Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Process Injection
2
Process Injection
Security Account Manager1
Account Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
NTDS3
System Owner/User Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials15
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe5%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\is-2KP2F.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp10%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.innosetup.com/0%URL Reputationsafe
http://www.remobjects.com/ps0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.innosetup.com/SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp, 00000001.00000000.1444817104.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp.0.drfalse
  • URL Reputation: safe
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exefalse
    unknown
    http://www.remobjects.com/psUSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe, 00000000.00000003.1444240891.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe, 00000000.00000003.1444389296.00000000020A8000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp, 00000001.00000000.1444817104.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp.0.drfalse
      unknown
      http://www.remobjects.com/psSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe, 00000000.00000003.1444240891.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe, 00000000.00000003.1444389296.00000000020A8000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp, 00000001.00000000.1444817104.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp.0.drfalse
      • URL Reputation: safe
      unknown
      http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exefalse
        unknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1521531
        Start date and time:2024-09-28 22:24:18 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 3m 21s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:5
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe
        Detection:SUS
        Classification:sus29.rans.winEXE@6/2@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 89%
        • Number of executed functions: 103
        • Number of non-executed functions: 183
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Stop behavior analysis, all processes terminated
        • Exclude process from analysis (whitelisted): dllhost.exe
        • Not all processes where analyzed, report is missing behavior information
        • VT rate limit hit for: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe
        No simulations
        No context
        No context
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\is-2KP2F.tmp\_isetup\_setup64.tmpfile.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, Neoreklami, Socks5SystemzBrowse
          SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeGet hashmaliciousSocks5SystemzBrowse
            SecuriteInfo.com.Gen.Heur.Munp.1.11072.7602.exeGet hashmaliciousSocks5SystemzBrowse
              SecuriteInfo.com.Gen.Heur.Munp.1.20199.21407.exeGet hashmaliciousSocks5SystemzBrowse
                SecuriteInfo.com.Gen.Heur.Munp.1.15479.6612.exeGet hashmaliciousSocks5SystemzBrowse
                  file.exeGet hashmaliciousClipboard Hijacker, Cryptbot, Neoreklami, Socks5SystemzBrowse
                    file.exeGet hashmaliciousSocks5SystemzBrowse
                      boSodF2WmT.exeGet hashmaliciousSocks5SystemzBrowse
                        file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, Socks5SystemzBrowse
                          file.exeGet hashmaliciousSocks5SystemzBrowse
                            Process:C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp
                            File Type:PE32+ executable (console) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):6144
                            Entropy (8bit):4.720366600008286
                            Encrypted:false
                            SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                            MD5:E4211D6D009757C078A9FAC7FF4F03D4
                            SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                            SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                            SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Joe Sandbox View:
                            • Filename: file.exe, Detection: malicious, Browse
                            • Filename: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe, Detection: malicious, Browse
                            • Filename: SecuriteInfo.com.Gen.Heur.Munp.1.11072.7602.exe, Detection: malicious, Browse
                            • Filename: SecuriteInfo.com.Gen.Heur.Munp.1.20199.21407.exe, Detection: malicious, Browse
                            • Filename: SecuriteInfo.com.Gen.Heur.Munp.1.15479.6612.exe, Detection: malicious, Browse
                            • Filename: file.exe, Detection: malicious, Browse
                            • Filename: file.exe, Detection: malicious, Browse
                            • Filename: boSodF2WmT.exe, Detection: malicious, Browse
                            • Filename: file.exe, Detection: malicious, Browse
                            • Filename: file.exe, Detection: malicious, Browse
                            Reputation:high, very likely benign file
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):733184
                            Entropy (8bit):6.527940424581213
                            Encrypted:false
                            SSDEEP:12288:ZsMLIMoi3rPR37dzHRA6nX0D9OKWbO7SERb5rNUK1bce05aDCUFJyx9Z6:6McMoi3rPR37dzHRA6G7WbuSEmK50qy0
                            MD5:5F7561BFCBA09FC14E1B7F03E65C99E0
                            SHA1:A94D724FF5F2EB5EE5DA58ABF81C9088D19B5A2A
                            SHA-256:2D6377C5105EBC6EE27ED61F3FB342D2F6FB6394CCEC0E81A82D019D74586D30
                            SHA-512:F4E88D4ED8702A940D336AA172C157816CDA5EFFB448AFBC2BF58E7DEA096EB2BEDE957AD4278E4697B31572D14BFEFCC2DCA5DCEBC9170BBCA7FE39AE5E2FA9
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 10%
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..........................0............@......@...............................&......(V...................@...............................0......................................................CODE............................... ..`DATA.... ...........................@...BSS......................................idata...&.......(..................@....tls......... ...........................rdata.......0......................@..P.reloc..P....@......................@..P.rsrc...(V.......X..................@..P.....................r..............@..P........................................................................................................................................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):7.820907275699891
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 98.86%
                            • Inno Setup installer (109748/4) 1.08%
                            • Win16/32 Executable Delphi generic (2074/23) 0.02%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            File name:SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe
                            File size:333'639 bytes
                            MD5:b1382f20fc2ac8ee00bc5d35cfe2a883
                            SHA1:92dbed9a976191f17357082391fd69c38847875e
                            SHA256:abecc0256e95bbe633bd3139e6baf60b95db22b8271878f3f35ae3c412ff557d
                            SHA512:e34b752a0c6c9918b822640f5564449a5e82c31fe3d0cf57aaf3baae5b57bbf805f0194761c40f9444ba87d0b43828669b564c342e8cf9f834c3eed72fcd382d
                            SSDEEP:6144:oP7OolMPaDCUFSjKDQBH3AgeedRuUCFJ2H/uRGtfotLxVDZF8b8a0gX5jT/R26WM:g7blMPaDCUFSO0d37N3uUCeYGtf0jZOX
                            TLSH:23641203D7CA81B8D07286742D3657248737BE223EB4542A7B9D3E9ECF77081991D78A
                            File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                            Icon Hash:29226ee6b692c62f
                            Entrypoint:0x40aa98
                            Entrypoint Section:CODE
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                            Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:1
                            OS Version Minor:0
                            File Version Major:1
                            File Version Minor:0
                            Subsystem Version Major:1
                            Subsystem Version Minor:0
                            Import Hash:2fb819a19fe4dee5c03e8c6a79342f79
                            Instruction
                            push ebp
                            mov ebp, esp
                            add esp, FFFFFFC4h
                            push ebx
                            push esi
                            push edi
                            xor eax, eax
                            mov dword ptr [ebp-10h], eax
                            mov dword ptr [ebp-24h], eax
                            call 00007F539C8CF9C3h
                            call 00007F539C8D0BCAh
                            call 00007F539C8D0F31h
                            call 00007F539C8D134Ch
                            call 00007F539C8D32EBh
                            call 00007F539C8D5C82h
                            call 00007F539C8D5DE9h
                            xor eax, eax
                            push ebp
                            push 0040B169h
                            push dword ptr fs:[eax]
                            mov dword ptr fs:[eax], esp
                            xor edx, edx
                            push ebp
                            push 0040B132h
                            push dword ptr fs:[edx]
                            mov dword ptr fs:[edx], esp
                            mov eax, dword ptr [0040D014h]
                            call 00007F539C8D68BBh
                            call 00007F539C8D64A6h
                            cmp byte ptr [0040C234h], 00000000h
                            je 00007F539C8D739Eh
                            call 00007F539C8D69B8h
                            xor eax, eax
                            call 00007F539C8D06B9h
                            lea edx, dword ptr [ebp-10h]
                            xor eax, eax
                            call 00007F539C8D38FBh
                            mov edx, dword ptr [ebp-10h]
                            mov eax, 0040DE30h
                            call 00007F539C8CFA5Ah
                            push 00000002h
                            push 00000000h
                            push 00000001h
                            mov ecx, dword ptr [0040DE30h]
                            mov dl, 01h
                            mov eax, 00407808h
                            call 00007F539C8D41B6h
                            mov dword ptr [0040DE34h], eax
                            xor edx, edx
                            push ebp
                            push 0040B0EAh
                            push dword ptr fs:[edx]
                            mov dword ptr fs:[edx], esp
                            call 00007F539C8D6916h
                            mov dword ptr [0040DE3Ch], eax
                            mov eax, dword ptr [0040DE3Ch]
                            cmp dword ptr [eax+0Ch], 00000000h
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xe0000x97c.idata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x75f4.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x0.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x100000x18.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            CODE0x10000xa1d00xa200b7ea439d9c6d5ec722056c9243fb3054False0.6025028935185185data6.643749028594943IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            DATA0xc0000x2500x4009b2268ed5360951559d8041925d025fbFalse0.3037109375data2.740124513017086IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            BSS0xd0000xe940x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .idata0xe0000x97c0xa00df5f31e62e05c787fd29eed7071bf556False0.41796875data4.486076246232586IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .tls0xf0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rdata0x100000x180x20014dfa4128117e7f94fe2f8d7dea374a0False0.05078125data0.190488766434666IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                            .reloc0x110000x91c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                            .rsrc0x120000x75f40x7600748bb4ec7fe23e0a492c0aafb8763af9False0.5161877648305084data5.864643451923147IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x124140x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.4543010752688172
                            RT_ICON0x126fc0x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.5472972972972973
                            RT_ICON0x128240xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.6090085287846482
                            RT_ICON0x136cc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.8172382671480144
                            RT_ICON0x13f740x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.7023121387283237
                            RT_ICON0x144dc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.41369294605809126
                            RT_ICON0x16a840x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.6672138836772983
                            RT_ICON0x17b2c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.8164893617021277
                            RT_STRING0x17f940x2f2data0.35543766578249336
                            RT_STRING0x182880x30cdata0.3871794871794872
                            RT_STRING0x185940x2cedata0.42618384401114207
                            RT_STRING0x188640x68data0.75
                            RT_STRING0x188cc0xb4data0.6277777777777778
                            RT_STRING0x189800xaedata0.5344827586206896
                            RT_RCDATA0x18a300x2cdata1.0909090909090908
                            RT_GROUP_ICON0x18a5c0x76dataEnglishUnited States0.6440677966101694
                            RT_VERSION0x18ad40x4f4dataEnglishUnited States0.26419558359621453
                            RT_MANIFEST0x18fc80x62cXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4240506329113924
                            DLLImport
                            kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                            user32.dllMessageBoxA
                            oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                            advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                            kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetVersion, GetUserDefaultLangID, GetSystemInfo, GetSystemDirectoryA, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                            user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                            comctl32.dllInitCommonControls
                            advapi32.dllAdjustTokenPrivileges
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            No network behavior found

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:16:25:24
                            Start date:28/09/2024
                            Path:C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe"
                            Imagebase:0x400000
                            File size:333'639 bytes
                            MD5 hash:B1382F20FC2AC8EE00BC5D35CFE2A883
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:16:25:24
                            Start date:28/09/2024
                            Path:C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Local\Temp\is-O2DFQ.tmp\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.tmp" /SL5="$103E6,76800,76800,C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Convagent.gen.29670.14571.exe"
                            Imagebase:0x400000
                            File size:733'184 bytes
                            MD5 hash:5F7561BFCBA09FC14E1B7F03E65C99E0
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Antivirus matches:
                            • Detection: 10%, ReversingLabs
                            Reputation:low
                            Has exited:true

                            Target ID:3
                            Start time:16:25:26
                            Start date:28/09/2024
                            Path:C:\Windows\SysWOW64\shutdown.exe
                            Wow64 process (32bit):true
                            Commandline:"shutdown.exe" -r -f -t 0
                            Imagebase:0x940000
                            File size:23'552 bytes
                            MD5 hash:FCDE5AF99B82AE6137FB90C7571D40C3
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:4
                            Start time:16:25:26
                            Start date:28/09/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff70f010000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:23.6%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:7.9%
                              Total number of Nodes:1541
                              Total number of Limit Nodes:23
                              execution_graph 4987 407a40 SetFilePointer 4988 407a73 4987->4988 4989 407a63 GetLastError 4987->4989 4989->4988 4990 407a6c 4989->4990 4992 407908 GetLastError 4990->4992 4995 407868 4992->4995 5004 407700 FormatMessageA 4995->5004 4998 4078b0 5011 405ce0 4998->5011 5001 4078bf 5015 403198 5001->5015 5005 407726 5004->5005 5019 403278 5005->5019 5008 4055e4 5111 4055f8 5008->5111 5012 405ce7 5011->5012 5013 4031e8 18 API calls 5012->5013 5014 405cff 5013->5014 5014->5001 5016 4031b7 5015->5016 5017 40319e 5015->5017 5016->4988 5017->5016 5239 4025ac 5017->5239 5024 403254 5019->5024 5021 403198 4 API calls 5023 4032a0 5021->5023 5022 403288 5022->5021 5023->4998 5023->5008 5025 403274 5024->5025 5026 403258 5024->5026 5025->5022 5029 402594 5026->5029 5028 403261 5028->5022 5030 402598 5029->5030 5032 4025a2 5029->5032 5035 401fd4 5030->5035 5031 40259e 5031->5032 5046 403154 5031->5046 5032->5028 5032->5032 5036 401fe8 5035->5036 5037 401fed 5035->5037 5054 401918 RtlInitializeCriticalSection 5036->5054 5039 402012 RtlEnterCriticalSection 5037->5039 5040 401ff1 5037->5040 5041 40201c 5037->5041 5039->5041 5040->5031 5041->5040 5061 401ee0 5041->5061 5044 402147 5044->5031 5045 40213d RtlLeaveCriticalSection 5045->5044 5047 403164 5046->5047 5048 40318c TlsGetValue 5046->5048 5047->5032 5049 403196 5048->5049 5050 40316f 5048->5050 5049->5032 5106 40310c 5050->5106 5052 403174 TlsGetValue 5053 403184 5052->5053 5053->5032 5055 40193c RtlEnterCriticalSection 5054->5055 5056 401946 5054->5056 5055->5056 5057 401964 LocalAlloc 5056->5057 5058 40197e 5057->5058 5059 4019c3 RtlLeaveCriticalSection 5058->5059 5060 4019cd 5058->5060 5059->5060 5060->5037 5062 401ef0 5061->5062 5063 401f1c 5062->5063 5066 401f40 5062->5066 5067 401e58 5062->5067 5063->5066 5072 401d00 5063->5072 5066->5044 5066->5045 5076 4016d8 5067->5076 5070 401e75 5070->5062 5073 401d4e 5072->5073 5074 401d1e 5072->5074 5073->5074 5093 401c68 5073->5093 5074->5066 5082 4016f4 5076->5082 5077 4016fe 5079 4015c4 VirtualAlloc 5077->5079 5078 401430 LocalAlloc VirtualAlloc VirtualFree 5078->5082 5084 40170a 5079->5084 5080 40175b 5080->5070 5086 401dcc 5080->5086 5081 40132c LocalAlloc 5081->5082 5082->5077 5082->5078 5082->5080 5082->5081 5083 40174f 5082->5083 5085 40150c VirtualFree 5083->5085 5084->5080 5085->5080 5087 401d80 9 API calls 5086->5087 5088 401de0 5087->5088 5089 40132c LocalAlloc 5088->5089 5091 401df0 5089->5091 5090 401df8 5090->5070 5091->5090 5092 401b44 9 API calls 5091->5092 5092->5090 5094 401c7a 5093->5094 5095 401c9d 5094->5095 5096 401caf 5094->5096 5097 40188c LocalAlloc VirtualFree VirtualFree 5095->5097 5098 40188c LocalAlloc VirtualFree VirtualFree 5096->5098 5099 401cad 5097->5099 5098->5099 5100 401cc5 5099->5100 5101 401b44 9 API calls 5099->5101 5100->5074 5102 401cd4 5101->5102 5103 401cee 5102->5103 5104 401b98 9 API calls 5102->5104 5105 4013a0 LocalAlloc 5103->5105 5104->5103 5105->5100 5107 403120 LocalAlloc 5106->5107 5108 403116 5106->5108 5109 40313e TlsSetValue 5107->5109 5110 403132 5107->5110 5108->5107 5109->5110 5110->5052 5112 405615 5111->5112 5119 4052a8 5112->5119 5115 405641 5117 403278 18 API calls 5115->5117 5118 4055f3 5117->5118 5118->4998 5121 4052c3 5119->5121 5120 4052d5 5120->5115 5124 405034 5120->5124 5121->5120 5127 4053ca 5121->5127 5134 40529c 5121->5134 5231 405d90 5124->5231 5126 405045 5126->5115 5128 4053db 5127->5128 5131 405429 5127->5131 5130 4054af 5128->5130 5128->5131 5133 405447 5130->5133 5141 405288 5130->5141 5131->5133 5137 405244 5131->5137 5133->5121 5135 403198 4 API calls 5134->5135 5136 4052a6 5135->5136 5136->5121 5138 405252 5137->5138 5144 40504c 5138->5144 5140 405280 5140->5131 5170 4039a4 5141->5170 5147 405e00 5144->5147 5146 405065 5146->5140 5148 405e0e 5147->5148 5157 40512c LoadStringA 5148->5157 5151 4055e4 33 API calls 5152 405e46 5151->5152 5160 4031e8 5152->5160 5158 403278 18 API calls 5157->5158 5159 405159 5158->5159 5159->5151 5161 4031ec 5160->5161 5162 4031fc 5160->5162 5161->5162 5164 403254 18 API calls 5161->5164 5163 403228 5162->5163 5165 4025ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5162->5165 5166 4031b8 5163->5166 5164->5162 5165->5163 5168 4031be 5166->5168 5167 4031e3 5167->5146 5168->5167 5169 4025ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5168->5169 5169->5168 5171 4039ab 5170->5171 5176 4038b4 5171->5176 5173 4039cb 5174 403198 4 API calls 5173->5174 5175 4039d2 5174->5175 5175->5133 5177 4038d5 5176->5177 5178 4038c8 5176->5178 5180 403934 5177->5180 5181 4038db 5177->5181 5204 403780 5178->5204 5182 403993 5180->5182 5183 40393b 5180->5183 5184 4038e1 5181->5184 5185 4038ee 5181->5185 5186 4037f4 3 API calls 5182->5186 5187 403941 5183->5187 5188 40394b 5183->5188 5211 403894 5184->5211 5191 403894 6 API calls 5185->5191 5189 4038d0 5186->5189 5226 403864 5187->5226 5193 4037f4 3 API calls 5188->5193 5189->5173 5194 4038fc 5191->5194 5195 40395d 5193->5195 5216 4037f4 5194->5216 5197 403864 23 API calls 5195->5197 5199 403976 5197->5199 5198 403917 5222 40374c 5198->5222 5202 40374c VariantClear 5199->5202 5201 40392c 5201->5173 5203 40398b 5202->5203 5203->5173 5205 4037f0 5204->5205 5208 403744 5204->5208 5205->5189 5206 4037ab 5206->5189 5207 403793 VariantClear 5207->5208 5208->5204 5208->5206 5208->5207 5209 4037dc VariantCopyInd 5208->5209 5210 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5208->5210 5209->5205 5209->5208 5210->5208 5212 4036b8 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5211->5212 5213 4038a0 5212->5213 5214 40374c VariantClear 5213->5214 5215 4038a9 5214->5215 5215->5189 5217 403845 VariantChangeTypeEx 5216->5217 5218 40380a VariantChangeTypeEx 5216->5218 5219 403832 5217->5219 5220 403826 5218->5220 5219->5198 5221 40374c VariantClear 5220->5221 5221->5219 5223 403759 5222->5223 5224 403766 5222->5224 5223->5224 5225 403779 VariantClear 5223->5225 5224->5201 5225->5201 5227 40369c 22 API calls 5226->5227 5228 40387b 5227->5228 5229 40374c VariantClear 5228->5229 5230 403882 5229->5230 5230->5189 5232 405d9c 5231->5232 5233 40512c 19 API calls 5232->5233 5234 405dc2 5233->5234 5235 4031e8 18 API calls 5234->5235 5236 405dcd 5235->5236 5237 403198 4 API calls 5236->5237 5238 405de2 5237->5238 5238->5126 5240 4025b0 5239->5240 5241 4025ba 5239->5241 5240->5241 5242 403154 4 API calls 5240->5242 5241->5016 5241->5241 5242->5241 6687 40af42 6688 40af72 6687->6688 6689 40af7c CreateWindowExA SetWindowLongA 6688->6689 6690 4055e4 33 API calls 6689->6690 6691 40afff 6690->6691 6692 4032fc 18 API calls 6691->6692 6693 40b00d 6692->6693 6694 4032fc 18 API calls 6693->6694 6695 40b01a 6694->6695 6696 406fcc 19 API calls 6695->6696 6697 40b026 6696->6697 6698 4032fc 18 API calls 6697->6698 6699 40b02f 6698->6699 6700 409e8c 43 API calls 6699->6700 6701 40b041 6700->6701 6702 409d6c 19 API calls 6701->6702 6703 40b054 6701->6703 6702->6703 6704 40b08d 6703->6704 6705 409978 9 API calls 6703->6705 6706 40b0a6 6704->6706 6709 40b0a0 RemoveDirectoryA 6704->6709 6705->6704 6707 40b0ba 6706->6707 6708 40b0af DestroyWindow 6706->6708 6710 40b0e2 6707->6710 6711 40357c 4 API calls 6707->6711 6708->6707 6709->6706 6712 40b0d8 6711->6712 6713 4025ac 4 API calls 6712->6713 6713->6710 5362 407b44 WriteFile 5363 407b64 5362->5363 5364 407b6b 5362->5364 5365 407908 35 API calls 5363->5365 5366 407b7c 5364->5366 5367 407868 34 API calls 5364->5367 5365->5364 5367->5366 6714 402b48 RaiseException 6715 40294a 6716 402952 6715->6716 6717 402967 6716->6717 6718 403554 4 API calls 6716->6718 6718->6716 6719 403f4a 6720 403f53 6719->6720 6721 403f5c 6719->6721 6722 403f07 4 API calls 6720->6722 6722->6721 5243 408450 5244 408462 5243->5244 5246 408469 5243->5246 5254 40838c 5244->5254 5247 408491 5246->5247 5248 408493 5246->5248 5252 40849d 5246->5252 5268 4082a8 5247->5268 5265 4081f8 5248->5265 5249 4084ca 5251 4081f8 33 API calls 5251->5249 5252->5249 5252->5251 5255 4083a1 5254->5255 5256 4081f8 33 API calls 5255->5256 5257 4083b0 5255->5257 5256->5257 5258 4083ea 5257->5258 5259 4081f8 33 API calls 5257->5259 5260 4083fe 5258->5260 5261 4081f8 33 API calls 5258->5261 5259->5258 5264 40842a 5260->5264 5275 408334 5260->5275 5261->5260 5264->5246 5278 405d14 5265->5278 5267 40821a 5267->5252 5269 4055e4 33 API calls 5268->5269 5270 4082d3 5269->5270 5286 408260 5270->5286 5272 4082db 5273 403198 4 API calls 5272->5273 5274 4082f0 5273->5274 5274->5252 5276 408343 VirtualFree 5275->5276 5277 408355 VirtualAlloc 5275->5277 5276->5277 5277->5264 5279 405d20 5278->5279 5280 4055e4 33 API calls 5279->5280 5281 405d4d 5280->5281 5282 4031e8 18 API calls 5281->5282 5283 405d58 5282->5283 5284 403198 4 API calls 5283->5284 5285 405d6d 5284->5285 5285->5267 5287 405d14 33 API calls 5286->5287 5288 408282 5287->5288 5288->5272 6326 403a52 6327 403a74 6326->6327 6328 403a5a WriteFile 6326->6328 6328->6327 6329 403a78 GetLastError 6328->6329 6329->6327 6330 402654 6331 403154 4 API calls 6330->6331 6332 402614 6331->6332 6333 402632 6332->6333 6334 403154 4 API calls 6332->6334 6333->6333 6334->6333 5371 40af57 5401 409ae8 GetLastError 5371->5401 5374 40af72 5376 40af7c CreateWindowExA SetWindowLongA 5374->5376 5377 4055e4 33 API calls 5376->5377 5378 40afff 5377->5378 5414 4032fc 5378->5414 5380 40b00d 5381 4032fc 18 API calls 5380->5381 5382 40b01a 5381->5382 5428 406fcc GetCommandLineA 5382->5428 5385 4032fc 18 API calls 5386 40b02f 5385->5386 5435 409e8c 5386->5435 5390 40b054 5391 40b08d 5390->5391 5451 409978 5390->5451 5393 40b0a6 5391->5393 5396 40b0a0 RemoveDirectoryA 5391->5396 5394 40b0ba 5393->5394 5395 40b0af DestroyWindow 5393->5395 5397 40b0e2 5394->5397 5470 40357c 5394->5470 5395->5394 5396->5393 5399 40b0d8 5400 4025ac 4 API calls 5399->5400 5400->5397 5480 4050e4 5401->5480 5404 407700 19 API calls 5405 409b3f 5404->5405 5483 409224 5405->5483 5408 405ce0 18 API calls 5409 409b63 5408->5409 5410 4031b8 4 API calls 5409->5410 5411 409b82 5410->5411 5412 403198 4 API calls 5411->5412 5413 409b8a 5412->5413 5413->5374 5459 402f24 5413->5459 5415 403300 5414->5415 5416 40333f 5414->5416 5417 4031e8 5415->5417 5418 40330a 5415->5418 5416->5380 5424 403254 18 API calls 5417->5424 5425 4031fc 5417->5425 5419 403334 5418->5419 5420 40331d 5418->5420 5421 4034f0 18 API calls 5419->5421 5505 4034f0 5420->5505 5427 403322 5421->5427 5422 403228 5422->5380 5424->5425 5425->5422 5426 4025ac 4 API calls 5425->5426 5426->5422 5427->5380 5518 406f40 5428->5518 5431 4032c4 18 API calls 5432 406ffa 5431->5432 5433 403198 4 API calls 5432->5433 5434 40700f 5433->5434 5434->5385 5532 4033b4 5435->5532 5437 409ec7 5438 409ef9 CreateProcessA 5437->5438 5439 409f05 5438->5439 5440 409f0c CloseHandle 5438->5440 5441 409ae8 35 API calls 5439->5441 5442 409f15 5440->5442 5441->5440 5443 409e60 TranslateMessage DispatchMessageA PeekMessageA 5442->5443 5444 409f1a MsgWaitForMultipleObjects 5443->5444 5444->5442 5445 409f31 5444->5445 5446 409e60 TranslateMessage DispatchMessageA PeekMessageA 5445->5446 5447 409f36 GetExitCodeProcess CloseHandle 5446->5447 5448 409f56 5447->5448 5449 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5448->5449 5450 409f5e 5449->5450 5450->5390 5464 409d6c 5450->5464 5452 4099d2 5451->5452 5454 40998b 5451->5454 5452->5391 5453 409993 Sleep 5453->5454 5454->5452 5454->5453 5455 4099a3 Sleep 5454->5455 5457 4099ba GetLastError 5454->5457 5538 409438 5454->5538 5455->5454 5457->5452 5458 4099c4 GetLastError 5457->5458 5458->5452 5458->5454 5460 403154 4 API calls 5459->5460 5461 402f29 5460->5461 5555 402bcc 5461->5555 5463 402f51 5463->5463 5465 409d74 5464->5465 5469 409dae 5464->5469 5466 403420 18 API calls 5465->5466 5465->5469 5467 409da8 5466->5467 5558 4092fc 5467->5558 5469->5390 5471 403591 5470->5471 5472 4035aa 5470->5472 5471->5472 5475 4035d0 5471->5475 5479 4035b6 5471->5479 5473 4035b1 5472->5473 5474 4035b8 5472->5474 5476 403198 4 API calls 5473->5476 5477 4031b8 4 API calls 5474->5477 5478 40357c 4 API calls 5475->5478 5476->5479 5477->5479 5478->5479 5479->5399 5481 4055f8 33 API calls 5480->5481 5482 405102 5481->5482 5482->5404 5484 409244 5483->5484 5487 4090fc 5484->5487 5488 403198 4 API calls 5487->5488 5498 40912d 5488->5498 5489 409158 5490 4031b8 4 API calls 5489->5490 5491 4091e5 5490->5491 5491->5408 5492 409144 5499 4032c4 5492->5499 5494 403278 18 API calls 5494->5498 5496 4032fc 18 API calls 5496->5489 5497 4032fc 18 API calls 5497->5498 5498->5489 5498->5492 5498->5494 5498->5497 5502 403278 5499->5502 5500 403254 18 API calls 5501 403288 5500->5501 5503 403198 4 API calls 5501->5503 5502->5500 5504 4032a0 5503->5504 5504->5496 5506 4034fd 5505->5506 5513 40352d 5505->5513 5508 403526 5506->5508 5510 403509 5506->5510 5507 403198 4 API calls 5509 403517 5507->5509 5511 403254 18 API calls 5508->5511 5509->5427 5514 4025c4 5510->5514 5511->5513 5513->5507 5516 4025ca 5514->5516 5515 4025dc 5515->5509 5516->5515 5517 403154 4 API calls 5516->5517 5517->5515 5519 406f6c 5518->5519 5520 403278 18 API calls 5519->5520 5521 406f79 5520->5521 5528 403420 5521->5528 5523 406f81 5524 4031e8 18 API calls 5523->5524 5525 406f99 5524->5525 5526 403198 4 API calls 5525->5526 5527 406fbb 5526->5527 5527->5431 5529 403426 5528->5529 5531 403437 5528->5531 5530 403254 18 API calls 5529->5530 5529->5531 5530->5531 5531->5523 5533 4033bc 5532->5533 5534 403254 18 API calls 5533->5534 5535 4033cf 5534->5535 5536 4031e8 18 API calls 5535->5536 5537 4033f7 5536->5537 5546 4093ec 5538->5546 5540 40944e 5541 409452 5540->5541 5542 40946e DeleteFileA GetLastError 5540->5542 5541->5454 5543 40948c 5542->5543 5552 409428 5543->5552 5547 4093f6 5546->5547 5548 4093fa 5546->5548 5547->5540 5549 409403 Wow64DisableWow64FsRedirection 5548->5549 5550 40941c SetLastError 5548->5550 5551 409417 5549->5551 5550->5551 5551->5540 5553 409437 5552->5553 5554 40942d Wow64RevertWow64FsRedirection 5552->5554 5553->5454 5554->5553 5556 402bd5 RaiseException 5555->5556 5557 402be6 5555->5557 5556->5557 5557->5463 5559 40930a 5558->5559 5561 409322 5559->5561 5571 409294 5559->5571 5562 409294 18 API calls 5561->5562 5563 409346 5561->5563 5562->5563 5574 407d94 5563->5574 5566 409294 18 API calls 5568 409374 5566->5568 5567 409294 18 API calls 5567->5568 5568->5567 5569 403278 18 API calls 5568->5569 5570 4093a3 5568->5570 5569->5568 5570->5469 5572 405ce0 18 API calls 5571->5572 5573 4092a5 5572->5573 5573->5561 5577 407d40 5574->5577 5576 407da6 5576->5566 5576->5568 5578 407d52 5577->5578 5579 407d63 5577->5579 5580 407d57 InterlockedExchange 5578->5580 5579->5576 5579->5579 5580->5579 6339 402e64 6340 402e69 6339->6340 6341 402e7a RtlUnwind 6340->6341 6342 402e5e 6340->6342 6343 402e9d 6341->6343 6352 407a76 GetFileSize 6353 407aa2 6352->6353 6354 407a92 GetLastError 6352->6354 6354->6353 6355 407a9b 6354->6355 6356 407908 35 API calls 6355->6356 6356->6353 6745 403f7d 6746 403fa2 6745->6746 6749 403f84 6745->6749 6748 403e8e 4 API calls 6746->6748 6746->6749 6747 403f8c 6748->6749 6749->6747 6750 402674 4 API calls 6749->6750 6751 403fca 6750->6751 6023 40ae7e 6024 40aea3 6023->6024 6025 407d94 InterlockedExchange 6024->6025 6026 40aecd 6025->6026 6027 40aedd 6026->6027 6028 409f88 18 API calls 6026->6028 6033 407b28 SetEndOfFile 6027->6033 6028->6027 6030 40aef9 6031 4025ac 4 API calls 6030->6031 6032 40af30 6031->6032 6034 407b38 6033->6034 6035 407b3f 6033->6035 6036 407908 35 API calls 6034->6036 6035->6030 6036->6035 6367 409e00 6368 409e22 6367->6368 6370 409e0f 6367->6370 6369 409e3e CallWindowProcA 6369->6368 6370->6368 6370->6369 5289 403d02 5291 403d12 5289->5291 5290 403ddf ExitProcess 5291->5290 5292 403db8 5291->5292 5294 403dea 5291->5294 5299 403da4 5291->5299 5300 403d8f MessageBoxA 5291->5300 5305 403cc8 5292->5305 5296 403cc8 4 API calls 5297 403dcc 5296->5297 5309 4019dc 5297->5309 5321 403fe4 5299->5321 5300->5292 5301 403dd1 5301->5290 5301->5294 5306 403cd6 5305->5306 5308 403ceb 5306->5308 5325 402674 5306->5325 5308->5296 5310 401abb 5309->5310 5311 4019ed 5309->5311 5310->5301 5312 401a04 RtlEnterCriticalSection 5311->5312 5313 401a0e LocalFree 5311->5313 5312->5313 5314 401a41 5313->5314 5315 401a2f VirtualFree 5314->5315 5316 401a49 5314->5316 5315->5314 5317 401a70 LocalFree 5316->5317 5318 401a87 5316->5318 5317->5317 5317->5318 5319 401aa9 RtlDeleteCriticalSection 5318->5319 5320 401a9f RtlLeaveCriticalSection 5318->5320 5319->5301 5320->5319 5322 403fe8 5321->5322 5328 403f07 5322->5328 5324 404006 5326 403154 4 API calls 5325->5326 5327 40267a 5326->5327 5327->5308 5331 403f09 5328->5331 5329 403f3c 5329->5324 5332 403154 4 API calls 5331->5332 5334 403e9c 5331->5334 5337 403f3d 5331->5337 5351 403e9c 5331->5351 5332->5331 5333 403ef2 5336 402674 4 API calls 5333->5336 5334->5329 5334->5333 5339 403ea9 5334->5339 5342 403e8e 5334->5342 5341 403ecf 5336->5341 5337->5324 5340 402674 4 API calls 5339->5340 5339->5341 5340->5341 5341->5324 5343 403e4c 5342->5343 5344 403e62 5343->5344 5345 403e7b 5343->5345 5347 403e67 5343->5347 5346 403cc8 4 API calls 5344->5346 5348 402674 4 API calls 5345->5348 5346->5347 5349 403e78 5347->5349 5350 402674 4 API calls 5347->5350 5348->5349 5349->5333 5349->5339 5350->5349 5352 403ed7 5351->5352 5358 403ea9 5351->5358 5353 403ef2 5352->5353 5355 403e8e 4 API calls 5352->5355 5356 402674 4 API calls 5353->5356 5354 403ecf 5354->5331 5357 403ee6 5355->5357 5356->5354 5357->5353 5357->5358 5358->5354 5359 402674 4 API calls 5358->5359 5359->5354 6371 404206 6372 4041cc 6371->6372 6375 40420a 6371->6375 6373 404282 6374 403154 4 API calls 6376 404323 6374->6376 6375->6373 6375->6374 6377 402c08 6378 402c82 6377->6378 6381 402c19 6377->6381 6379 402c56 RtlUnwind 6380 403154 4 API calls 6379->6380 6380->6378 6381->6378 6381->6379 6384 402b28 6381->6384 6385 402b31 RaiseException 6384->6385 6386 402b47 6384->6386 6385->6386 6386->6379 6756 40830c 6757 408334 VirtualFree 6756->6757 6758 408319 6757->6758 6395 403018 6396 403070 6395->6396 6397 403025 6395->6397 6398 40302a RtlUnwind 6397->6398 6399 40304e 6398->6399 6401 402f78 6399->6401 6402 402be8 6399->6402 6403 402bf1 RaiseException 6402->6403 6404 402c04 6402->6404 6403->6404 6404->6396 6405 409220 6406 409244 6405->6406 6407 4090fc 18 API calls 6406->6407 6408 40924d 6407->6408 6769 405f24 6770 405f34 6769->6770 6771 405f2c 6769->6771 6772 405f32 6771->6772 6773 405f3b 6771->6773 6776 405e9c 6772->6776 6774 405d90 19 API calls 6773->6774 6774->6770 6777 405ea4 6776->6777 6778 405ebe 6777->6778 6781 403154 4 API calls 6777->6781 6779 405ec3 6778->6779 6780 405eda 6778->6780 6782 405d90 19 API calls 6779->6782 6783 403154 4 API calls 6780->6783 6781->6777 6784 405ed6 6782->6784 6785 405edf 6783->6785 6787 403154 4 API calls 6784->6787 6786 405e00 33 API calls 6785->6786 6786->6784 6788 405f08 6787->6788 6789 403154 4 API calls 6788->6789 6790 405f16 6789->6790 6790->6770 6409 403a28 ReadFile 6410 403a46 6409->6410 6411 403a49 GetLastError 6409->6411 6412 40462b 6413 404638 SetErrorMode 6412->6413 6791 403932 6792 403924 6791->6792 6793 40374c VariantClear 6792->6793 6794 40392c 6793->6794 6795 40b137 6804 409b9c 6795->6804 6798 402f24 5 API calls 6799 40b141 6798->6799 6800 403198 4 API calls 6799->6800 6801 40b160 6800->6801 6802 403198 4 API calls 6801->6802 6803 40b168 6802->6803 6813 405afc 6804->6813 6806 409be5 6809 403198 4 API calls 6806->6809 6807 409bb7 6807->6806 6819 407688 6807->6819 6811 409bfa 6809->6811 6810 409bd5 6812 409bdd MessageBoxA 6810->6812 6811->6798 6811->6799 6812->6806 6814 403154 4 API calls 6813->6814 6815 405b01 6814->6815 6816 405b19 6815->6816 6817 403154 4 API calls 6815->6817 6816->6807 6818 405b0f 6817->6818 6818->6807 6820 405afc 4 API calls 6819->6820 6821 407697 6820->6821 6822 4076ab 6821->6822 6823 40769d 6821->6823 6825 4076bb 6822->6825 6827 4076c7 6822->6827 6824 40322c 4 API calls 6823->6824 6828 4076a9 6824->6828 6830 40764c 6825->6830 6837 4032b8 6827->6837 6828->6810 6831 40322c 4 API calls 6830->6831 6832 40765b 6831->6832 6833 407678 6832->6833 6834 406da0 CharPrevA 6832->6834 6833->6828 6835 407667 6834->6835 6835->6833 6836 4032fc 18 API calls 6835->6836 6836->6833 6838 403278 18 API calls 6837->6838 6839 4032c2 6838->6839 6839->6828 5368 4079c4 5369 4079d0 CloseHandle 5368->5369 5370 4079d9 5368->5370 5369->5370 6424 402ccc 6427 402cfe 6424->6427 6429 402cdd 6424->6429 6425 402d88 RtlUnwind 6426 403154 4 API calls 6425->6426 6426->6427 6428 402b28 RaiseException 6430 402d7f 6428->6430 6429->6425 6429->6427 6429->6428 6430->6425 6431 406acc IsDBCSLeadByte 6432 406ae4 6431->6432 6848 403fcd 6849 403f07 4 API calls 6848->6849 6850 403fd6 6849->6850 6851 403e9c 4 API calls 6850->6851 6852 403fe2 6851->6852 6037 40accf 6038 409f88 18 API calls 6037->6038 6039 40acd4 6038->6039 6040 402f24 5 API calls 6039->6040 6041 40acd9 6040->6041 6074 409ddc 6041->6074 6043 40ad31 6079 4026c4 GetSystemTime 6043->6079 6045 40acde 6045->6043 6115 409254 6045->6115 6046 40ad36 6080 4097d0 6046->6080 6050 40ad0d 6054 40ad15 MessageBoxA 6050->6054 6051 4031e8 18 API calls 6052 40ad4b 6051->6052 6098 406d78 6052->6098 6054->6043 6056 40ad22 6054->6056 6118 405cb4 6056->6118 6060 406a88 19 API calls 6061 40ad79 6060->6061 6062 403340 18 API calls 6061->6062 6063 40ad87 6062->6063 6064 4031e8 18 API calls 6063->6064 6065 40ad97 6064->6065 6066 40795c 37 API calls 6065->6066 6067 40add6 6066->6067 6068 402594 18 API calls 6067->6068 6069 40adf6 6068->6069 6070 407ea4 19 API calls 6069->6070 6071 40ae38 6070->6071 6072 408134 35 API calls 6071->6072 6073 40ae5f 6072->6073 6122 4099dc 6074->6122 6077 409d6c 19 API calls 6078 409dfc 6077->6078 6078->6045 6079->6046 6097 4097f0 6080->6097 6083 409815 CreateDirectoryA 6084 40988d 6083->6084 6085 40981f GetLastError 6083->6085 6086 40322c 4 API calls 6084->6086 6085->6097 6088 409897 6086->6088 6087 409254 18 API calls 6087->6097 6089 4031b8 4 API calls 6088->6089 6091 4098b1 6089->6091 6090 4050e4 33 API calls 6090->6097 6092 4031b8 4 API calls 6091->6092 6094 4098be 6092->6094 6093 407700 19 API calls 6093->6097 6094->6051 6095 409224 18 API calls 6095->6097 6096 405ce0 18 API calls 6096->6097 6097->6083 6097->6087 6097->6090 6097->6093 6097->6095 6097->6096 6178 407170 6097->6178 6201 4096c4 6097->6201 6308 406c70 6098->6308 6101 403454 18 API calls 6102 406d9a 6101->6102 6103 406b10 6102->6103 6313 406d34 6103->6313 6106 406b40 6108 403340 18 API calls 6106->6108 6107 406b4e 6109 403454 18 API calls 6107->6109 6110 406b4c 6108->6110 6111 406b61 6109->6111 6113 403198 4 API calls 6110->6113 6112 403340 18 API calls 6111->6112 6112->6110 6114 406b83 6113->6114 6114->6060 6116 409224 18 API calls 6115->6116 6117 409270 6116->6117 6117->6050 6119 405cb9 6118->6119 6120 405d90 19 API calls 6119->6120 6121 405ccb 6120->6121 6121->6121 6129 4099fb 6122->6129 6123 409a30 6125 409a3d GetUserDefaultLangID 6123->6125 6130 409a32 6123->6130 6124 409a34 6134 4074a0 GetModuleHandleA GetProcAddress 6124->6134 6125->6130 6128 409a0f 6128->6077 6129->6123 6129->6124 6129->6128 6130->6128 6131 409a6b GetACP 6130->6131 6132 409a8f 6130->6132 6131->6128 6131->6130 6132->6128 6133 409ab5 GetACP 6132->6133 6133->6128 6133->6132 6135 4074e3 6134->6135 6136 4074da 6134->6136 6137 407524 6135->6137 6138 4074ec 6135->6138 6147 403198 4 API calls 6136->6147 6139 4073e4 RegOpenKeyExA 6137->6139 6155 4073e4 6138->6155 6141 40753d 6139->6141 6143 40755a 6141->6143 6144 4073d8 20 API calls 6141->6144 6142 407505 6142->6143 6158 4073d8 6142->6158 6145 40322c 4 API calls 6143->6145 6149 407551 RegCloseKey 6144->6149 6150 407567 6145->6150 6148 40759c 6147->6148 6152 403198 4 API calls 6148->6152 6149->6143 6153 4032fc 18 API calls 6150->6153 6154 4075a4 6152->6154 6153->6136 6154->6130 6156 4073f5 RegOpenKeyExA 6155->6156 6157 4073ef 6155->6157 6156->6142 6157->6156 6161 40728c 6158->6161 6162 4072b2 RegQueryValueExA 6161->6162 6163 4072f7 6162->6163 6169 4072d5 6162->6169 6165 403198 4 API calls 6163->6165 6164 4072ef 6166 403198 4 API calls 6164->6166 6167 4073c3 RegCloseKey 6165->6167 6166->6163 6167->6143 6168 403278 18 API calls 6168->6169 6169->6163 6169->6164 6169->6168 6170 403420 18 API calls 6169->6170 6171 40732c RegQueryValueExA 6170->6171 6171->6162 6172 407348 6171->6172 6172->6163 6173 4034f0 18 API calls 6172->6173 6174 40738a 6173->6174 6176 403420 18 API calls 6174->6176 6177 40739c 6174->6177 6175 4031e8 18 API calls 6175->6163 6176->6177 6177->6175 6220 406ea8 6178->6220 6181 4071a2 6183 406ea8 19 API calls 6181->6183 6185 4071ee 6181->6185 6184 4071b2 6183->6184 6187 406e84 21 API calls 6184->6187 6190 4071be 6184->6190 6228 406cd8 6185->6228 6187->6190 6190->6185 6191 406ea8 19 API calls 6190->6191 6197 4071e3 6190->6197 6193 4071d7 6191->6193 6192 406a88 19 API calls 6194 407203 6192->6194 6195 406e84 21 API calls 6193->6195 6193->6197 6196 40322c 4 API calls 6194->6196 6195->6197 6198 40720d 6196->6198 6197->6185 6240 407118 GetWindowsDirectoryA 6197->6240 6199 4031b8 4 API calls 6198->6199 6200 407227 6199->6200 6200->6097 6202 4096e4 6201->6202 6203 406a88 19 API calls 6202->6203 6204 4096fd 6203->6204 6205 40322c 4 API calls 6204->6205 6212 409708 6205->6212 6207 406dc8 20 API calls 6207->6212 6208 4033b4 18 API calls 6208->6212 6209 409254 18 API calls 6209->6212 6210 405ce0 18 API calls 6210->6212 6212->6207 6212->6208 6212->6209 6212->6210 6213 409784 6212->6213 6281 409650 6212->6281 6289 4094b0 6212->6289 6214 40322c 4 API calls 6213->6214 6215 40978f 6214->6215 6216 4031b8 4 API calls 6215->6216 6217 4097a9 6216->6217 6218 403198 4 API calls 6217->6218 6219 4097b1 6218->6219 6219->6097 6221 4034f0 18 API calls 6220->6221 6222 406ebb 6221->6222 6223 406ed2 GetEnvironmentVariableA 6222->6223 6227 406ee5 6222->6227 6243 407268 6222->6243 6223->6222 6224 406ede 6223->6224 6225 403198 4 API calls 6224->6225 6225->6227 6227->6181 6237 406e84 6227->6237 6229 403414 6228->6229 6230 406cfb GetFullPathNameA 6229->6230 6231 406d07 6230->6231 6232 406d1e 6230->6232 6231->6232 6234 406d0f 6231->6234 6233 40322c 4 API calls 6232->6233 6235 406d1c 6233->6235 6236 403278 18 API calls 6234->6236 6235->6192 6236->6235 6247 406e2c 6237->6247 6241 405230 18 API calls 6240->6241 6242 407139 6241->6242 6242->6185 6244 407276 6243->6244 6245 4034f0 18 API calls 6244->6245 6246 407284 6245->6246 6246->6222 6254 406dc8 6247->6254 6249 406e4e 6250 406e56 GetFileAttributesA 6249->6250 6251 406e6b 6250->6251 6252 403198 4 API calls 6251->6252 6253 406e73 6252->6253 6253->6181 6264 406b94 6254->6264 6256 406dd9 6258 406e00 6256->6258 6271 406dc0 CharPrevA 6256->6271 6259 406e16 6258->6259 6260 406e0b 6258->6260 6272 403454 6259->6272 6261 40322c 4 API calls 6260->6261 6263 406e14 6261->6263 6263->6249 6268 406ba5 6264->6268 6265 406c09 6266 406ad0 IsDBCSLeadByte 6265->6266 6267 406c04 6265->6267 6266->6267 6267->6256 6268->6265 6270 406bc3 6268->6270 6270->6267 6279 406ad0 IsDBCSLeadByte 6270->6279 6271->6256 6273 403486 6272->6273 6274 403459 6272->6274 6275 403198 4 API calls 6273->6275 6274->6273 6276 40346d 6274->6276 6278 40347c 6275->6278 6277 403278 18 API calls 6276->6277 6277->6278 6278->6263 6280 406ae4 6279->6280 6280->6270 6282 403198 4 API calls 6281->6282 6283 409671 6282->6283 6286 40969e 6283->6286 6298 4032a8 6283->6298 6301 403494 6283->6301 6287 403198 4 API calls 6286->6287 6288 4096b3 6287->6288 6288->6212 6290 4093ec 2 API calls 6289->6290 6291 4094c6 6290->6291 6292 4094ca 6291->6292 6305 406e98 6291->6305 6292->6212 6295 4094fd 6296 409428 Wow64RevertWow64FsRedirection 6295->6296 6297 409505 6296->6297 6297->6212 6299 403278 18 API calls 6298->6299 6300 4032b5 6299->6300 6300->6283 6302 403498 6301->6302 6304 4034c3 6301->6304 6303 4034f0 18 API calls 6302->6303 6303->6304 6304->6283 6306 406e2c 21 API calls 6305->6306 6307 406ea2 GetLastError 6306->6307 6307->6295 6309 406b94 IsDBCSLeadByte 6308->6309 6311 406c85 6309->6311 6310 406ccf 6310->6101 6311->6310 6312 406ad0 IsDBCSLeadByte 6311->6312 6312->6311 6314 406d43 6313->6314 6315 406c70 IsDBCSLeadByte 6314->6315 6318 406d4e 6315->6318 6316 406b3a 6316->6106 6316->6107 6317 406ad0 IsDBCSLeadByte 6317->6318 6318->6316 6318->6317 6433 4024d0 6434 4024e4 6433->6434 6435 4024e9 6433->6435 6438 401918 4 API calls 6434->6438 6436 402518 6435->6436 6437 40250e RtlEnterCriticalSection 6435->6437 6440 4024ed 6435->6440 6448 402300 6436->6448 6437->6436 6438->6435 6441 402525 6444 402581 6441->6444 6445 402577 RtlLeaveCriticalSection 6441->6445 6443 401fd4 14 API calls 6446 402531 6443->6446 6445->6444 6446->6441 6458 40215c 6446->6458 6449 402314 6448->6449 6452 402335 6449->6452 6453 4023b8 6449->6453 6450 402344 6450->6441 6450->6443 6452->6450 6472 401b74 6452->6472 6453->6450 6456 402455 6453->6456 6475 401d80 6453->6475 6479 401e84 6453->6479 6456->6450 6457 401d00 9 API calls 6456->6457 6457->6450 6459 40217a 6458->6459 6460 402175 6458->6460 6461 4021ab RtlEnterCriticalSection 6459->6461 6464 4021b5 6459->6464 6468 40217e 6459->6468 6462 401918 4 API calls 6460->6462 6461->6464 6462->6459 6463 4021c1 6466 4022e3 RtlLeaveCriticalSection 6463->6466 6467 4022ed 6463->6467 6464->6463 6465 402244 6464->6465 6470 402270 6464->6470 6465->6468 6469 401d80 7 API calls 6465->6469 6466->6467 6467->6441 6468->6441 6469->6468 6470->6463 6471 401d00 7 API calls 6470->6471 6471->6463 6473 40215c 9 API calls 6472->6473 6474 401b95 6473->6474 6474->6450 6476 401d92 6475->6476 6477 401d89 6475->6477 6476->6453 6477->6476 6478 401b74 9 API calls 6477->6478 6478->6476 6484 401768 6479->6484 6481 401ea6 6481->6453 6482 401e99 6482->6481 6483 401dcc 9 API calls 6482->6483 6483->6481 6486 401787 6484->6486 6485 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 6485->6486 6486->6485 6487 40183b 6486->6487 6488 40132c LocalAlloc 6486->6488 6490 401821 6486->6490 6492 4017d6 6486->6492 6493 4017e7 6487->6493 6499 4015c4 6487->6499 6488->6486 6491 40150c VirtualFree 6490->6491 6491->6493 6495 40150c 6492->6495 6493->6482 6498 40153b 6495->6498 6496 401594 6496->6493 6497 401568 VirtualFree 6497->6498 6498->6496 6498->6497 6501 40160a 6499->6501 6500 40163a 6500->6493 6501->6500 6502 401626 VirtualAlloc 6501->6502 6502->6500 6502->6501 6503 4028d2 6504 4028da 6503->6504 6506 4028ef 6504->6506 6509 403554 6504->6509 6507 4025ac 4 API calls 6506->6507 6508 4028f4 6507->6508 6510 403566 6509->6510 6512 403578 6510->6512 6513 403604 6510->6513 6512->6504 6515 40357c 6513->6515 6514 4035aa 6516 4035b1 6514->6516 6517 4035b8 6514->6517 6515->6514 6518 4035d0 6515->6518 6522 4035b6 6515->6522 6519 403198 4 API calls 6516->6519 6520 4031b8 4 API calls 6517->6520 6521 40357c 4 API calls 6518->6521 6519->6522 6520->6522 6521->6522 6522->6510 6853 4019d3 6854 4019ba 6853->6854 6855 4019c3 RtlLeaveCriticalSection 6854->6855 6856 4019cd 6854->6856 6855->6856 5581 407ae8 SetFilePointer 5582 407b1f 5581->5582 5583 407b0f GetLastError 5581->5583 5583->5582 5584 407b18 5583->5584 5585 407908 35 API calls 5584->5585 5585->5582 6868 402be9 RaiseException 6869 402c04 6868->6869 6531 40b0ef 6532 40b061 6531->6532 6533 40b08d 6532->6533 6534 409978 9 API calls 6532->6534 6535 40b0a6 6533->6535 6538 40b0a0 RemoveDirectoryA 6533->6538 6534->6533 6536 40b0ba 6535->6536 6537 40b0af DestroyWindow 6535->6537 6539 40b0e2 6536->6539 6540 40357c 4 API calls 6536->6540 6537->6536 6538->6535 6541 40b0d8 6540->6541 6542 4025ac 4 API calls 6541->6542 6542->6539 6543 402af2 6544 402afe 6543->6544 6547 402ed0 6544->6547 6548 403154 4 API calls 6547->6548 6550 402ee0 6548->6550 6549 402b03 6550->6549 6552 402b0c 6550->6552 6553 402b25 6552->6553 6554 402b15 RaiseException 6552->6554 6553->6549 6554->6553 6874 405ff2 6876 405ff4 6874->6876 6875 406030 6878 405d90 19 API calls 6875->6878 6876->6875 6877 40602a 6876->6877 6879 406047 6876->6879 6877->6875 6880 40609c 6877->6880 6881 406043 6878->6881 6883 40512c 19 API calls 6879->6883 6882 405e00 33 API calls 6880->6882 6885 403198 4 API calls 6881->6885 6882->6881 6884 406070 6883->6884 6886 405e00 33 API calls 6884->6886 6887 4060d6 6885->6887 6886->6881 6902 402dfa 6903 402e26 6902->6903 6904 402e0d 6902->6904 6906 402ba4 6904->6906 6907 402bc9 6906->6907 6908 402bad 6906->6908 6907->6903 6909 402bb5 RaiseException 6908->6909 6909->6907 6567 40b0fd 6576 4098e8 6567->6576 6569 40b102 6570 40b128 6569->6570 6571 40b120 MessageBoxA 6569->6571 6572 403198 4 API calls 6570->6572 6571->6570 6573 40b160 6572->6573 6574 403198 4 API calls 6573->6574 6575 40b168 6574->6575 6577 4098f4 GetCurrentProcess OpenProcessToken 6576->6577 6578 40994f ExitWindowsEx 6576->6578 6579 409906 6577->6579 6580 40990a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6577->6580 6578->6579 6579->6569 6580->6578 6580->6579 6910 409dfe 6911 409e00 6910->6911 6912 409e22 6911->6912 6913 409e3e CallWindowProcA 6911->6913 6913->6912 6585 403a80 CloseHandle 6586 403a90 6585->6586 6587 403a91 GetLastError 6585->6587 6588 404283 6589 4042c3 6588->6589 6590 403154 4 API calls 6589->6590 6591 404323 6590->6591 6914 404185 6915 4041ff 6914->6915 6916 4041cc 6915->6916 6917 403154 4 API calls 6915->6917 6918 404323 6917->6918 6592 403e87 6593 403e4c 6592->6593 6594 403e62 6593->6594 6595 403e7b 6593->6595 6598 403e67 6593->6598 6596 403cc8 4 API calls 6594->6596 6597 402674 4 API calls 6595->6597 6596->6598 6599 403e78 6597->6599 6598->6599 6600 402674 4 API calls 6598->6600 6600->6599 5360 407493 5361 407484 SetErrorMode 5360->5361 6610 403a97 6611 403aac 6610->6611 6612 403bbc GetStdHandle 6611->6612 6613 403b0e CreateFileA 6611->6613 6621 403ab2 6611->6621 6614 403c17 GetLastError 6612->6614 6618 403bba 6612->6618 6613->6614 6615 403b2c 6613->6615 6614->6621 6617 403b3b GetFileSize 6615->6617 6615->6618 6617->6614 6619 403b4e SetFilePointer 6617->6619 6620 403be7 GetFileType 6618->6620 6618->6621 6619->6614 6624 403b6a ReadFile 6619->6624 6620->6621 6623 403c02 CloseHandle 6620->6623 6623->6621 6624->6614 6625 403b8c 6624->6625 6625->6618 6626 403b9f SetFilePointer 6625->6626 6626->6614 6627 403bb0 SetEndOfFile 6626->6627 6627->6614 6627->6618 5586 40aa98 5629 4030dc 5586->5629 5588 40aaae 5632 4042e8 5588->5632 5590 40aab3 5635 404654 GetModuleHandleA GetVersion 5590->5635 5594 40aabd 5726 406a18 5594->5726 5596 40aac2 5735 409520 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5596->5735 5603 40ab05 5763 40707c 5603->5763 5607 4031e8 18 API calls 5608 40ab23 5607->5608 5777 40795c 5608->5777 5614 407d94 InterlockedExchange 5616 40ab72 5614->5616 5615 40abb0 5797 40791c 5615->5797 5616->5615 5834 409f88 5616->5834 5618 40abf1 5801 407ea4 5618->5801 5619 40abd6 5619->5618 5621 409f88 18 API calls 5619->5621 5621->5618 5622 40ac16 5811 408f84 5622->5811 5626 40ac5c 5627 408f84 35 API calls 5626->5627 5628 40ac95 5626->5628 5627->5626 5844 403094 5629->5844 5631 4030e1 GetModuleHandleA GetCommandLineA 5631->5588 5633 403154 4 API calls 5632->5633 5634 404323 5632->5634 5633->5634 5634->5590 5636 4046a5 5635->5636 5637 404685 GetProcAddress 5635->5637 5639 4046ad GetProcAddress 5636->5639 5640 4048af GetProcAddress 5636->5640 5637->5636 5638 404696 5637->5638 5638->5636 5641 4046bc 5639->5641 5642 4048c5 GetProcAddress 5640->5642 5643 4048be 5640->5643 5845 4045a0 GetSystemDirectoryA 5641->5845 5645 4048d4 SetProcessDEPPolicy 5642->5645 5646 4048d8 5642->5646 5643->5642 5645->5646 5648 403198 4 API calls 5646->5648 5650 4048ed 5648->5650 5649 4031e8 18 API calls 5651 4046d8 5649->5651 5725 404a74 6FB81CD0 5650->5725 5651->5640 5652 40470b 5651->5652 5653 4032fc 18 API calls 5651->5653 5848 40322c 5652->5848 5653->5652 5656 4032fc 18 API calls 5657 404726 5656->5657 5852 4045cc SetErrorMode 5657->5852 5660 40322c 4 API calls 5661 40473c 5660->5661 5662 4032fc 18 API calls 5661->5662 5663 404749 5662->5663 5664 4045cc 2 API calls 5663->5664 5665 404751 5664->5665 5666 40322c 4 API calls 5665->5666 5667 40475f 5666->5667 5668 4032fc 18 API calls 5667->5668 5669 40476c 5668->5669 5670 4045cc 2 API calls 5669->5670 5671 404774 5670->5671 5672 40322c 4 API calls 5671->5672 5673 404782 5672->5673 5674 4032fc 18 API calls 5673->5674 5675 40478f 5674->5675 5676 4045cc 2 API calls 5675->5676 5677 404797 5676->5677 5678 40322c 4 API calls 5677->5678 5679 4047a5 5678->5679 5680 4032fc 18 API calls 5679->5680 5681 4047b2 5680->5681 5682 4045cc 2 API calls 5681->5682 5683 4047ba 5682->5683 5684 40322c 4 API calls 5683->5684 5685 4047c8 5684->5685 5686 4032fc 18 API calls 5685->5686 5687 4047d5 5686->5687 5688 4045cc 2 API calls 5687->5688 5689 4047dd 5688->5689 5690 40322c 4 API calls 5689->5690 5691 4047eb 5690->5691 5692 4032fc 18 API calls 5691->5692 5693 4047f8 5692->5693 5694 4045cc 2 API calls 5693->5694 5695 404800 5694->5695 5696 40322c 4 API calls 5695->5696 5697 40480e 5696->5697 5698 4032fc 18 API calls 5697->5698 5699 40481b 5698->5699 5700 4045cc 2 API calls 5699->5700 5701 404823 5700->5701 5702 40322c 4 API calls 5701->5702 5703 404831 5702->5703 5704 4032fc 18 API calls 5703->5704 5705 40483e 5704->5705 5706 4045cc 2 API calls 5705->5706 5707 404846 5706->5707 5708 40322c 4 API calls 5707->5708 5709 404854 5708->5709 5710 4032fc 18 API calls 5709->5710 5711 404861 5710->5711 5712 4045cc 2 API calls 5711->5712 5713 404869 5712->5713 5714 40322c 4 API calls 5713->5714 5715 404877 5714->5715 5716 4032fc 18 API calls 5715->5716 5717 404884 5716->5717 5718 4045cc 2 API calls 5717->5718 5719 40488c 5718->5719 5720 40322c 4 API calls 5719->5720 5721 40489a 5720->5721 5722 4032fc 18 API calls 5721->5722 5723 4048a7 5722->5723 5724 4045cc 2 API calls 5723->5724 5724->5640 5725->5594 5861 4060f8 5726->5861 5736 409575 5735->5736 5941 407144 GetSystemDirectoryA 5736->5941 5740 40959c 5741 4032fc 18 API calls 5740->5741 5742 4095a9 5741->5742 5954 40741c SetErrorMode 5742->5954 5745 407700 19 API calls 5746 4095c3 5745->5746 5747 4031b8 4 API calls 5746->5747 5748 4095dd 5747->5748 5749 40a018 GetSystemInfo VirtualQuery 5748->5749 5750 40a0cc 5749->5750 5753 40a042 5749->5753 5755 409c08 5750->5755 5751 40a0ad VirtualQuery 5751->5750 5751->5753 5752 40a06c VirtualProtect 5752->5753 5753->5750 5753->5751 5753->5752 5754 40a09b VirtualProtect 5753->5754 5754->5751 5982 407020 GetCommandLineA 5755->5982 5757 409cf0 5758 4031b8 4 API calls 5757->5758 5760 409d0a 5758->5760 5759 40707c 20 API calls 5762 409c25 5759->5762 5760->5603 5827 40a128 5760->5827 5761 403454 18 API calls 5761->5762 5762->5757 5762->5759 5762->5761 5764 4070a3 GetModuleFileNameA 5763->5764 5765 4070c7 GetCommandLineA 5763->5765 5766 403278 18 API calls 5764->5766 5772 4070cc 5765->5772 5767 4070c5 5766->5767 5769 4070f4 5767->5769 5768 4070d1 5770 403198 4 API calls 5768->5770 5774 403198 4 API calls 5769->5774 5773 4070d9 5770->5773 5771 406f40 18 API calls 5771->5772 5772->5768 5772->5771 5772->5773 5775 40322c 4 API calls 5773->5775 5776 407109 5774->5776 5775->5769 5776->5607 5778 407966 5777->5778 5989 4079f2 5778->5989 5992 4079f4 5778->5992 5779 407992 5780 4079a6 5779->5780 5781 407908 35 API calls 5779->5781 5784 40a0d4 FindResourceA 5780->5784 5781->5780 5785 40a0e9 5784->5785 5786 40a0ee SizeofResource 5784->5786 5787 409f88 18 API calls 5785->5787 5788 40a100 LoadResource 5786->5788 5789 40a0fb 5786->5789 5787->5786 5791 40a113 LockResource 5788->5791 5792 40a10e 5788->5792 5790 409f88 18 API calls 5789->5790 5790->5788 5794 40a124 5791->5794 5795 40a11f 5791->5795 5793 409f88 18 API calls 5792->5793 5793->5791 5794->5614 5794->5616 5796 409f88 18 API calls 5795->5796 5796->5794 5799 407930 5797->5799 5798 407940 5798->5619 5799->5798 5800 407868 34 API calls 5799->5800 5800->5798 5802 407eb1 5801->5802 5803 405ce0 18 API calls 5802->5803 5804 407f05 5802->5804 5803->5804 5805 407d94 InterlockedExchange 5804->5805 5806 407f17 5805->5806 5807 405ce0 18 API calls 5806->5807 5808 407f2d 5806->5808 5807->5808 5809 407f70 5808->5809 5810 405ce0 18 API calls 5808->5810 5809->5622 5810->5809 5818 408fb5 5811->5818 5820 408ffe 5811->5820 5812 409049 5995 408134 5812->5995 5814 408134 35 API calls 5814->5820 5815 4034f0 18 API calls 5815->5818 5816 409060 5819 4031b8 4 API calls 5816->5819 5817 4034f0 18 API calls 5817->5820 5818->5815 5818->5820 5821 403420 18 API calls 5818->5821 5823 4031e8 18 API calls 5818->5823 5826 408134 35 API calls 5818->5826 5822 40907a 5819->5822 5820->5812 5820->5814 5820->5817 5824 403420 18 API calls 5820->5824 5825 4031e8 18 API calls 5820->5825 5821->5818 5841 405070 5822->5841 5823->5818 5824->5820 5825->5820 5826->5818 5828 40322c 4 API calls 5827->5828 5829 40a14b 5828->5829 5830 40a15a MessageBoxA 5829->5830 5831 40a16f 5830->5831 5832 403198 4 API calls 5831->5832 5833 40a177 5832->5833 5833->5603 5835 409f91 5834->5835 5836 409fa9 5834->5836 5837 405ce0 18 API calls 5835->5837 5838 405ce0 18 API calls 5836->5838 5840 409fa3 5837->5840 5839 409fba 5838->5839 5839->5615 5840->5615 5842 402594 18 API calls 5841->5842 5843 40507b 5842->5843 5843->5626 5844->5631 5856 40458c 5845->5856 5850 403230 5848->5850 5849 403252 5849->5656 5850->5849 5851 4025ac 4 API calls 5850->5851 5851->5849 5859 403414 5852->5859 5855 40461e 5855->5660 5857 4032c4 18 API calls 5856->5857 5858 40459b 5857->5858 5858->5649 5860 403418 LoadLibraryA 5859->5860 5860->5855 5862 405d90 19 API calls 5861->5862 5863 406109 5862->5863 5864 4056d0 GetSystemDefaultLCID 5863->5864 5868 405706 5864->5868 5865 40512c 19 API calls 5865->5868 5866 40565c 19 API calls 5866->5868 5867 4031e8 18 API calls 5867->5868 5868->5865 5868->5866 5868->5867 5872 405768 5868->5872 5869 40565c 19 API calls 5869->5872 5870 4031e8 18 API calls 5870->5872 5871 40512c 19 API calls 5871->5872 5872->5869 5872->5870 5872->5871 5873 4057eb 5872->5873 5874 4031b8 4 API calls 5873->5874 5875 405805 5874->5875 5876 405814 GetSystemDefaultLCID 5875->5876 5933 40565c GetLocaleInfoA 5876->5933 5879 4031e8 18 API calls 5880 405854 5879->5880 5881 40565c 19 API calls 5880->5881 5882 405869 5881->5882 5883 40565c 19 API calls 5882->5883 5884 40588d 5883->5884 5939 4056a8 GetLocaleInfoA 5884->5939 5887 4056a8 GetLocaleInfoA 5888 4058bd 5887->5888 5889 40565c 19 API calls 5888->5889 5890 4058d7 5889->5890 5891 4056a8 GetLocaleInfoA 5890->5891 5892 4058f4 5891->5892 5893 40565c 19 API calls 5892->5893 5894 40590e 5893->5894 5895 4031e8 18 API calls 5894->5895 5896 40591b 5895->5896 5897 40565c 19 API calls 5896->5897 5898 405930 5897->5898 5899 4031e8 18 API calls 5898->5899 5900 40593d 5899->5900 5901 4056a8 GetLocaleInfoA 5900->5901 5902 40594b 5901->5902 5903 40565c 19 API calls 5902->5903 5904 405965 5903->5904 5905 4031e8 18 API calls 5904->5905 5906 405972 5905->5906 5907 40565c 19 API calls 5906->5907 5908 405987 5907->5908 5909 4031e8 18 API calls 5908->5909 5910 405994 5909->5910 5911 40565c 19 API calls 5910->5911 5912 4059a9 5911->5912 5913 4059c6 5912->5913 5914 4059b7 5912->5914 5916 40322c 4 API calls 5913->5916 5915 40322c 4 API calls 5914->5915 5917 4059c4 5915->5917 5916->5917 5918 40565c 19 API calls 5917->5918 5919 4059e8 5918->5919 5920 405a05 5919->5920 5921 4059f6 5919->5921 5923 403198 4 API calls 5920->5923 5922 40322c 4 API calls 5921->5922 5924 405a03 5922->5924 5923->5924 5925 4033b4 18 API calls 5924->5925 5926 405a27 5925->5926 5927 4033b4 18 API calls 5926->5927 5928 405a41 5927->5928 5929 4031b8 4 API calls 5928->5929 5930 405a5b 5929->5930 5931 406144 GetVersionExA 5930->5931 5932 40615b 5931->5932 5932->5596 5934 405683 5933->5934 5935 405695 5933->5935 5936 403278 18 API calls 5934->5936 5937 40322c 4 API calls 5935->5937 5938 405693 5936->5938 5937->5938 5938->5879 5940 4056c4 5939->5940 5940->5887 5958 405230 5941->5958 5944 406a88 5945 406a92 5944->5945 5946 406ab5 5944->5946 5961 406da0 5945->5961 5947 40322c 4 API calls 5946->5947 5949 406abe 5947->5949 5949->5740 5950 406a99 5950->5946 5951 406aa4 5950->5951 5966 403340 5951->5966 5953 406ab2 5953->5740 5955 403414 5954->5955 5956 407454 LoadLibraryA 5955->5956 5957 40746a 5956->5957 5957->5745 5959 4032c4 18 API calls 5958->5959 5960 40523f 5959->5960 5960->5944 5962 406da7 5961->5962 5963 406dab 5961->5963 5962->5950 5981 406dc0 CharPrevA 5963->5981 5965 406dbc 5965->5950 5967 403344 5966->5967 5968 4033a5 5966->5968 5969 4031e8 5967->5969 5970 40334c 5967->5970 5973 403254 18 API calls 5969->5973 5976 4031fc 5969->5976 5970->5968 5971 40335b 5970->5971 5974 4031e8 18 API calls 5970->5974 5975 403254 18 API calls 5971->5975 5972 403228 5972->5953 5973->5976 5974->5971 5978 403375 5975->5978 5976->5972 5977 4025ac 4 API calls 5976->5977 5977->5972 5979 4031e8 18 API calls 5978->5979 5980 4033a1 5979->5980 5980->5953 5981->5965 5983 406f40 18 API calls 5982->5983 5984 407043 5983->5984 5985 406f40 18 API calls 5984->5985 5986 407055 5984->5986 5985->5984 5987 403198 4 API calls 5986->5987 5988 40706a 5987->5988 5988->5762 5990 4079f4 5989->5990 5991 407a33 CreateFileA 5990->5991 5991->5779 5993 403414 5992->5993 5994 407a33 CreateFileA 5993->5994 5994->5779 5996 40814f 5995->5996 6000 408144 5995->6000 6001 4080d8 5996->6001 5999 405ce0 18 API calls 5999->6000 6000->5816 6002 40812b 6001->6002 6003 4080ec 6001->6003 6002->5999 6002->6000 6003->6002 6005 408028 6003->6005 6006 408033 6005->6006 6007 408044 6005->6007 6008 405ce0 18 API calls 6006->6008 6009 40791c 34 API calls 6007->6009 6008->6007 6010 408058 6009->6010 6011 40791c 34 API calls 6010->6011 6012 408079 6011->6012 6013 407d94 InterlockedExchange 6012->6013 6014 40808e 6013->6014 6015 4080a4 6014->6015 6016 405ce0 18 API calls 6014->6016 6015->6003 6016->6015 6628 40949a 6629 40948c 6628->6629 6630 409428 Wow64RevertWow64FsRedirection 6629->6630 6631 409494 6630->6631 6632 40949c SetLastError 6633 4094a5 6632->6633 6017 407aa8 ReadFile 6018 407ac8 6017->6018 6019 407adf 6017->6019 6020 407ad8 6018->6020 6021 407ace GetLastError 6018->6021 6022 407908 35 API calls 6020->6022 6021->6019 6021->6020 6022->6019 6634 402caa 6635 403154 4 API calls 6634->6635 6636 402caf 6635->6636 6937 4075aa 6938 407594 6937->6938 6939 403198 4 API calls 6938->6939 6940 40759c 6939->6940 6941 403198 4 API calls 6940->6941 6942 4075a4 6941->6942 6637 4028ac 6638 402594 18 API calls 6637->6638 6639 4028b6 6638->6639 6943 4093ac 6946 409278 6943->6946 6947 409281 6946->6947 6948 403198 4 API calls 6947->6948 6949 40928f 6947->6949 6948->6947 6950 4055b0 6951 4055c3 6950->6951 6952 4052a8 33 API calls 6951->6952 6953 4055d7 6952->6953 6640 40acb4 6641 40acd9 6640->6641 6642 409ddc 29 API calls 6641->6642 6645 40acde 6642->6645 6643 40ad31 6674 4026c4 GetSystemTime 6643->6674 6645->6643 6648 409254 18 API calls 6645->6648 6646 40ad36 6647 4097d0 46 API calls 6646->6647 6649 40ad3e 6647->6649 6650 40ad0d 6648->6650 6651 4031e8 18 API calls 6649->6651 6654 40ad15 MessageBoxA 6650->6654 6652 40ad4b 6651->6652 6653 406d78 19 API calls 6652->6653 6655 40ad58 6653->6655 6654->6643 6656 40ad22 6654->6656 6657 406b10 19 API calls 6655->6657 6658 405cb4 19 API calls 6656->6658 6659 40ad68 6657->6659 6658->6643 6660 406a88 19 API calls 6659->6660 6661 40ad79 6660->6661 6662 403340 18 API calls 6661->6662 6663 40ad87 6662->6663 6664 4031e8 18 API calls 6663->6664 6665 40ad97 6664->6665 6666 40795c 37 API calls 6665->6666 6667 40add6 6666->6667 6668 402594 18 API calls 6667->6668 6669 40adf6 6668->6669 6670 407ea4 19 API calls 6669->6670 6671 40ae38 6670->6671 6672 408134 35 API calls 6671->6672 6673 40ae5f 6672->6673 6674->6646 6675 401ab9 6676 401a96 6675->6676 6677 401aa9 RtlDeleteCriticalSection 6676->6677 6678 401a9f RtlLeaveCriticalSection 6676->6678 6678->6677

                              Control-flow Graph

                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32.dll,00000000,004048EE,?,?,?,?,00000000,?,0040AAB8), ref: 0040466F
                              • GetVersion.KERNEL32(kernel32.dll,00000000,004048EE,?,?,?,?,00000000,?,0040AAB8), ref: 00404676
                              • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0040468B
                              • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 004046B3
                              • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004048B5
                              • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004048CB
                              • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,kernel32.dll,00000000,004048EE,?,?,?,?,00000000,?,0040AAB8), ref: 004048D6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModulePolicyProcessVersion
                              • String ID: SetDefaultDllDirectories$SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$apphelp.dll$clbcatq.dll$comres.dll$cryptbase.dll$dwmapi.dll$kernel32.dll$oleacc.dll$profapi.dll$propsys.dll$setupapi.dll$userenv.dll$uxtheme.dll$version.dll
                              • API String ID: 3297890031-2388063882
                              • Opcode ID: 6206738d1768993a266272c574535deacfcb651ff371490375f42cd1ba234e07
                              • Instruction ID: 9e7baa03e94b680687c531d55c537e9110a8ac934c54f9465d7227ec1282235b
                              • Opcode Fuzzy Hash: 6206738d1768993a266272c574535deacfcb651ff371490375f42cd1ba234e07
                              • Instruction Fuzzy Hash: B2611070600149AFDB00FBF6DA8398E77A99F80309B2045BBA604772D6D778EF059B5D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 230 40a018-40a03c GetSystemInfo VirtualQuery 231 40a042 230->231 232 40a0cc-40a0d3 230->232 233 40a0c1-40a0c6 231->233 233->232 234 40a044-40a04b 233->234 235 40a0ad-40a0bf VirtualQuery 234->235 236 40a04d-40a051 234->236 235->232 235->233 236->235 237 40a053-40a05b 236->237 238 40a06c-40a07d VirtualProtect 237->238 239 40a05d-40a060 237->239 241 40a081-40a083 238->241 242 40a07f 238->242 239->238 240 40a062-40a065 239->240 240->238 243 40a067-40a06a 240->243 244 40a092-40a095 241->244 242->241 243->238 243->241 245 40a085-40a08e call 40a010 244->245 246 40a097-40a099 244->246 245->244 246->235 248 40a09b-40a0a8 VirtualProtect 246->248 248->235
                              APIs
                              • GetSystemInfo.KERNEL32(?), ref: 0040A02A
                              • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 0040A035
                              • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 0040A076
                              • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 0040A0A8
                              • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 0040A0B8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Virtual$ProtectQuery$InfoSystem
                              • String ID:
                              • API String ID: 2441996862-0
                              • Opcode ID: 9ac3e84cebc6f461d525c38fea5a33ab6cb0156132446b09103c7350edb016b4
                              • Instruction ID: f5309bbdda193f62b4be3c179e768a57e3f3f612c04de257546ab44ee606f1f6
                              • Opcode Fuzzy Hash: 9ac3e84cebc6f461d525c38fea5a33ab6cb0156132446b09103c7350edb016b4
                              • Instruction Fuzzy Hash: 142190B1240308ABD6309E69CC85F5777D8DF85354F08493AFAC5E33C2D63DE860866A
                              APIs
                              • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040D4C0,00000001,?,00405727,?,00000000,00405806), ref: 0040567A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: InfoLocale
                              • String ID:
                              • API String ID: 2299586839-0
                              • Opcode ID: 7459d56e7c64c485d498697c6eb088ce7aaa21e11ea95b6c07db09bb75ef8263
                              • Instruction ID: d14b50eaf9df709ed1cf3d56deeb77a2084f63d122e7671578114c6bad5e918b
                              • Opcode Fuzzy Hash: 7459d56e7c64c485d498697c6eb088ce7aaa21e11ea95b6c07db09bb75ef8263
                              • Instruction Fuzzy Hash: 68E0D87170021427D711A9699C86EFB735CDB58314F4006BFB909E73C6EDB59E8046ED

                              Control-flow Graph

                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004095DE,?,?,?,?,00000000,00000000,?,0040AACC), ref: 00409542
                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00409548
                              • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004095DE,?,?,?,?,00000000,00000000,?,0040AACC), ref: 0040955C
                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00409562
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                              • API String ID: 1646373207-2130885113
                              • Opcode ID: 9711803e7e97600f978dac47126909fe1692835b2a3da83a2610dda9fb37f9b7
                              • Instruction ID: 3d1781b746021e9606986d5b6d55f7cbde73f6a932e0ba52378b2443c6d91f24
                              • Opcode Fuzzy Hash: 9711803e7e97600f978dac47126909fe1692835b2a3da83a2610dda9fb37f9b7
                              • Instruction Fuzzy Hash: 79115470908244BEDB01FBA2CD43B5A7B68D784744F204477F501762D3DA7D5E08DA2D

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00409AE8: GetLastError.KERNEL32(00000000,00409B8B), ref: 00409B0C
                              • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AF9E
                              • SetWindowLongA.USER32(000103E6,000000FC,Function_00009E00), ref: 0040AFB5
                                • Part of subcall function 00406FCC: GetCommandLineA.KERNEL32(00000000,00407010,?,?,?,?,00000000), ref: 00406FE4
                                • Part of subcall function 00409E8C: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78,00000000,00409F5F), ref: 00409EFC
                                • Part of subcall function 00409E8C: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78,00000000), ref: 00409F10
                                • Part of subcall function 00409E8C: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409F29
                                • Part of subcall function 00409E8C: GetExitCodeProcess.KERNEL32(?), ref: 00409F3B
                                • Part of subcall function 00409E8C: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78), ref: 00409F44
                              • RemoveDirectoryA.KERNEL32(00000000,0040B0F4,Function_00009E00,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040B0A1
                              • DestroyWindow.USER32(000103E6,0040B0F4,Function_00009E00,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040B0B5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$CloseCreateHandleProcess$CodeCommandDestroyDirectoryErrorExitLastLineLongMultipleObjectsRemoveWait
                              • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                              • API String ID: 849423697-3001827809
                              • Opcode ID: 08113ef3ce2da518920d8c13058acc363925f6704d668fbfbfd076efd3cb2295
                              • Instruction ID: d96ad4f456555d006dfdd6a111ba55fa130d32b67bbf9cfe256734ebf9c0f5f1
                              • Opcode Fuzzy Hash: 08113ef3ce2da518920d8c13058acc363925f6704d668fbfbfd076efd3cb2295
                              • Instruction Fuzzy Hash: 95413070A006449BD711EBE9EE85B9A77E4EB58304F10427BF514BB2E1C7B89C49CB9C

                              Control-flow Graph

                              APIs
                              • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AF9E
                              • SetWindowLongA.USER32(000103E6,000000FC,Function_00009E00), ref: 0040AFB5
                                • Part of subcall function 00406FCC: GetCommandLineA.KERNEL32(00000000,00407010,?,?,?,?,00000000), ref: 00406FE4
                                • Part of subcall function 00409E8C: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78,00000000,00409F5F), ref: 00409EFC
                                • Part of subcall function 00409E8C: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78,00000000), ref: 00409F10
                                • Part of subcall function 00409E8C: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409F29
                                • Part of subcall function 00409E8C: GetExitCodeProcess.KERNEL32(?), ref: 00409F3B
                                • Part of subcall function 00409E8C: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78), ref: 00409F44
                              • RemoveDirectoryA.KERNEL32(00000000,0040B0F4,Function_00009E00,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040B0A1
                              • DestroyWindow.USER32(000103E6,0040B0F4,Function_00009E00,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040B0B5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$CloseCreateHandleProcess$CodeCommandDestroyDirectoryExitLineLongMultipleObjectsRemoveWait
                              • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                              • API String ID: 3586484885-3001827809
                              • Opcode ID: 3e82f52e343573e9ee8ccf82fbc097b32b2466bbbc9497f93a956efcdcfa5545
                              • Instruction ID: 22e85acea042a1c9b241f29fbd05952515ad99a43a6683ef4ce3977848861488
                              • Opcode Fuzzy Hash: 3e82f52e343573e9ee8ccf82fbc097b32b2466bbbc9497f93a956efcdcfa5545
                              • Instruction Fuzzy Hash: 00410971A006049BD710EBE9EE85BAA77A4EB58304F10427AF514BB2E1D7789C48CB9C

                              Control-flow Graph

                              APIs
                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78,00000000,00409F5F), ref: 00409EFC
                              • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78,00000000), ref: 00409F10
                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409F29
                              • GetExitCodeProcess.KERNEL32(?), ref: 00409F3B
                              • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78), ref: 00409F44
                                • Part of subcall function 00409AE8: GetLastError.KERNEL32(00000000,00409B8B), ref: 00409B0C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                              • String ID: D
                              • API String ID: 3356880605-2746444292
                              • Opcode ID: 7df226d52587f770460e981b15b5d19bc6ab37567cde566df4420800d0169a2d
                              • Instruction ID: c83664c5db2498e28503e3c1fa1a9009394fa647db11d74ebe1f458a85c7f7ae
                              • Opcode Fuzzy Hash: 7df226d52587f770460e981b15b5d19bc6ab37567cde566df4420800d0169a2d
                              • Instruction Fuzzy Hash: 19113DB16042096ADB00EBE6CC42F9EB7ACEF89714F50017AB604F72C6DA789D048669

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 211 4019dc-4019e7 212 401abb-401abd 211->212 213 4019ed-401a02 211->213 214 401a04-401a09 RtlEnterCriticalSection 213->214 215 401a0e-401a2d LocalFree 213->215 214->215 216 401a41-401a47 215->216 217 401a49-401a6e call 4012dc * 3 216->217 218 401a2f-401a3f VirtualFree 216->218 225 401a70-401a85 LocalFree 217->225 226 401a87-401a9d 217->226 218->216 225->225 225->226 228 401aa9-401ab3 RtlDeleteCriticalSection 226->228 229 401a9f-401aa4 RtlLeaveCriticalSection 226->229 229->228
                              APIs
                              • RtlEnterCriticalSection.KERNEL32(0040D41C,00000000,00401AB4), ref: 00401A09
                              • LocalFree.KERNEL32(00000000,00000000,00401AB4), ref: 00401A1B
                              • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,00401AB4), ref: 00401A3A
                              • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00401AB4), ref: 00401A79
                              • RtlLeaveCriticalSection.KERNEL32(0040D41C,00401ABB), ref: 00401AA4
                              • RtlDeleteCriticalSection.KERNEL32(0040D41C,00401ABB), ref: 00401AAE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                              • String ID:
                              • API String ID: 3782394904-0
                              • Opcode ID: 15ada844baba389fd7ade49cb76aeb00e47773f80fc89bec03b8d509a4e9cc02
                              • Instruction ID: 2a1e8c518b16d72ac75c21d19d034316e64e92064156904d4596c6339aa50fda
                              • Opcode Fuzzy Hash: 15ada844baba389fd7ade49cb76aeb00e47773f80fc89bec03b8d509a4e9cc02
                              • Instruction Fuzzy Hash: 65114274B422805ADB11EBE99EC6F5276689785708F44407FF448B62F2C67CA848CB6D

                              Control-flow Graph

                              APIs
                              • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040AD18
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Message
                              • String ID: .tmp$@z@$d~@
                              • API String ID: 2030045667-2080866987
                              • Opcode ID: 2b85bf55d00087c4ee4d3d53e5bb2d438756d7f2ac1061807f4f56549d36f6d1
                              • Instruction ID: dd76c9251985b1ff4450233ddc9785193850427026a6d5c0e90a1b5537d094b7
                              • Opcode Fuzzy Hash: 2b85bf55d00087c4ee4d3d53e5bb2d438756d7f2ac1061807f4f56549d36f6d1
                              • Instruction Fuzzy Hash: 4B419570A046009FD705EFA5DE91A2A77A5EB59304B11447BF804BB7E1CA79AC04CB9D

                              Control-flow Graph

                              APIs
                              • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040AD18
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Message
                              • String ID: .tmp$@z@$d~@
                              • API String ID: 2030045667-2080866987
                              • Opcode ID: 81bdbc4c120031e8217955485f9b4631603aba5f155e491865d52178ba1ca84f
                              • Instruction ID: bf9d77eae5c07405b3109107b1835c74e23881a639ebcc62aff07684a9841850
                              • Opcode Fuzzy Hash: 81bdbc4c120031e8217955485f9b4631603aba5f155e491865d52178ba1ca84f
                              • Instruction Fuzzy Hash: BF419570B006019FD705EFA5DE92A6A77A5EB59304B10447BF804BB7E1CBB9AC04CB9D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 345 403d02-403d10 346 403d12-403d19 345->346 347 403d29-403d30 345->347 348 403ddf-403de5 ExitProcess 346->348 349 403d1f 346->349 350 403d32-403d3c 347->350 351 403d3e-403d45 347->351 349->347 354 403d21-403d23 349->354 350->347 352 403d47-403d51 351->352 353 403db8-403dcc call 403cc8 * 2 call 4019dc 351->353 356 403d56-403d62 352->356 370 403dd1-403dd8 353->370 354->347 358 403dea-403e19 call 4030b4 354->358 356->356 359 403d64-403d6e 356->359 362 403d73-403d84 359->362 362->362 366 403d86-403d8d 362->366 368 403da4-403db3 call 403fe4 call 403f67 366->368 369 403d8f-403da2 MessageBoxA 366->369 368->353 369->353 370->358 372 403dda call 4030b4 370->372 372->348
                              APIs
                              • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                              • ExitProcess.KERNEL32 ref: 00403DE5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ExitMessageProcess
                              • String ID: Error$Runtime error at 00000000
                              • API String ID: 1220098344-2970929446
                              • Opcode ID: 06c1af3a807ed13e53e556f1551eab319716f56e5b0a099a7904d38b73613604
                              • Instruction ID: 19c161ad1fd1f445befe0ff666437f64548d8e35ccd3b0abec794ae5707e41c3
                              • Opcode Fuzzy Hash: 06c1af3a807ed13e53e556f1551eab319716f56e5b0a099a7904d38b73613604
                              • Instruction Fuzzy Hash: 0421C834E152418AE714EFE59A817153E989B5930DF04817BD504B73E3C67C9A4EC36E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 376 401918-40193a RtlInitializeCriticalSection 377 401946-40197c call 4012dc * 3 LocalAlloc 376->377 378 40193c-401941 RtlEnterCriticalSection 376->378 385 4019ad-4019c1 377->385 386 40197e 377->386 378->377 390 4019c3-4019c8 RtlLeaveCriticalSection 385->390 391 4019cd 385->391 387 401983-401995 386->387 387->387 389 401997-4019a6 387->389 389->385 390->391
                              APIs
                              • RtlInitializeCriticalSection.KERNEL32(0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                              • RtlEnterCriticalSection.KERNEL32(0040D41C,0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                              • LocalAlloc.KERNEL32(00000000,00000FF8,0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                              • RtlLeaveCriticalSection.KERNEL32(0040D41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                              • String ID:
                              • API String ID: 730355536-0
                              • Opcode ID: 8414f493d6facd55d67710fc415b07d88c3ef9d9c2abb5a5bebd487d02bb0f40
                              • Instruction ID: ca3d82fa79822ebb621977d4c6345e30539334a4bf25a92a69ec079a2ec9ab95
                              • Opcode Fuzzy Hash: 8414f493d6facd55d67710fc415b07d88c3ef9d9c2abb5a5bebd487d02bb0f40
                              • Instruction Fuzzy Hash: F20192B4E442405EE715ABFA9A56B253BA4D789704F1080BFF044F72F2C67C6458C75D

                              Control-flow Graph

                              APIs
                              • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,004098BF,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409816
                              • GetLastError.KERNEL32(00000000,00000000,?,00000000,004098BF,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040981F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CreateDirectoryErrorLast
                              • String ID: .tmp
                              • API String ID: 1375471231-2986845003
                              • Opcode ID: bcfdd319b68c6234bb3b3c2b6e0791bb6992f3f2d01426f3b13c32e67b0b1ca6
                              • Instruction ID: 48b9f2fdce89366346d31e95a36bae064327856a755920fc8e2ea7d65379a348
                              • Opcode Fuzzy Hash: bcfdd319b68c6234bb3b3c2b6e0791bb6992f3f2d01426f3b13c32e67b0b1ca6
                              • Instruction Fuzzy Hash: 23211575A10208ABDB05FFE5C8529DFB7B9EB48304F10457BE901B73C2DA789E05CAA5

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 487 409978-409989 488 4099d2-4099d7 487->488 489 40998b-40998c 487->489 490 40998e-409991 489->490 491 409993-40999c Sleep 490->491 492 40999e-4099a1 490->492 493 4099ac-4099b1 call 409438 491->493 492->493 494 4099a3-4099a7 Sleep 492->494 496 4099b6-4099b8 493->496 494->493 496->488 497 4099ba-4099c2 GetLastError 496->497 497->488 498 4099c4-4099cc GetLastError 497->498 498->488 499 4099ce-4099d0 498->499 499->488 499->490
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLastSleep
                              • String ID:
                              • API String ID: 1458359878-0
                              • Opcode ID: 1c248293a53693e5016b31d34f136ae5d975e0b827204b722e02cf7f87de802c
                              • Instruction ID: 55ccdd2d2ee1bdbcd31af2ea42c7aee1c1b219f05c386506858fe4dd166fe014
                              • Opcode Fuzzy Hash: 1c248293a53693e5016b31d34f136ae5d975e0b827204b722e02cf7f87de802c
                              • Instruction Fuzzy Hash: 6AF090B2A0511856CA25A6AE9881B6FB28CEAC0368714413FFA44F7383D43DDC0152BA

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 500 401fd4-401fe6 501 401fe8 call 401918 500->501 502 401ffb-402010 500->502 506 401fed-401fef 501->506 504 402012-402017 RtlEnterCriticalSection 502->504 505 40201c-402025 502->505 504->505 507 402027 505->507 508 40202c-402032 505->508 506->502 509 401ff1-401ff6 506->509 507->508 510 402038-40203c 508->510 511 4020cb-4020d1 508->511 514 40214f-402158 509->514 512 402041-402050 510->512 513 40203e 510->513 515 4020d3-4020e0 511->515 516 40211d-40211f call 401ee0 511->516 512->511 517 402052-402060 512->517 513->512 519 4020e2-4020ea 515->519 520 4020ef-40211b call 402f54 515->520 524 402124-40213b 516->524 522 402062-402066 517->522 523 40207c-402080 517->523 519->520 520->514 526 402068 522->526 527 40206b-40207a 522->527 529 402082 523->529 530 402085-4020a0 523->530 531 402147 524->531 532 40213d-402142 RtlLeaveCriticalSection 524->532 526->527 533 4020a2-4020c6 call 402f54 527->533 529->530 530->533 532->531 533->514
                              APIs
                              • RtlEnterCriticalSection.KERNEL32(0040D41C,00000000,00402148), ref: 00402017
                                • Part of subcall function 00401918: RtlInitializeCriticalSection.KERNEL32(0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                • Part of subcall function 00401918: RtlEnterCriticalSection.KERNEL32(0040D41C,0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                • Part of subcall function 00401918: LocalAlloc.KERNEL32(00000000,00000FF8,0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                • Part of subcall function 00401918: RtlLeaveCriticalSection.KERNEL32(0040D41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                              • String ID:
                              • API String ID: 296031713-0
                              • Opcode ID: f63e8093b7c21695f3c5f0f727b66ad92d47f8bd02e6a7dbcfb51ec74dbfdd03
                              • Instruction ID: 72c497f3d878e3d6a4a9583ee00a9bb41c235ef620702b970aaba137d6b92855
                              • Opcode Fuzzy Hash: f63e8093b7c21695f3c5f0f727b66ad92d47f8bd02e6a7dbcfb51ec74dbfdd03
                              • Instruction Fuzzy Hash: 2341C2B2E007019FD710CFA9DE8561A7BA0EB58314B15817BD549B73E1D378A849CB48
                              APIs
                              • DeleteFileA.KERNEL32(00000000,00000000,00409495), ref: 0040946F
                              • GetLastError.KERNEL32(00000000,00000000,00409495), ref: 00409477
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID:
                              • API String ID: 2018770650-0
                              • Opcode ID: cef11d40a142b83803210e371880030b93b56e60c6b6d61991ebac398e5bf5ba
                              • Instruction ID: 3a2bfa3924d7da3ec485a5c2eebce42195f764b2344cc107bbad9e5710e02f6c
                              • Opcode Fuzzy Hash: cef11d40a142b83803210e371880030b93b56e60c6b6d61991ebac398e5bf5ba
                              • Instruction Fuzzy Hash: 3EF0AF71A08608ABCB01EFB59C4159EB3A8EB8831476045BBF808F32C3E6395E018599
                              APIs
                              • SetErrorMode.KERNEL32(00008000), ref: 00407426
                              • LoadLibraryA.KERNEL32(00000000,00000000,00407470,?,00000000,0040748E,?,00008000), ref: 00407455
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLibraryLoadMode
                              • String ID:
                              • API String ID: 2987862817-0
                              • Opcode ID: 7c3291ca482dc4e73124ef6673235b1c1e4da24983ec1cf579c69c8d77eb9c24
                              • Instruction ID: f52ba4a9feec5d4d4615fe406f45eaba014741ff6d770d8a308f032ff20cb8dd
                              • Opcode Fuzzy Hash: 7c3291ca482dc4e73124ef6673235b1c1e4da24983ec1cf579c69c8d77eb9c24
                              • Instruction Fuzzy Hash: 26F08270A14708BEDB025FB68C5282ABAECE749B1475288B6F900A2AD2E53C5820C569
                              APIs
                              • RemoveDirectoryA.KERNEL32(00000000,0040B0F4,Function_00009E00,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040B0A1
                              • DestroyWindow.USER32(000103E6,0040B0F4,Function_00009E00,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040B0B5
                                • Part of subcall function 00409978: Sleep.KERNEL32(?), ref: 00409997
                                • Part of subcall function 00409978: GetLastError.KERNEL32(?), ref: 004099BA
                                • Part of subcall function 00409978: GetLastError.KERNEL32(?), ref: 004099C4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLast$DestroyDirectoryRemoveSleepWindow
                              • String ID:
                              • API String ID: 2192421792-0
                              • Opcode ID: 42b787c3d9f5bd55058fd6c8f85d5fac1abeba9ca40111c3c6816528150393fb
                              • Instruction ID: 80fe6e0f7824975e72fa29ef6d7a10d3d2514edd0f005a574200bdc13b2d30de
                              • Opcode Fuzzy Hash: 42b787c3d9f5bd55058fd6c8f85d5fac1abeba9ca40111c3c6816528150393fb
                              • Instruction Fuzzy Hash: C9F0CD70A105009BD725ABA9EE99B2632E5E7A4305F04453AA110BB2F1C7BD9C88CA8D
                              APIs
                              • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 00407B07
                              • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407B0F
                                • Part of subcall function 00407908: GetLastError.KERNEL32(@z@,004079A6,?,?,020903AC,?,0040AB3B,00000001,00000000,00000002,00000000,0040B132,?,00000000,0040B169), ref: 0040790B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLast$FilePointer
                              • String ID:
                              • API String ID: 1156039329-0
                              • Opcode ID: 1efacffe01c84972d5e79d9e95937cadebc248d177395cf3b78af7fa5ea4bab0
                              • Instruction ID: 2b235249b0a7ee07bcb8c1d8603e448d3cb6330bb11491e7c51f1e2a1a123f33
                              • Opcode Fuzzy Hash: 1efacffe01c84972d5e79d9e95937cadebc248d177395cf3b78af7fa5ea4bab0
                              • Instruction Fuzzy Hash: 13E092767081005FD610E55DC881A9B33DCDFC53A8F004537B654EB1D1D675B8008366
                              APIs
                              • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407ABF
                              • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407ACE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorFileLastRead
                              • String ID:
                              • API String ID: 1948546556-0
                              • Opcode ID: 62bc4757170e124d293d2e1ae2527044cf5abdc53c736f625f33b9d4ecf98daf
                              • Instruction ID: e15dfe76c2c2153dd18fa5b66318eead10a3336b01bc7908bb5745e2d55223c8
                              • Opcode Fuzzy Hash: 62bc4757170e124d293d2e1ae2527044cf5abdc53c736f625f33b9d4ecf98daf
                              • Instruction Fuzzy Hash: DAE092A17181106EEB20A65E9884F6B67DCCBC9314F04817BF508EB282D6B8DC008777
                              APIs
                              • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 00407A57
                              • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 00407A63
                                • Part of subcall function 00407908: GetLastError.KERNEL32(@z@,004079A6,?,?,020903AC,?,0040AB3B,00000001,00000000,00000002,00000000,0040B132,?,00000000,0040B169), ref: 0040790B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLast$FilePointer
                              • String ID:
                              • API String ID: 1156039329-0
                              • Opcode ID: 0f363b337b605630cba33b2c75e34e58c088fa0b570b5e63e1fb747f55acf4b7
                              • Instruction ID: b2e9c79a061d94bc6c1ac4e6a69a759f2ef78579472dc31f5d333ffaff30462c
                              • Opcode Fuzzy Hash: 0f363b337b605630cba33b2c75e34e58c088fa0b570b5e63e1fb747f55acf4b7
                              • Instruction Fuzzy Hash: C7E01AB1A002109EEB20EBB58981B5662D89B44364B048576A654DB2C6D274E800CB66
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                              • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Virtual$AllocFree
                              • String ID:
                              • API String ID: 2087232378-0
                              • Opcode ID: e3bf9ef34a83e5b8d51b462a41b7d68ce2248d991abf67c6f3f1ae437811ef8b
                              • Instruction ID: 66c3474f10fe082fedccbde799efe3bb5b58ff080b56d2e089ed954f0af67306
                              • Opcode Fuzzy Hash: e3bf9ef34a83e5b8d51b462a41b7d68ce2248d991abf67c6f3f1ae437811ef8b
                              • Instruction Fuzzy Hash: DAF02772B0032017DB2069AA0CC1B536AC59F85B90F1540BBFA4CFF3F9D2B98C0442A9
                              APIs
                              • GetSystemDefaultLCID.KERNEL32(00000000,00405806), ref: 004056EF
                                • Part of subcall function 0040512C: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00405149
                                • Part of subcall function 0040565C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040D4C0,00000001,?,00405727,?,00000000,00405806), ref: 0040567A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: DefaultInfoLoadLocaleStringSystem
                              • String ID:
                              • API String ID: 1658689577-0
                              • Opcode ID: cc3e47e390c1b33211b3d9873ad613d49b391b3cefde462b73c2cd7d0ab13d86
                              • Instruction ID: 82c784cd7830e1ca4cd44457dad2f2fa429cf4e25a926eea24d274db27b93b1b
                              • Opcode Fuzzy Hash: cc3e47e390c1b33211b3d9873ad613d49b391b3cefde462b73c2cd7d0ab13d86
                              • Instruction Fuzzy Hash: C1316F75E00509ABCB00EF95CC819EEB379FF84304F508577E819BB285E739AE058B98
                              APIs
                              • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00407A34
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 5bc26aafbd8d3cc7e99f1b4789c5f450247a7b7967715b9db18694e2d0d8c5c5
                              • Instruction ID: 042ae40820150c0b4851109f40d588701a9899a67d40570aa5757512981d293a
                              • Opcode Fuzzy Hash: 5bc26aafbd8d3cc7e99f1b4789c5f450247a7b7967715b9db18694e2d0d8c5c5
                              • Instruction Fuzzy Hash: 6FE0ED753442586EE340DAED6D81FA677DC974A714F008132B998DB382D4719D118BA8
                              APIs
                              • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00407A34
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: b99464c5deed90c436ccb8039285842caa459c4cfee6896295820f2cd2136feb
                              • Instruction ID: 8ced2eed2e357b00b36525f681a949bcf9e14530d7ff6951507f50c56b932d1f
                              • Opcode Fuzzy Hash: b99464c5deed90c436ccb8039285842caa459c4cfee6896295820f2cd2136feb
                              • Instruction Fuzzy Hash: 95E0ED753442586EE240DAED6D81F96779C974A714F008122B998DB382D4719D118BA8
                              APIs
                              • GetFileAttributesA.KERNEL32(00000000,00000000,00406E74,?,?,?,?,00000000,?,00406E89,004071E3,00000000,00407228,?,?,?), ref: 00406E57
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 8e258e6088ff2729972a65b025d9916a43b1951ab399dc39633550a2ec6328db
                              • Instruction ID: 5d103c24ca312c86e291a35865c809fd23e08ae6a8f6832d02acb9ca341f4446
                              • Opcode Fuzzy Hash: 8e258e6088ff2729972a65b025d9916a43b1951ab399dc39633550a2ec6328db
                              • Instruction Fuzzy Hash: ADE0E530300308BBD301EE72DC42D0ABBACDB89704B920476B400A26C2D5785E108068
                              APIs
                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00407B5B
                                • Part of subcall function 00407908: GetLastError.KERNEL32(@z@,004079A6,?,?,020903AC,?,0040AB3B,00000001,00000000,00000002,00000000,0040B132,?,00000000,0040B169), ref: 0040790B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID:
                              • API String ID: 442123175-0
                              • Opcode ID: 006c08a2f5d9871c0a1980147acda0c26795bf6e192fd3a261290223f417e960
                              • Instruction ID: 30ae2be02b9f15b9cba2c15a2490e5271afae9e105f225727eb8a6e5b17a7771
                              • Opcode Fuzzy Hash: 006c08a2f5d9871c0a1980147acda0c26795bf6e192fd3a261290223f417e960
                              • Instruction Fuzzy Hash: 3FE06D727081106BD710A65A98C0E5777ECCF85764F00403BB608DB281C574AC01867A
                              APIs
                              • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004095C3,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0040771F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FormatMessage
                              • String ID:
                              • API String ID: 1306739567-0
                              • Opcode ID: b9ec76e9ce0cf7c9b11fbb0d22c3d5372d7ad8be8fd57ca1cb8678c9dba0653c
                              • Instruction ID: cd8e50964804133df0be52219a4bf40107040f8cbf32d452899ff663d46cfc84
                              • Opcode Fuzzy Hash: b9ec76e9ce0cf7c9b11fbb0d22c3d5372d7ad8be8fd57ca1cb8678c9dba0653c
                              • Instruction Fuzzy Hash: 7CE04FB1B8830126F62519545C87F7B164E47C0B84F64403B7B50EE3D2DABEB94B429F
                              APIs
                              • SetEndOfFile.KERNEL32(?,020A8000,0040AEF9,00000000), ref: 00407B2F
                                • Part of subcall function 00407908: GetLastError.KERNEL32(@z@,004079A6,?,?,020903AC,?,0040AB3B,00000001,00000000,00000002,00000000,0040B132,?,00000000,0040B169), ref: 0040790B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorFileLast
                              • String ID:
                              • API String ID: 734332943-0
                              • Opcode ID: 879c3aef20c26933657ab209da42f9acde188edf801b45e7798529f352953bc6
                              • Instruction ID: c094c2b5ec81b014f7647aed55f46f5be6f6c9eff784118cc89584b894c57cec
                              • Opcode Fuzzy Hash: 879c3aef20c26933657ab209da42f9acde188edf801b45e7798529f352953bc6
                              • Instruction Fuzzy Hash: AFC04CB1B141045BDB00A6AA85C2A1672DC5A482083404076B504DB247D678F8504755
                              APIs
                              • SetErrorMode.KERNEL32(?,00407495), ref: 00407488
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorMode
                              • String ID:
                              • API String ID: 2340568224-0
                              • Opcode ID: 3513d2af45e6240a0d0531d222129c39ee3681c2f506e4d79ab3159715fa7836
                              • Instruction ID: fee884e8913e26ea2b20a1c4334648daa9a2c142b99fe0c27f31eb53e83e856d
                              • Opcode Fuzzy Hash: 3513d2af45e6240a0d0531d222129c39ee3681c2f506e4d79ab3159715fa7836
                              • Instruction Fuzzy Hash: C6B09B76A0C2006DE705DEE5645153877D4D7C47103B14877F100D65C1D93C94108519
                              APIs
                              • SetErrorMode.KERNEL32(?,00407495), ref: 00407488
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorMode
                              • String ID:
                              • API String ID: 2340568224-0
                              • Opcode ID: a150b1ccc28004dcf137bb0f7729195edfbe3cd1821f17504bb802deebb031e2
                              • Instruction ID: c7febe38ef9f985557de65a49c8e3beabd1cb56d23a205183508381f5ecd03fa
                              • Opcode Fuzzy Hash: a150b1ccc28004dcf137bb0f7729195edfbe3cd1821f17504bb802deebb031e2
                              • Instruction Fuzzy Hash: EEA022A8C08008BACE00EEE88080A3C33A82A883003C008E23200B2082C03CE000820B
                              APIs
                              • CharPrevA.USER32(?,?,00406DBC,?,00406A99,?,?,0040959C,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004095DE), ref: 00406DC2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CharPrev
                              • String ID:
                              • API String ID: 122130370-0
                              • Opcode ID: d44d7a6884596ca32ea416b380b4e8946229468d7e659b1743621721cd4621d4
                              • Instruction ID: 95ac89871b9e49aa2ffc5daef894b278f4bc9d8aafa7dca88aae54a0e9e7edad
                              • Opcode Fuzzy Hash: d44d7a6884596ca32ea416b380b4e8946229468d7e659b1743621721cd4621d4
                              • Instruction Fuzzy Hash:
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0040841C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 4fb7b38294bdf3fcfaab8189c6b2d31175aea6f156bf412ec83bea8fb86574a1
                              • Instruction ID: 68aadeca7c52aa1374545c41b60170f14cbd4c45bc0c673343149efe9cc76684
                              • Opcode Fuzzy Hash: 4fb7b38294bdf3fcfaab8189c6b2d31175aea6f156bf412ec83bea8fb86574a1
                              • Instruction Fuzzy Hash: 7B116D716042059BDB00EF19C981B4B37A4AF84359F04847EF998AF2C7DF78D8058B6A
                              APIs
                              • VirtualFree.KERNEL32(00000000,00000000,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FreeVirtual
                              • String ID:
                              • API String ID: 1263568516-0
                              • Opcode ID: ae0a35522eec5974c246f826a8cf4d5dbbbccf5172876aab042d95c32cb5ff07
                              • Instruction ID: d2bd3e7102ef9204b91f8816383c595cec19663beeae75bd92b4ab4675e4226e
                              • Opcode Fuzzy Hash: ae0a35522eec5974c246f826a8cf4d5dbbbccf5172876aab042d95c32cb5ff07
                              • Instruction Fuzzy Hash: E401F772A042104BC310AF28DDC092A77D4DB84324F19497ED985B73A1D23B7C0587A8
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID:
                              • API String ID: 2962429428-0
                              • Opcode ID: b39bb4760bd10523e8477a282be401f25cebef3596302d631dfd489199f81fc2
                              • Instruction ID: 1333f047c66b0d9688efca9d11da816c999e90cdcd736c06211d3ba452c28d9f
                              • Opcode Fuzzy Hash: b39bb4760bd10523e8477a282be401f25cebef3596302d631dfd489199f81fc2
                              • Instruction Fuzzy Hash: B4D0A7D1B00A6007E315F2BF498964B92C85F88655F08843BF685E73D1D67CAC00D38D
                              APIs
                              • VirtualFree.KERNEL32(?,00000000,00008000,?,00408319), ref: 0040834B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FreeVirtual
                              • String ID:
                              • API String ID: 1263568516-0
                              • Opcode ID: 230c808500062b5c35cb01985a317edf3050be8cd861299b6b1c2025d975cd45
                              • Instruction ID: 2902acfab023b9b2f0de86f7a78627cda5d54dfc4b924a21aa22279fbea0049e
                              • Opcode Fuzzy Hash: 230c808500062b5c35cb01985a317edf3050be8cd861299b6b1c2025d975cd45
                              • Instruction Fuzzy Hash: 64D002B17553046FDB90EEB94DC5B0237D87B48700F14457A6E44EB2C6F775D8008B14
                              APIs
                              • GetCurrentProcess.KERNEL32(00000028), ref: 004098F7
                              • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004098FD
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409916
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 0040993D
                              • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 00409942
                              • ExitWindowsEx.USER32(00000002,00000000), ref: 00409953
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                              • String ID: SeShutdownPrivilege
                              • API String ID: 107509674-3733053543
                              • Opcode ID: 76c26366ab73d400da16d1d616fb3f23b1dfff142f9860e5fbeddd1887b8e56a
                              • Instruction ID: c716305aa6b255ea0f8bf04b803605974c64d9a32ef9e4c16490a57abd096404
                              • Opcode Fuzzy Hash: 76c26366ab73d400da16d1d616fb3f23b1dfff142f9860e5fbeddd1887b8e56a
                              • Instruction Fuzzy Hash: 17F062B0284302B6E610AAB18C07F2722885B81B18F40493EB711F52C3D7BDD904866F
                              APIs
                              • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 0040A0DE
                              • SizeofResource.KERNEL32(00000000,00000000,?,0040AB53,00000000,0040B0EA,?,00000001,00000000,00000002,00000000,0040B132,?,00000000,0040B169), ref: 0040A0F1
                              • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,0040AB53,00000000,0040B0EA,?,00000001,00000000,00000002,00000000,0040B132,?,00000000), ref: 0040A103
                              • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040AB53,00000000,0040B0EA,?,00000001,00000000,00000002,00000000,0040B132), ref: 0040A114
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Resource$FindLoadLockSizeof
                              • String ID:
                              • API String ID: 3473537107-0
                              • Opcode ID: 5a5895066e8623d9c04d621fb25767811aface55f1ffab09d7e5ea7dbda8e6a9
                              • Instruction ID: 6e0ad9993521ca4487a6dc9182c9ec88a9d7ecf9898e216691337b01ea42cf55
                              • Opcode Fuzzy Hash: 5a5895066e8623d9c04d621fb25767811aface55f1ffab09d7e5ea7dbda8e6a9
                              • Instruction Fuzzy Hash: 92E0EA9078970725EAA136E608D6B6B10884BB578EF40113ABB14B92C3DDBC8C14516E
                              APIs
                              • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004058AA,?,?,?,00000000,00405A5C), ref: 004056BB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: InfoLocale
                              • String ID:
                              • API String ID: 2299586839-0
                              • Opcode ID: 6c93c86b5f3b9f7a8269726404ed0fa1fa14f48feaf77c0ba1f6e5dd371dd8fd
                              • Instruction ID: 0ac2273093169a9723f5a49d7def2a1a0e4efde15c2d8dcba0568209acb81ea7
                              • Opcode Fuzzy Hash: 6c93c86b5f3b9f7a8269726404ed0fa1fa14f48feaf77c0ba1f6e5dd371dd8fd
                              • Instruction Fuzzy Hash: 34D05EA631E6502AE310519B2D85EBB4EACCAC57A4F54483BF64CD7252D2248C069776
                              APIs
                              • GetSystemTime.KERNEL32(?), ref: 004026CE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: SystemTime
                              • String ID:
                              • API String ID: 2656138-0
                              • Opcode ID: 9ed56ef6959dd8920af8b6d924cbc2bc4732ada3ba303b98172f22f33df6bd3d
                              • Instruction ID: 8398a6df79db6557de4560d78939933842e781e1ed99b38cfbf2fd723ed8f470
                              • Opcode Fuzzy Hash: 9ed56ef6959dd8920af8b6d924cbc2bc4732ada3ba303b98172f22f33df6bd3d
                              • Instruction Fuzzy Hash: 3BE04F21E0010A42C704ABA5CD435FDF7AEAB95604F044172A418E92E0F631C252C748
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                              • Instruction ID: 388b29b0a79f5f19ed4b4953a6a76f47c3e14b9604a8131d453ab3a085cd796f
                              • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                              • Instruction Fuzzy Hash: BC32E675E04219DFCB14CF99CA80A9DBBB2BF88314F24816AD855B7385DB34AE42CF54
                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,004075A5,?,00000000,00409DB8), ref: 004074C9
                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004074CF
                              • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004075A5,?,00000000,00409DB8), ref: 0040751D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressCloseHandleModuleProc
                              • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                              • API String ID: 4190037839-2401316094
                              • Opcode ID: 7c066b870a361991bc0752fcd93cb8768e255443e349242cb7f15e42003cd7d9
                              • Instruction ID: b0f7b576ff72b1c2059ac61aa9c71175e867ef76c41006bc9f97b140b7c9741a
                              • Opcode Fuzzy Hash: 7c066b870a361991bc0752fcd93cb8768e255443e349242cb7f15e42003cd7d9
                              • Instruction Fuzzy Hash: 02215470E04209BBDB00EAE5CC55ADE77A8AB44304F508877A900F36C1E77CBA01C75A
                              APIs
                              • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                              • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                              • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                              • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                              • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                              • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                              • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                              • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                              • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                              • String ID:
                              • API String ID: 1694776339-0
                              • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                              • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                              • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                              • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                              APIs
                              • GetSystemDefaultLCID.KERNEL32(00000000,00405A5C,?,?,?,?,00000000,00000000,00000000,?,00406A3B,00000000,00406A4E), ref: 0040582E
                                • Part of subcall function 0040565C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040D4C0,00000001,?,00405727,?,00000000,00405806), ref: 0040567A
                                • Part of subcall function 004056A8: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004058AA,?,?,?,00000000,00405A5C), ref: 004056BB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: InfoLocale$DefaultSystem
                              • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                              • API String ID: 1044490935-665933166
                              • Opcode ID: f64dfcc9beea8e06f9a7216c135bb3ef8748e57adf0d60dccc58cc6af9805412
                              • Instruction ID: 1f8fb3564ea85801462352e9f704d9e8acf1e4fd8595550e023c4eac14c4b858
                              • Opcode Fuzzy Hash: f64dfcc9beea8e06f9a7216c135bb3ef8748e57adf0d60dccc58cc6af9805412
                              • Instruction Fuzzy Hash: 2B513E34B006486BDB00FAA58C81A8F77A9DB99304F50857BA515BB3C6CA3DDA098F5C
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                              • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                              • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$AllocString
                              • String ID:
                              • API String ID: 262959230-0
                              • Opcode ID: a67f2483392f3a9295a6f421ec51b00ba0520a603cf3575c2b5e933881db78c1
                              • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                              • Opcode Fuzzy Hash: a67f2483392f3a9295a6f421ec51b00ba0520a603cf3575c2b5e933881db78c1
                              • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                              APIs
                              • MessageBoxA.USER32(00000000,00000000,Setup,00000010), ref: 0040A15D
                              Strings
                              • The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si, xrefs: 0040A141
                              • Setup, xrefs: 0040A14D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Message
                              • String ID: Setup$The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si
                              • API String ID: 2030045667-3271211647
                              • Opcode ID: ff94df1eb2564fec58b9a221cc3fe3b9cf965a2b136f430670f36a0b3f2e2132
                              • Instruction ID: 9b5d989b58a55d658cadae164e54e3781760331d38193a884cd145b826483737
                              • Opcode Fuzzy Hash: ff94df1eb2564fec58b9a221cc3fe3b9cf965a2b136f430670f36a0b3f2e2132
                              • Instruction Fuzzy Hash: 87E065302443087EE312EA629C13F5E7BACE789B54F614477F500B55C1D6795E10D46D
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,0040AAAE), ref: 004030E3
                              • GetCommandLineA.KERNEL32(00000000,0040AAAE), ref: 004030EE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1468243217.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1468229563.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468258266.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1468271776.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CommandHandleLineModule
                              • String ID: U1hd.@
                              • API String ID: 2123368496-2904493091
                              • Opcode ID: 4ac654993ecb6f0c10b1cacd39e13426f3fb1ace3b4aa0046ecf3c9b516135ec
                              • Instruction ID: daea45a2aa12e23edc1a75ca5ccfa9dec32d0aab9986280789c112b27ba3568a
                              • Opcode Fuzzy Hash: 4ac654993ecb6f0c10b1cacd39e13426f3fb1ace3b4aa0046ecf3c9b516135ec
                              • Instruction Fuzzy Hash: 3AC0027894134055D764AFF69E497047594A74930DF40443FA20C7A1F1D67C460A6BDD

                              Execution Graph

                              Execution Coverage:5.6%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:6.6%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:80
                              execution_graph 50051 42f9c0 50052 42f9cb 50051->50052 50053 42f9cf NtdllDefWindowProc_A 50051->50053 50053->50052 50054 40d084 50057 407360 WriteFile 50054->50057 50058 40737d 50057->50058 50059 4913c0 50060 491402 50059->50060 50061 49142d 50060->50061 50062 491404 50060->50062 50065 4914b9 50061->50065 50066 49143c 50061->50066 50063 447498 32 API calls 50062->50063 50064 491413 50063->50064 50379 455c34 24 API calls 50064->50379 50074 4914c8 50065->50074 50075 491502 50065->50075 50381 4473f0 32 API calls 50066->50381 50069 49141b 50380 447570 19 API calls 50069->50380 50071 491448 50072 49148c 50071->50072 50073 49144c 50071->50073 50076 447498 32 API calls 50072->50076 50077 49145f 50073->50077 50078 491455 50073->50078 50079 447498 32 API calls 50074->50079 50086 491511 50075->50086 50087 491577 50075->50087 50080 49149d 50076->50080 50083 447498 32 API calls 50077->50083 50382 453aac 18 API calls 50078->50382 50084 4914e0 50079->50084 50385 454fdc 44 API calls 50080->50385 50089 491470 50083->50089 50090 44743c 32 API calls 50084->50090 50388 4473f0 32 API calls 50086->50388 50102 4915cf 50087->50102 50103 491586 50087->50103 50383 454fdc 44 API calls 50089->50383 50091 4914f0 50090->50091 50387 455e10 9 API calls 50091->50387 50092 4914a7 50386 447570 19 API calls 50092->50386 50098 49151f 50389 4473f0 32 API calls 50098->50389 50100 49147a 50384 447570 19 API calls 50100->50384 50109 4915f9 50102->50109 50110 4915de 50102->50110 50105 447498 32 API calls 50103->50105 50107 49159b 50105->50107 50106 49152e 50108 447498 32 API calls 50106->50108 50111 447498 32 API calls 50107->50111 50112 491546 50108->50112 50120 491608 50109->50120 50121 491645 50109->50121 50447 455cfc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetComputerNameA 50110->50447 50114 4915ae 50111->50114 50390 4473f0 32 API calls 50112->50390 50427 453f18 50114->50427 50116 4915e6 50448 4477ec 19 API calls 50116->50448 50118 491558 50391 454868 50118->50391 50125 447498 32 API calls 50120->50125 50129 49168c 50121->50129 50130 491654 50121->50130 50124 491565 50426 447570 19 API calls 50124->50426 50128 491617 50125->50128 50449 4553a8 36 API calls 50128->50449 50137 4916a8 50129->50137 50138 49169b 50129->50138 50452 48e2a8 32 API calls 50130->50452 50133 491627 50450 452a2c 18 API calls 50133->50450 50134 491663 50453 452a2c 18 API calls 50134->50453 50136 491632 50451 4477ec 19 API calls 50136->50451 50142 4916f4 50137->50142 50143 4916b7 50137->50143 50455 48e1fc 33 API calls 50138->50455 50148 49173b 50142->50148 50149 491703 50142->50149 50145 447498 32 API calls 50143->50145 50144 491679 50454 4477ec 19 API calls 50144->50454 50147 4916c6 50145->50147 50456 455450 36 API calls 50147->50456 50155 49174a 50148->50155 50156 491757 50148->50156 50459 48e2a8 32 API calls 50149->50459 50152 4916d6 50457 431618 18 API calls 50152->50457 50153 491712 50460 431618 18 API calls 50153->50460 50462 48e1fc 33 API calls 50155->50462 50161 49176a 50156->50161 50162 49182d 50156->50162 50157 4916e1 50458 4477ec 19 API calls 50157->50458 50164 447498 32 API calls 50161->50164 50167 49183c 50162->50167 50168 491857 50162->50168 50163 491728 50461 4477ec 19 API calls 50163->50461 50166 49177d 50164->50166 50463 4565a8 27 API calls 50166->50463 50469 455d38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetUserNameA 50167->50469 50178 49186a 50168->50178 50185 4918ec 50168->50185 50171 49178d 50173 49181b 50171->50173 50174 491795 50171->50174 50172 491844 50470 4477ec 19 API calls 50172->50470 50468 447570 19 API calls 50173->50468 50464 4473f0 32 API calls 50174->50464 50471 4473f0 32 API calls 50178->50471 50179 491487 50180 491428 50179->50180 50505 403420 50180->50505 50182 491875 50183 491879 50182->50183 50184 4918bc 50182->50184 50186 49188c 50183->50186 50472 453aac 18 API calls 50183->50472 50187 447498 32 API calls 50184->50187 50194 49190e 50185->50194 50206 491a36 50185->50206 50189 447498 32 API calls 50186->50189 50191 4918cb 50187->50191 50192 49189b 50189->50192 50190 4917a3 50465 447850 19 API calls 50190->50465 50475 4473f0 32 API calls 50191->50475 50473 4473f0 32 API calls 50192->50473 50193 49192e 50322 447498 50193->50322 50194->50193 50477 48e164 33 API calls 50194->50477 50200 4918dd 50476 454c90 43 API calls 50200->50476 50201 4918ad 50474 454c90 43 API calls 50201->50474 50202 4917f8 50466 447850 19 API calls 50202->50466 50215 491a58 50206->50215 50218 491b8e 50206->50218 50210 491809 50467 447570 19 API calls 50210->50467 50211 491a11 50479 447570 19 API calls 50211->50479 50212 491953 50333 42fa00 50212->50333 50214 491a78 50220 447498 32 API calls 50214->50220 50215->50214 50481 48e164 33 API calls 50215->50481 50226 491bcb 50218->50226 50227 491b9d 50218->50227 50223 491a89 50220->50223 50222 491a1e 50480 447718 19 API calls 50222->50480 50228 42ca58 21 API calls 50223->50228 50224 447498 32 API calls 50229 491981 50224->50229 50241 491bda 50226->50241 50242 491c00 50226->50242 50230 447498 32 API calls 50227->50230 50231 491a97 50228->50231 50232 447498 32 API calls 50229->50232 50233 491bac 50230->50233 50234 491b69 50231->50234 50235 491a9f 50231->50235 50236 491996 50232->50236 50486 45553c 30 API calls 50233->50486 50484 447570 19 API calls 50234->50484 50238 42fa00 28 API calls 50235->50238 50349 44743c 50236->50349 50244 491aab 50238->50244 50488 455e74 43 API calls 50241->50488 50253 491c4a 50242->50253 50254 491c0f 50242->50254 50243 491bb9 50487 447570 19 API calls 50243->50487 50249 447498 32 API calls 50244->50249 50246 491b76 50485 447718 19 API calls 50246->50485 50255 491acd 50249->50255 50250 44743c 32 API calls 50256 4919b7 50250->50256 50252 491be2 50489 452a2c 18 API calls 50252->50489 50266 491c59 50253->50266 50267 491c95 50253->50267 50259 447498 32 API calls 50254->50259 50260 447498 32 API calls 50255->50260 50353 479034 50256->50353 50258 491bed 50490 4477ec 19 API calls 50258->50490 50263 491c1e 50259->50263 50264 491ae2 50260->50264 50491 4473f0 32 API calls 50263->50491 50269 44743c 32 API calls 50264->50269 50265 4919d1 50478 447570 19 API calls 50265->50478 50494 4473f0 32 API calls 50266->50494 50281 491d22 50267->50281 50282 491ca4 50267->50282 50273 491af4 50269->50273 50272 491c30 50492 455c44 36 API calls 50272->50492 50275 44743c 32 API calls 50273->50275 50274 4919de 50278 491b03 50275->50278 50276 491c67 50279 447498 32 API calls 50276->50279 50283 447498 32 API calls 50278->50283 50284 491c77 50279->50284 50280 491c38 50493 447570 19 API calls 50280->50493 50293 491d5d 50281->50293 50294 491d31 50281->50294 50497 4473f0 32 API calls 50282->50497 50288 491b1c 50283->50288 50495 4473f0 32 API calls 50284->50495 50287 491cc0 50290 447498 32 API calls 50287->50290 50482 47915c 50 API calls 50288->50482 50295 491cd2 50290->50295 50292 491c86 50496 458b1c 72 API calls 50292->50496 50303 491d6c 50293->50303 50312 491d9d 50293->50312 50298 447498 32 API calls 50294->50298 50498 4473f0 32 API calls 50295->50498 50296 491b29 50483 447570 19 API calls 50296->50483 50301 491d40 50298->50301 50305 447498 32 API calls 50301->50305 50302 491ce2 50499 458b1c 72 API calls 50302->50499 50308 447498 32 API calls 50303->50308 50304 491b36 50306 491d52 50305->50306 50501 456538 RegOpenKeyExA RegDeleteValueA RegCloseKey RemoveFontResourceA SendNotifyMessageA 50306->50501 50311 491d7b 50308->50311 50310 491cec 50500 447570 19 API calls 50310->50500 50314 447498 32 API calls 50311->50314 50312->50180 50315 447498 32 API calls 50312->50315 50316 491d8d 50314->50316 50317 491dbb 50315->50317 50502 454498 55 API calls 50316->50502 50503 45699c 27 API calls 50317->50503 50320 491dc8 50504 447570 19 API calls 50320->50504 50323 4474a0 50322->50323 50513 436518 50323->50513 50325 4474bf 50326 42ca58 50325->50326 50634 42ce50 50326->50634 50329 42ce50 21 API calls 50330 42ca8c 50329->50330 50331 403420 4 API calls 50330->50331 50332 42cab1 50331->50332 50332->50211 50332->50212 50334 42fa0c 50333->50334 50335 42fa2f GetActiveWindow GetFocus 50334->50335 50650 41f2f4 GetCurrentThreadId EnumThreadWindows 50335->50650 50338 42fa63 50340 42faf2 SetFocus 50338->50340 50341 42fa71 CreateWindowExA 50338->50341 50339 42fa53 RegisterClassA 50339->50338 50342 403400 4 API calls 50340->50342 50341->50340 50343 42faa4 50341->50343 50344 42fb0e 50342->50344 50652 4246cc 50343->50652 50344->50224 50346 42facc 50347 42fad4 CreateWindowExA 50346->50347 50347->50340 50348 42faea ShowWindow 50347->50348 50348->50340 50350 447440 50349->50350 50658 43643c 50350->50658 50352 44745a 50352->50250 50354 479064 50353->50354 50355 47905b 50353->50355 50672 455778 50354->50672 50355->50354 50356 47908b 50355->50356 50714 478d50 19 API calls 50356->50714 50360 403400 4 API calls 50362 479147 50360->50362 50361 4790b4 50715 478d64 19 API calls 50361->50715 50362->50265 50364 4790be 50716 478d64 19 API calls 50364->50716 50366 4790c8 50717 478d64 19 API calls 50366->50717 50368 4790d3 50718 478d50 19 API calls 50368->50718 50370 4790e0 50719 478d50 19 API calls 50370->50719 50372 4790eb 50720 4076d0 19 API calls 50372->50720 50374 4790f3 50721 478d64 19 API calls 50374->50721 50376 4790fe 50722 478eb4 41 API calls 50376->50722 50378 479112 50378->50265 50379->50069 50380->50180 50381->50071 50382->50077 50383->50100 50384->50179 50385->50092 50386->50179 50387->50179 50388->50098 50389->50106 50390->50118 50392 4548aa 50391->50392 50401 454ab5 50391->50401 50393 4548bb 50392->50393 50767 453364 50392->50767 50397 4548e6 50393->50397 50398 4548c9 50393->50398 50393->50401 50394 454acb 50395 403400 4 API calls 50394->50395 50400 454b0c 50395->50400 50814 42cda4 19 API calls 50397->50814 50789 42c84c 50398->50789 50405 403400 4 API calls 50400->50405 50401->50394 50782 453554 50401->50782 50404 4548f1 50407 403494 4 API calls 50404->50407 50408 454b14 50405->50408 50406 4548d4 50799 4035c0 50406->50799 50410 4548e4 50407->50410 50411 403420 4 API calls 50408->50411 50775 4531a4 50410->50775 50413 454b21 50411->50413 50413->50124 50414 45490d 50414->50401 50420 45491a 50414->50420 50415 454a7f FindNextFileA 50416 454a97 FindClose 50415->50416 50415->50420 50416->50124 50417 403494 4 API calls 50422 454977 50417->50422 50418 403494 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50418->50420 50420->50415 50420->50416 50420->50418 50421 40357c 18 API calls 50420->50421 50420->50422 50424 454868 32 API calls 50420->50424 50830 45304c 50420->50830 50421->50420 50422->50417 50815 40357c 50422->50815 50829 4535cc Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection SetFileAttributesA GetLastError 50422->50829 50424->50420 50426->50180 50428 453f38 50427->50428 50429 42c84c 19 API calls 50428->50429 50430 453f51 50429->50430 50431 403494 4 API calls 50430->50431 50434 453f5c 50431->50434 50436 403634 18 API calls 50434->50436 50439 453fd8 50434->50439 50856 453ea4 50434->50856 50864 453134 50434->50864 50872 42d010 50434->50872 50882 451b9c 18 API calls 50434->50882 50883 40905c 18 API calls 50434->50883 50436->50434 50440 403494 4 API calls 50439->50440 50441 453fe3 50440->50441 50442 403420 4 API calls 50441->50442 50443 453ffd 50442->50443 50444 403400 4 API calls 50443->50444 50445 454005 50444->50445 50446 4477ec 19 API calls 50445->50446 50446->50180 50447->50116 50448->50179 50449->50133 50450->50136 50451->50180 50452->50134 50453->50144 50454->50180 50455->50180 50456->50152 50457->50157 50458->50180 50459->50153 50460->50163 50461->50180 50462->50180 50463->50171 50464->50190 50465->50202 50466->50210 50467->50179 50468->50179 50469->50172 50470->50180 50471->50182 50472->50186 50473->50201 50474->50180 50475->50200 50476->50180 50477->50193 50478->50274 50479->50222 50480->50180 50481->50214 50482->50296 50483->50304 50484->50246 50485->50180 50486->50243 50487->50179 50488->50252 50489->50258 50490->50180 50491->50272 50492->50280 50493->50180 50494->50276 50495->50292 50496->50180 50497->50287 50498->50302 50499->50310 50500->50180 50501->50179 50502->50180 50503->50320 50504->50180 50506 403426 50505->50506 50507 40344b 50506->50507 50914 402660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50506->50914 50509 403400 50507->50509 50510 403406 50509->50510 50511 40341f 50509->50511 50510->50511 50915 402660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50510->50915 50514 436524 50513->50514 50515 436546 50513->50515 50514->50515 50535 40905c 18 API calls 50514->50535 50516 4365c9 50515->50516 50518 4365b1 50515->50518 50519 4365a5 50515->50519 50520 436599 50515->50520 50521 43658d 50515->50521 50522 4365bd 50515->50522 50550 40905c 18 API calls 50516->50550 50545 403494 50518->50545 50539 40352c 50519->50539 50524 403510 18 API calls 50520->50524 50536 403510 50521->50536 50549 4040e8 32 API calls 50522->50549 50530 4365a2 50524->50530 50529 4365da 50529->50325 50530->50325 50533 4365c6 50533->50325 50535->50515 50551 4034e0 50536->50551 50542 4034e0 50539->50542 50540 4034bc 18 API calls 50541 4034f0 50540->50541 50543 403400 4 API calls 50541->50543 50542->50540 50544 403508 50543->50544 50544->50325 50547 403498 50545->50547 50546 4034ba 50546->50325 50547->50546 50633 402660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50547->50633 50549->50533 50550->50529 50556 4034bc 50551->50556 50553 4034f0 50554 403400 4 API calls 50553->50554 50555 403508 50554->50555 50555->50325 50557 4034c0 50556->50557 50558 4034dc 50556->50558 50561 402648 50557->50561 50558->50553 50560 4034c9 50560->50553 50562 40264c 50561->50562 50564 402656 50561->50564 50567 402088 50562->50567 50563 402652 50563->50564 50578 4033bc 50563->50578 50564->50560 50564->50564 50568 40209c 50567->50568 50571 4020a1 50567->50571 50586 4019cc RtlInitializeCriticalSection 50568->50586 50570 4020c6 RtlEnterCriticalSection 50572 4020d0 50570->50572 50571->50570 50571->50572 50575 4020a5 50571->50575 50572->50575 50593 401f94 50572->50593 50575->50563 50576 4021f1 RtlLeaveCriticalSection 50577 4021fb 50576->50577 50577->50563 50579 4033f4 TlsGetValue 50578->50579 50580 4033cc 50578->50580 50581 4033d7 50579->50581 50582 4033fe 50579->50582 50580->50564 50632 403374 LocalAlloc TlsSetValue 50581->50632 50582->50564 50584 4033dc TlsGetValue 50585 4033ec 50584->50585 50585->50564 50587 4019f0 RtlEnterCriticalSection 50586->50587 50588 4019fa 50586->50588 50587->50588 50589 401a18 LocalAlloc 50588->50589 50590 401a32 50589->50590 50591 401a81 50590->50591 50592 401a77 RtlLeaveCriticalSection 50590->50592 50591->50571 50592->50591 50596 401fa4 50593->50596 50594 401fd0 50598 401ff4 50594->50598 50604 401db4 50594->50604 50596->50594 50596->50598 50599 401f0c 50596->50599 50598->50576 50598->50577 50608 40178c 50599->50608 50602 401f29 50602->50596 50605 401e02 50604->50605 50606 401dd2 50604->50606 50605->50606 50619 401d1c 50605->50619 50606->50598 50609 4017a8 50608->50609 50610 4014e4 LocalAlloc VirtualAlloc VirtualFree 50609->50610 50611 4017b2 50609->50611 50613 40180f 50609->50613 50614 4013e0 LocalAlloc 50609->50614 50616 401803 50609->50616 50610->50609 50612 401678 VirtualAlloc 50611->50612 50615 4017be 50612->50615 50613->50602 50618 401e80 9 API calls 50613->50618 50614->50609 50615->50613 50617 4015c0 VirtualFree 50616->50617 50617->50613 50618->50602 50620 401d2e 50619->50620 50621 401d51 50620->50621 50622 401d63 50620->50622 50623 401940 LocalAlloc VirtualFree VirtualFree 50621->50623 50624 401940 LocalAlloc VirtualFree VirtualFree 50622->50624 50625 401d61 50623->50625 50624->50625 50626 401bf8 9 API calls 50625->50626 50631 401d79 50625->50631 50628 401d88 50626->50628 50627 401da2 50630 401454 LocalAlloc 50627->50630 50628->50627 50629 401c4c 9 API calls 50628->50629 50629->50627 50630->50631 50631->50606 50632->50584 50633->50546 50635 42ceb2 50634->50635 50636 42ce60 GetSystemMetrics 50634->50636 50649 406f98 19 API calls 50635->50649 50636->50635 50638 42ce6b 50636->50638 50639 403494 4 API calls 50638->50639 50640 42ce74 50639->50640 50643 42ca7e 50640->50643 50644 403744 50640->50644 50648 42c894 IsDBCSLeadByte 50640->50648 50643->50329 50645 40374a 50644->50645 50647 40375b 50644->50647 50646 4034bc 18 API calls 50645->50646 50645->50647 50646->50647 50647->50640 50648->50640 50649->50643 50651 41f379 50650->50651 50651->50338 50651->50339 50653 4246fe 50652->50653 50654 4246de GetWindowTextA 50652->50654 50656 403494 4 API calls 50653->50656 50655 4034e0 18 API calls 50654->50655 50657 4246fc 50655->50657 50656->50657 50657->50346 50659 436445 50658->50659 50668 436467 50658->50668 50659->50668 50669 40905c 18 API calls 50659->50669 50660 4364e6 50671 40905c 18 API calls 50660->50671 50661 4364ba 50661->50352 50662 4364dd 50670 403f90 32 API calls 50662->50670 50666 4364e4 50666->50352 50667 4364f7 50667->50352 50668->50660 50668->50661 50668->50662 50669->50668 50670->50666 50671->50667 50673 45579e 50672->50673 50674 4557c9 50673->50674 50675 4557ba 50673->50675 50739 403634 50674->50739 50676 403494 4 API calls 50675->50676 50682 4557c4 50676->50682 50685 4558e4 50682->50685 50745 42dd14 GetSystemDirectoryA 50682->50745 50723 452f2c 50685->50723 50692 455916 50695 455922 GetLastError 50692->50695 50696 45592b CloseHandle 50692->50696 50699 455943 50695->50699 50730 4556e4 50696->50730 50704 403420 4 API calls 50699->50704 50707 45595d 50704->50707 50709 403400 4 API calls 50707->50709 50711 455965 50709->50711 50712 403400 4 API calls 50711->50712 50713 45596d 50712->50713 50713->50360 50714->50361 50715->50364 50716->50366 50717->50368 50718->50370 50719->50372 50720->50374 50721->50376 50722->50378 50748 452e68 50723->50748 50725 452f45 50726 452f50 CreateProcessA GetLastError 50725->50726 50727 452f49 50725->50727 50754 452ea4 50726->50754 50727->50692 50731 45571c 50730->50731 50732 455708 WaitForInputIdle 50730->50732 50733 45573c GetExitCodeProcess 50731->50733 50737 455723 MsgWaitForMultipleObjects 50731->50737 50732->50731 50735 455750 CloseHandle 50733->50735 50736 45574a 50733->50736 50735->50699 50736->50735 50737->50731 50738 45573a 50737->50738 50738->50733 50740 40363c 50739->50740 50741 4034bc 18 API calls 50740->50741 50742 40364f 50741->50742 50757 403450 50742->50757 50764 407934 50745->50764 50749 452e76 50748->50749 50750 452e72 50748->50750 50751 452e7f Wow64DisableWow64FsRedirection 50749->50751 50752 452e98 SetLastError 50749->50752 50750->50725 50753 452e93 50751->50753 50752->50753 50753->50725 50755 452eb3 50754->50755 50756 452ea9 Wow64RevertWow64FsRedirection 50754->50756 50755->50692 50756->50755 50758 403454 50757->50758 50760 403464 50757->50760 50758->50760 50761 4034bc 18 API calls 50758->50761 50759 403490 50760->50759 50763 402660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50760->50763 50761->50760 50763->50759 50765 40352c 18 API calls 50764->50765 50766 407943 50765->50766 50766->50685 50768 452e68 2 API calls 50767->50768 50769 45337a 50768->50769 50770 45337e 50769->50770 50837 42d1bc 50769->50837 50770->50393 50773 452ea4 Wow64RevertWow64FsRedirection 50774 4533b1 50773->50774 50774->50393 50776 452e68 2 API calls 50775->50776 50778 4531bd 50776->50778 50777 4531c1 50777->50414 50778->50777 50779 4531e0 FindFirstFileA GetLastError 50778->50779 50780 452ea4 Wow64RevertWow64FsRedirection 50779->50780 50781 453206 50780->50781 50781->50414 50783 452e68 2 API calls 50782->50783 50784 45356a 50783->50784 50785 45356e 50784->50785 50786 45358a RemoveDirectoryA GetLastError 50784->50786 50785->50394 50787 452ea4 Wow64RevertWow64FsRedirection 50786->50787 50788 4535b0 50787->50788 50788->50394 50790 42c856 50789->50790 50791 42c879 50789->50791 50843 42cdcc CharPrevA 50790->50843 50793 403494 4 API calls 50791->50793 50795 42c882 50793->50795 50794 42c85d 50794->50791 50796 42c868 50794->50796 50795->50406 50797 4035c0 18 API calls 50796->50797 50798 42c876 50797->50798 50798->50406 50800 4035c4 50799->50800 50801 403625 50799->50801 50802 403450 50800->50802 50803 4035cc 50800->50803 50806 403464 50802->50806 50809 4034bc 18 API calls 50802->50809 50803->50801 50804 4035db 50803->50804 50807 403450 18 API calls 50803->50807 50808 4034bc 18 API calls 50804->50808 50805 403490 50805->50410 50806->50805 50844 402660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50806->50844 50807->50804 50811 4035f5 50808->50811 50809->50806 50812 403450 18 API calls 50811->50812 50813 403621 50812->50813 50813->50410 50814->50404 50816 403580 50815->50816 50817 4035bf 50815->50817 50818 40358a 50816->50818 50825 403450 50816->50825 50817->50422 50819 4035b4 50818->50819 50820 40359d 50818->50820 50823 4038a4 18 API calls 50819->50823 50846 4038a4 50820->50846 50822 403490 50822->50422 50828 4035a2 50823->50828 50824 403464 50824->50822 50845 402660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50824->50845 50825->50824 50826 4034bc 18 API calls 50825->50826 50826->50824 50828->50422 50829->50420 50831 452e68 2 API calls 50830->50831 50833 453062 50831->50833 50832 453066 50832->50420 50833->50832 50834 453082 DeleteFileA GetLastError 50833->50834 50835 452ea4 Wow64RevertWow64FsRedirection 50834->50835 50836 4530a8 50835->50836 50836->50420 50841 403738 50837->50841 50840 42d1d1 50840->50773 50842 40373c GetFileAttributesA 50841->50842 50842->50840 50843->50794 50844->50805 50845->50822 50847 4038b1 50846->50847 50854 4038e1 50846->50854 50849 4038da 50847->50849 50850 4038bd 50847->50850 50848 403400 4 API calls 50852 4038cb 50848->50852 50851 4034bc 18 API calls 50849->50851 50855 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50850->50855 50851->50854 50852->50828 50854->50848 50855->50852 50857 403400 4 API calls 50856->50857 50859 453ec5 50857->50859 50858 403510 18 API calls 50858->50859 50859->50858 50861 453ef2 50859->50861 50884 403800 50859->50884 50862 403400 4 API calls 50861->50862 50863 453f07 50862->50863 50863->50434 50865 452e68 2 API calls 50864->50865 50866 45314a 50865->50866 50867 45314e 50866->50867 50888 42d1ac 50866->50888 50867->50434 50870 452ea4 Wow64RevertWow64FsRedirection 50871 453189 50870->50871 50871->50434 50897 42cacc 50872->50897 50874 42d048 50877 42d053 50874->50877 50878 42d05e 50874->50878 50876 42d021 50876->50874 50904 42cf94 CharPrevA 50876->50904 50879 403494 4 API calls 50877->50879 50905 403778 50878->50905 50881 42d05c 50879->50881 50881->50434 50882->50434 50883->50434 50885 403804 50884->50885 50887 40382f 50884->50887 50886 4038a4 18 API calls 50885->50886 50886->50887 50887->50859 50891 42d11c 50888->50891 50892 42d010 20 API calls 50891->50892 50893 42d13e 50892->50893 50894 42d146 GetFileAttributesA 50893->50894 50895 403400 4 API calls 50894->50895 50896 42d163 GetLastError 50895->50896 50896->50870 50899 42cadd 50897->50899 50898 42cb41 50901 42cb3c 50898->50901 50913 42c894 IsDBCSLeadByte 50898->50913 50899->50898 50903 42cafb 50899->50903 50901->50876 50903->50901 50912 42c894 IsDBCSLeadByte 50903->50912 50904->50876 50906 4037aa 50905->50906 50909 40377d 50905->50909 50907 403400 4 API calls 50906->50907 50908 4037a0 50907->50908 50908->50881 50909->50906 50910 403791 50909->50910 50911 4034e0 18 API calls 50910->50911 50911->50908 50912->50903 50913->50901 50914->50506 50915->50511 50916 404d2a 50923 404d3a 50916->50923 50917 404e07 ExitProcess 50918 404de0 50932 404cf0 50918->50932 50920 404e12 50922 404cf0 4 API calls 50924 404df4 50922->50924 50923->50917 50923->50918 50923->50920 50925 404db7 MessageBoxA 50923->50925 50926 404dcc 50923->50926 50936 401a90 50924->50936 50925->50918 50948 40500c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50926->50948 50928 404df9 50928->50917 50928->50920 50933 404cfe 50932->50933 50935 404d13 50933->50935 50949 402728 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50933->50949 50935->50922 50937 401aa1 50936->50937 50938 401b6f 50936->50938 50939 401ac2 LocalFree 50937->50939 50940 401ab8 RtlEnterCriticalSection 50937->50940 50938->50928 50941 401af5 50939->50941 50940->50939 50942 401ae3 VirtualFree 50941->50942 50943 401afd 50941->50943 50942->50941 50944 401b24 LocalFree 50943->50944 50945 401b3b 50943->50945 50944->50944 50944->50945 50946 401b53 RtlLeaveCriticalSection 50945->50946 50947 401b5d RtlDeleteCriticalSection 50945->50947 50946->50947 50947->50928 50949->50935 50950 40d2cc 50951 40d2d4 50950->50951 50952 40d302 50951->50952 50953 40d2f7 50951->50953 50961 40d2fe 50951->50961 50955 40d306 50952->50955 50956 40d318 50952->50956 50963 406298 GlobalHandle GlobalUnlock GlobalFree 50953->50963 50962 40626c GlobalAlloc GlobalLock 50955->50962 50964 40627c GlobalHandle GlobalUnlock GlobalReAlloc GlobalLock 50956->50964 50959 40d314 50959->50961 50965 40910c 50959->50965 50962->50959 50963->50961 50964->50959 50966 409118 50965->50966 50973 40723c LoadStringA 50966->50973 50969 403450 18 API calls 50970 409149 50969->50970 50971 403400 4 API calls 50970->50971 50972 40915e 50971->50972 50972->50961 50974 4034e0 18 API calls 50973->50974 50975 407269 50974->50975 50975->50969 50976 448bc8 50977 448bf6 50976->50977 50978 448bfd 50976->50978 50982 403400 4 API calls 50977->50982 50979 448c06 50978->50979 50980 448c1c 50978->50980 51031 4489cc 21 API calls 50979->51031 50981 403494 4 API calls 50980->50981 50984 448c2a 50981->50984 50985 448da7 50982->50985 51011 4037b8 50984->51011 50986 448c11 50986->50980 50987 448c15 50986->50987 50987->50977 50989 448c46 50990 4037b8 18 API calls 50989->50990 50991 448c62 50990->50991 50991->50977 50992 448c76 50991->50992 50993 4037b8 18 API calls 50992->50993 50994 448c90 50993->50994 51016 432070 50994->51016 50996 448cb2 50999 448cd2 50996->50999 51032 432140 50996->51032 50998 448d28 51020 4427d4 50998->51020 51002 448d10 50999->51002 51038 443a70 18 API calls 50999->51038 51002->50998 51039 443a70 18 API calls 51002->51039 51003 448d5c GetLastError 51040 448960 18 API calls 51003->51040 51006 448d6b 51041 443ab0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51006->51041 51008 448d80 51042 443ac0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51008->51042 51010 448d88 51012 403744 18 API calls 51011->51012 51014 4037c6 51012->51014 51013 4037fc 51013->50989 51014->51013 51015 4038a4 18 API calls 51014->51015 51015->51013 51017 432076 51016->51017 51018 402648 18 API calls 51017->51018 51019 4320a6 51018->51019 51019->50996 51021 4437b2 51020->51021 51022 44280d 51020->51022 51023 403400 4 API calls 51021->51023 51024 403400 4 API calls 51022->51024 51026 4437c7 51023->51026 51025 442815 51024->51025 51027 432070 18 API calls 51025->51027 51026->51003 51028 442821 51027->51028 51029 4437a2 51028->51029 51043 441eac 18 API calls 51028->51043 51029->51003 51031->50986 51033 432160 51032->51033 51034 43214e 51032->51034 51035 432182 51033->51035 51045 4320e0 18 API calls 51033->51045 51044 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51034->51044 51035->50996 51038->50999 51039->50998 51040->51006 51041->51008 51042->51010 51043->51028 51044->51033 51045->51035 51046 41f7ec 51050 423ed4 51046->51050 51057 42405c 51046->51057 51047 41f802 51051 423f5d 51050->51051 51052 423ee4 51050->51052 51051->51047 51052->51051 51053 423eea EnumWindows 51052->51053 51053->51051 51054 423f06 GetWindow GetWindowLongA 51053->51054 51151 423e6c GetWindow 51053->51151 51055 423f25 51054->51055 51055->51051 51056 423f51 SetWindowPos 51055->51056 51056->51051 51056->51055 51076 424092 51057->51076 51060 42413c 51062 424143 51060->51062 51063 424177 51060->51063 51061 4240dd 51064 4240e3 51061->51064 51065 4241a0 51061->51065 51070 424149 51062->51070 51107 424401 51062->51107 51066 424182 51063->51066 51067 4244ea IsIconic 51063->51067 51071 4240e8 51064->51071 51075 424115 51064->51075 51068 4241b2 51065->51068 51069 4241bb 51065->51069 51072 424526 51066->51072 51073 42418b 51066->51073 51074 4240b3 51067->51074 51080 4244fe GetFocus 51067->51080 51077 4241c8 51068->51077 51078 4241b9 51068->51078 51160 4245e4 11 API calls 51069->51160 51081 424363 SendMessageA 51070->51081 51082 424157 51070->51082 51083 424246 51071->51083 51084 4240ee 51071->51084 51182 424ca0 WinHelpA PostMessageA 51072->51182 51087 42453d 51073->51087 51108 424110 51073->51108 51074->51047 51075->51074 51097 42412e 51075->51097 51098 42428f 51075->51098 51076->51074 51154 423fb8 51076->51154 51161 42462c 11 API calls 51077->51161 51162 423fd4 NtdllDefWindowProc_A 51078->51162 51080->51074 51089 42450f 51080->51089 51081->51074 51082->51074 51082->51108 51134 4243a6 51082->51134 51166 423fd4 NtdllDefWindowProc_A 51083->51166 51090 4240f7 51084->51090 51091 42426e PostMessageA 51084->51091 51095 424546 51087->51095 51096 42455b 51087->51096 51181 41f444 GetCurrentThreadId EnumThreadWindows 51089->51181 51092 424100 51090->51092 51093 4242f5 51090->51093 51172 423fd4 NtdllDefWindowProc_A 51091->51172 51102 424109 51092->51102 51103 42421e IsIconic 51092->51103 51104 4242fe 51093->51104 51105 42432f 51093->51105 51094 424289 51094->51074 51183 424924 51095->51183 51189 42497c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 51096->51189 51097->51108 51109 42425b 51097->51109 51158 423fd4 NtdllDefWindowProc_A 51098->51158 51102->51108 51113 4241e1 51102->51113 51115 42423a 51103->51115 51116 42422e 51103->51116 51174 423f64 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 51104->51174 51177 423fd4 NtdllDefWindowProc_A 51105->51177 51107->51074 51123 424427 IsWindowEnabled 51107->51123 51108->51074 51159 423fd4 NtdllDefWindowProc_A 51108->51159 51167 4245c8 51109->51167 51112 424516 51112->51074 51121 42451e SetFocus 51112->51121 51113->51074 51163 42309c ShowWindow PostMessageA PostQuitMessage 51113->51163 51165 423fd4 NtdllDefWindowProc_A 51115->51165 51164 424010 29 API calls 51116->51164 51120 424295 51127 4242d3 51120->51127 51128 4242b1 51120->51128 51121->51074 51122 424306 51131 424318 51122->51131 51175 41f3a8 6 API calls 51122->51175 51123->51074 51132 424435 51123->51132 51126 424335 51133 42434d 51126->51133 51139 41f2f4 2 API calls 51126->51139 51129 423ed4 6 API calls 51127->51129 51173 423f64 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 51128->51173 51136 4242db PostMessageA 51129->51136 51176 423fd4 NtdllDefWindowProc_A 51131->51176 51143 42443c IsWindowVisible 51132->51143 51140 423ed4 6 API calls 51133->51140 51134->51074 51141 4243c8 IsWindowEnabled 51134->51141 51136->51074 51139->51133 51140->51074 51141->51074 51144 4243d6 51141->51144 51142 4242b9 PostMessageA 51142->51074 51143->51074 51146 42444a GetFocus 51143->51146 51178 412760 21 API calls 51144->51178 51179 418630 51146->51179 51148 42445f SetFocus 51180 415690 51148->51180 51150 42447e SetFocus 51150->51074 51152 423e8d GetWindowLongA 51151->51152 51153 423e99 51151->51153 51152->51153 51155 423fc2 51154->51155 51156 423fcd 51154->51156 51155->51156 51190 408b70 GetSystemDefaultLCID 51155->51190 51156->51060 51156->51061 51158->51120 51159->51074 51160->51074 51161->51074 51162->51074 51163->51074 51164->51074 51165->51074 51166->51074 51253 41df80 51167->51253 51170 4245e0 51170->51074 51171 4245d4 LoadIconA 51171->51170 51172->51094 51173->51142 51174->51122 51175->51131 51176->51074 51177->51126 51178->51074 51179->51148 51180->51150 51181->51112 51182->51094 51184 424930 51183->51184 51185 42494a 51183->51185 51186 424937 SendMessageA 51184->51186 51188 42495f 51184->51188 51187 402648 18 API calls 51185->51187 51186->51188 51187->51188 51188->51074 51189->51094 51245 4089b8 GetLocaleInfoA 51190->51245 51193 403450 18 API calls 51194 408bb0 51193->51194 51195 4089b8 19 API calls 51194->51195 51196 408bc5 51195->51196 51197 4089b8 19 API calls 51196->51197 51198 408be9 51197->51198 51251 408a04 GetLocaleInfoA 51198->51251 51201 408a04 GetLocaleInfoA 51202 408c19 51201->51202 51203 4089b8 19 API calls 51202->51203 51204 408c33 51203->51204 51205 408a04 GetLocaleInfoA 51204->51205 51206 408c50 51205->51206 51207 4089b8 19 API calls 51206->51207 51208 408c6a 51207->51208 51209 403450 18 API calls 51208->51209 51210 408c77 51209->51210 51211 4089b8 19 API calls 51210->51211 51212 408c8c 51211->51212 51213 403450 18 API calls 51212->51213 51214 408c99 51213->51214 51215 408a04 GetLocaleInfoA 51214->51215 51216 408ca7 51215->51216 51217 4089b8 19 API calls 51216->51217 51218 408cc1 51217->51218 51219 403450 18 API calls 51218->51219 51220 408cce 51219->51220 51221 4089b8 19 API calls 51220->51221 51222 408ce3 51221->51222 51223 403450 18 API calls 51222->51223 51224 408cf0 51223->51224 51225 4089b8 19 API calls 51224->51225 51226 408d05 51225->51226 51227 408d22 51226->51227 51228 408d13 51226->51228 51230 403494 4 API calls 51227->51230 51229 403494 4 API calls 51228->51229 51231 408d20 51229->51231 51230->51231 51232 4089b8 19 API calls 51231->51232 51233 408d44 51232->51233 51234 408d61 51233->51234 51235 408d52 51233->51235 51236 403400 4 API calls 51234->51236 51237 403494 4 API calls 51235->51237 51238 408d5f 51236->51238 51237->51238 51239 403634 18 API calls 51238->51239 51240 408d83 51239->51240 51241 403634 18 API calls 51240->51241 51242 408d9d 51241->51242 51243 403420 4 API calls 51242->51243 51244 408db7 51243->51244 51244->51156 51246 4089f1 51245->51246 51247 4089df 51245->51247 51249 403494 4 API calls 51246->51249 51248 4034e0 18 API calls 51247->51248 51250 4089ef 51248->51250 51249->51250 51250->51193 51252 408a20 51251->51252 51252->51201 51256 41dfa4 51253->51256 51257 41df8a 51256->51257 51258 41dfb1 51256->51258 51257->51170 51257->51171 51258->51257 51265 40ced0 19 API calls 51258->51265 51260 41dfce 51260->51257 51261 41dfe8 51260->51261 51262 41dfdb 51260->51262 51266 41c1dc 25 API calls 51261->51266 51267 41b7d8 19 API calls 51262->51267 51265->51260 51266->51257 51267->51257 51268 402e70 51271 402eea 51268->51271 51272 402e81 51268->51272 51269 402ebe RtlUnwind 51270 4033bc 4 API calls 51269->51270 51270->51271 51272->51269 51272->51271 51275 402d90 RaiseException 51272->51275 51274 402eb5 51274->51269 51275->51274 51276 441834 51277 44183d 51276->51277 51278 44184b FindWindowA 51276->51278 51277->51278 51279 441856 51278->51279 51280 450994 51281 450a8c 51280->51281 51282 4509bf GetVersion 51280->51282 51284 403420 4 API calls 51281->51284 51282->51281 51283 4509d2 51282->51283 51294 450964 GetSystemDirectoryA 51283->51294 51286 450ab0 51284->51286 51288 42c84c 19 API calls 51289 4509e5 51288->51289 51290 40357c 18 API calls 51289->51290 51291 4509f2 51290->51291 51292 4509fa LoadLibraryA 51291->51292 51292->51281 51293 450a0e 6 API calls 51292->51293 51293->51281 51295 407934 18 API calls 51294->51295 51296 45098e 51295->51296 51296->51288 51297 47e054 51298 47e05f 51297->51298 51299 45304c 5 API calls 51298->51299 51300 47e075 GetLastError 51298->51300 51301 47e0a0 51298->51301 51299->51298 51300->51301 51302 47e07f GetLastError 51300->51302 51302->51301 51303 47e089 GetTickCount 51302->51303 51303->51301 51304 47e097 Sleep 51303->51304 51304->51298 51305 49a490 51361 403344 51305->51361 51307 49a49e 51364 4056a0 51307->51364 51309 49a4a3 51367 4063f4 GetModuleHandleA GetVersion 51309->51367 51313 49a4ad 51458 409d9c 51313->51458 51317 49a4b7 51471 412d78 51317->51471 51319 49a4c1 51476 419490 GetVersion 51319->51476 51321 49a4c6 51481 430e94 51321->51481 51325 49a4da 51491 4501e8 GetVersionExA 51325->51491 51327 49a4df 51493 453934 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 51327->51493 51333 49a4f8 51525 465214 51333->51525 51339 49a50c 51549 485374 51339->51549 51343 49a516 SetErrorMode 51566 49a250 GetModuleHandleA GetProcAddress 51343->51566 51346 424924 19 API calls 51347 49a545 51346->51347 51568 49a298 51347->51568 51349 49a54a 51594 424714 51349->51594 51351 49a57c ShowWindow 51352 49a5be 51351->51352 51600 48122c 51352->51600 51776 4032fc 51361->51776 51363 403349 GetModuleHandleA GetCommandLineA 51363->51307 51365 4033bc 4 API calls 51364->51365 51366 4056db 51364->51366 51365->51366 51366->51309 51368 406445 51367->51368 51369 406425 GetProcAddress 51367->51369 51371 40644d GetProcAddress 51368->51371 51372 40664f GetProcAddress 51368->51372 51369->51368 51370 406436 51369->51370 51370->51368 51375 40645c 51371->51375 51373 406665 GetProcAddress 51372->51373 51374 40665e 51372->51374 51376 406674 SetProcessDEPPolicy 51373->51376 51377 406678 51373->51377 51374->51373 51777 406340 19 API calls 51375->51777 51376->51377 51381 403400 4 API calls 51377->51381 51379 40646b 51380 403450 18 API calls 51379->51380 51383 406478 51380->51383 51382 40668d 51381->51382 51457 406814 6FB81CD0 51382->51457 51383->51372 51384 4064ab 51383->51384 51385 40357c 18 API calls 51383->51385 51386 403494 4 API calls 51384->51386 51385->51384 51387 4064b9 51386->51387 51388 40357c 18 API calls 51387->51388 51389 4064c6 51388->51389 51778 40636c SetErrorMode LoadLibraryA 51389->51778 51391 4064ce 51392 403494 4 API calls 51391->51392 51393 4064dc 51392->51393 51394 40357c 18 API calls 51393->51394 51395 4064e9 51394->51395 51779 40636c SetErrorMode LoadLibraryA 51395->51779 51397 4064f1 51398 403494 4 API calls 51397->51398 51399 4064ff 51398->51399 51400 40357c 18 API calls 51399->51400 51401 40650c 51400->51401 51780 40636c SetErrorMode LoadLibraryA 51401->51780 51403 406514 51404 403494 4 API calls 51403->51404 51405 406522 51404->51405 51406 40357c 18 API calls 51405->51406 51407 40652f 51406->51407 51781 40636c SetErrorMode LoadLibraryA 51407->51781 51409 406537 51410 403494 4 API calls 51409->51410 51411 406545 51410->51411 51412 40357c 18 API calls 51411->51412 51413 406552 51412->51413 51782 40636c SetErrorMode LoadLibraryA 51413->51782 51415 40655a 51416 403494 4 API calls 51415->51416 51417 406568 51416->51417 51418 40357c 18 API calls 51417->51418 51419 406575 51418->51419 51783 40636c SetErrorMode LoadLibraryA 51419->51783 51421 40657d 51422 403494 4 API calls 51421->51422 51423 40658b 51422->51423 51424 40357c 18 API calls 51423->51424 51425 406598 51424->51425 51784 40636c SetErrorMode LoadLibraryA 51425->51784 51427 4065a0 51428 403494 4 API calls 51427->51428 51429 4065ae 51428->51429 51430 40357c 18 API calls 51429->51430 51431 4065bb 51430->51431 51785 40636c SetErrorMode LoadLibraryA 51431->51785 51433 4065c3 51434 403494 4 API calls 51433->51434 51435 4065d1 51434->51435 51436 40357c 18 API calls 51435->51436 51437 4065de 51436->51437 51786 40636c SetErrorMode LoadLibraryA 51437->51786 51439 4065e6 51440 403494 4 API calls 51439->51440 51441 4065f4 51440->51441 51442 40357c 18 API calls 51441->51442 51443 406601 51442->51443 51787 40636c SetErrorMode LoadLibraryA 51443->51787 51445 406609 51446 403494 4 API calls 51445->51446 51447 406617 51446->51447 51448 40357c 18 API calls 51447->51448 51449 406624 51448->51449 51788 40636c SetErrorMode LoadLibraryA 51449->51788 51451 40662c 51452 403494 4 API calls 51451->51452 51453 40663a 51452->51453 51454 40357c 18 API calls 51453->51454 51455 406647 51454->51455 51789 40636c SetErrorMode LoadLibraryA 51455->51789 51457->51313 51790 409474 51458->51790 51463 408b70 21 API calls 51464 409dbf 51463->51464 51805 4094c0 GetVersionExA 51464->51805 51467 410bb4 51468 410bbe 51467->51468 51469 410bfd GetCurrentThreadId 51468->51469 51470 410c18 51469->51470 51470->51317 51807 40b15c 51471->51807 51475 412da4 51475->51319 51819 41e274 8 API calls 51476->51819 51478 4194a9 51821 419388 GetCurrentProcessId 51478->51821 51480 4194ae 51480->51321 51482 430e9e 51481->51482 51941 430de0 RegisterClipboardFormatA RegisterClipboardFormatA GetCurrentThreadId 51482->51941 51484 430ea3 51485 44fd1c 51484->51485 51486 44fd26 51485->51486 51944 44fcac 51486->51944 51492 450200 51491->51492 51492->51327 51494 453989 51493->51494 51495 42dd14 19 API calls 51494->51495 51496 4539a5 51495->51496 51497 42c84c 19 API calls 51496->51497 51498 4539b0 51497->51498 51499 40357c 18 API calls 51498->51499 51500 4539bd 51499->51500 51965 42e7e4 SetErrorMode 51500->51965 51502 4539ca 51968 42ed18 FormatMessageA 51502->51968 51505 403420 4 API calls 51506 4539f1 51505->51506 51507 457850 51506->51507 51508 457872 51507->51508 51972 4577e0 CoInitialize 51508->51972 51510 457877 51511 42dd14 19 API calls 51510->51511 51512 457884 51511->51512 51513 42c84c 19 API calls 51512->51513 51514 45788f 51513->51514 51515 40357c 18 API calls 51514->51515 51516 45789c 51515->51516 51517 42e7e4 2 API calls 51516->51517 51518 4578a9 GetProcAddress 51517->51518 51519 403420 4 API calls 51518->51519 51520 4578ce 51519->51520 51521 4587b4 51520->51521 51522 4587d2 51521->51522 51977 4581c4 GetSystemTimeAsFileTime FileTimeToLocalFileTime 51522->51977 51524 4587d7 51524->51333 51526 44bb28 69 API calls 51525->51526 51527 465231 51526->51527 51979 4651e8 GetSystemDirectoryA 51527->51979 51530 42c84c 19 API calls 51531 465249 51530->51531 51532 40357c 18 API calls 51531->51532 51533 465256 51532->51533 51534 46525e LoadLibraryA GetProcAddress 51533->51534 51535 403420 4 API calls 51534->51535 51536 465289 51535->51536 51537 46dab0 51536->51537 51538 42dd14 19 API calls 51537->51538 51539 46dad5 51538->51539 51540 42c84c 19 API calls 51539->51540 51541 46dae0 51540->51541 51542 40357c 18 API calls 51541->51542 51543 46daed 51542->51543 51544 42e7e4 2 API calls 51543->51544 51545 46dafa GetProcAddress 51544->51545 51546 403420 4 API calls 51545->51546 51547 46db1f 51546->51547 51548 479e68 GetModuleHandleA GetProcAddress GetProcAddress 51547->51548 51548->51339 51550 485396 51549->51550 51982 484e68 GetModuleHandleA GetProcAddress 51550->51982 51554 4853aa 51555 42dd14 19 API calls 51554->51555 51556 48545f 51555->51556 51557 42c84c 19 API calls 51556->51557 51558 48546a 51557->51558 51559 40357c 18 API calls 51558->51559 51560 485477 51559->51560 51561 42e7e4 2 API calls 51560->51561 51562 485484 GetProcAddress 51561->51562 51563 403420 4 API calls 51562->51563 51564 4854a9 51563->51564 51565 49749c RegisterClipboardFormatA 51564->51565 51565->51343 51567 49a269 51566->51567 51567->51346 52002 4567f4 51568->52002 51570 49a2ca 51582 49a3d3 51570->51582 52018 42d840 GetCommandLineA 51570->52018 51571 403400 4 API calls 51573 49a43a 51571->51573 51574 403420 4 API calls 51573->51574 51575 49a447 51574->51575 51575->51349 51576 49a3c8 51578 49a3cf 51576->51578 51579 49a3d5 51576->51579 51577 49a343 52025 42d89c 51577->52025 51578->51582 51583 49a3f4 51578->51583 52046 499644 63 API calls 51579->52046 51581 42d89c 20 API calls 51592 49a2e8 51581->51592 51582->51571 52047 499cb8 162 API calls 51583->52047 51589 49a3e8 51589->51582 51590 49a30e 51590->51576 51590->51577 51592->51581 51592->51590 51595 424720 51594->51595 51596 424734 51594->51596 51598 424727 SetWindowTextA 51595->51598 51597 403450 18 API calls 51596->51597 51599 42473e 51597->51599 51598->51351 51599->51351 52063 480610 51600->52063 51603 4567f4 21 API calls 51604 48127e 51603->51604 51776->51363 51777->51379 51778->51391 51779->51397 51780->51403 51781->51409 51782->51415 51783->51421 51784->51427 51785->51433 51786->51439 51787->51445 51788->51451 51789->51372 51791 40910c 19 API calls 51790->51791 51792 409485 51791->51792 51793 408a2c GetSystemDefaultLCID 51792->51793 51795 408a62 51793->51795 51794 40723c 19 API calls 51794->51795 51795->51794 51796 4089b8 19 API calls 51795->51796 51797 403450 18 API calls 51795->51797 51800 408ac4 51795->51800 51796->51795 51797->51795 51798 40723c 19 API calls 51798->51800 51799 4089b8 19 API calls 51799->51800 51800->51798 51800->51799 51801 403450 18 API calls 51800->51801 51802 408b47 51800->51802 51801->51800 51803 403420 4 API calls 51802->51803 51804 408b61 51803->51804 51804->51463 51806 4094d7 51805->51806 51806->51467 51808 40b163 51807->51808 51809 40b182 51808->51809 51818 40b094 33 API calls 51808->51818 51811 41145c 51809->51811 51812 41147e 51811->51812 51813 40723c 19 API calls 51812->51813 51814 403450 18 API calls 51812->51814 51815 41149d 51812->51815 51813->51812 51814->51812 51816 403400 4 API calls 51815->51816 51817 4114b2 51816->51817 51817->51475 51818->51808 51820 41e2ee 51819->51820 51820->51478 51837 407d10 51821->51837 51824 407d10 33 API calls 51825 4193e9 GlobalAddAtomA 51824->51825 51826 419401 51825->51826 51841 40b818 51826->51841 51834 419440 51875 406e74 51834->51875 51836 419456 51836->51480 51838 407d23 51837->51838 51878 407a08 51838->51878 51842 40b823 51841->51842 51843 40b843 51842->51843 51885 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51842->51885 51845 423518 51843->51845 51846 423522 51845->51846 51886 410480 51846->51886 51850 42353f 51851 423569 GetDC EnumFontsA GetDeviceCaps ReleaseDC 51850->51851 51852 419423 51851->51852 51853 423adc 51852->51853 51854 423aeb 51853->51854 51855 410480 19 API calls 51854->51855 51856 423b01 51855->51856 51857 423b5c LoadIconA 51856->51857 51899 41e1f0 51857->51899 51859 423b7a GetModuleFileNameA OemToCharA 51860 423bbe 51859->51860 51861 423be4 CharLowerA 51860->51861 51862 423c04 51861->51862 51863 419436 51862->51863 51901 423cc4 51862->51901 51865 41f568 51863->51865 51866 41f576 GetVersion 51865->51866 51867 41f6ce 51865->51867 51868 41f582 51866->51868 51869 41f5b1 51866->51869 51867->51834 51868->51869 51871 41f58d SetErrorMode LoadLibraryA SetErrorMode 51868->51871 51869->51867 51870 41f5d1 GetProcAddress 51869->51870 51872 41f5f2 51870->51872 51871->51869 51873 41f6b9 FreeLibrary 51872->51873 51874 41f5fa 9 API calls 51872->51874 51873->51867 51874->51867 51876 402648 18 API calls 51875->51876 51877 406e81 51876->51877 51877->51836 51881 407a23 51878->51881 51879 407a35 GlobalAddAtomA GetCurrentThreadId 51879->51824 51881->51879 51883 407b2a 33 API calls 51881->51883 51884 4079fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51881->51884 51883->51881 51884->51881 51885->51843 51887 410487 51886->51887 51888 4104aa 51887->51888 51895 410618 19 API calls 51887->51895 51890 42368c LoadCursorA 51888->51890 51891 4236ab 51890->51891 51892 4236bf LoadCursorA 51891->51892 51894 4236dc 51891->51894 51896 423780 51892->51896 51894->51850 51895->51888 51897 402648 18 API calls 51896->51897 51898 423793 51897->51898 51898->51891 51900 41e1fc 51899->51900 51900->51859 51902 423df7 51901->51902 51903 423cd4 51901->51903 51902->51863 51925 41f814 51903->51925 51905 423cdf GetClassInfoA 51906 423d27 GetSystemMetrics 51905->51906 51907 423cf8 RegisterClassA 51905->51907 51908 423d32 51906->51908 51909 423d35 GetSystemMetrics 51906->51909 51907->51906 51910 423d11 51907->51910 51908->51909 51912 423d41 51909->51912 51911 40910c 19 API calls 51910->51911 51913 423d22 51911->51913 51928 4062f8 CreateWindowExA 51912->51928 51913->51906 51915 423d6e 51916 403400 4 API calls 51915->51916 51917 423d79 51916->51917 51929 423a9c 51917->51929 51920 423da2 51922 4245c8 26 API calls 51920->51922 51921 423dba GetSystemMenu DeleteMenu DeleteMenu 51921->51902 51923 423dea DeleteMenu 51921->51923 51924 423da9 SendMessageA 51922->51924 51923->51902 51924->51921 51926 41f824 VirtualAlloc 51925->51926 51927 41f852 51925->51927 51926->51927 51927->51905 51928->51915 51937 423a48 SystemParametersInfoA 51929->51937 51932 423ab5 ShowWindow 51934 423ac0 51932->51934 51935 423ac7 SetWindowLongA 51932->51935 51940 423a78 SystemParametersInfoA 51934->51940 51935->51920 51935->51921 51938 423a66 51937->51938 51938->51932 51939 423a78 SystemParametersInfoA 51938->51939 51939->51932 51940->51935 51942 407d10 33 API calls 51941->51942 51943 430e31 GlobalAddAtomA 51942->51943 51943->51484 51945 44fcc2 GetVersionExA 51944->51945 51946 44fcdf 51944->51946 51945->51946 51947 44fcd3 51945->51947 51948 44bb28 51946->51948 51947->51946 51949 44bb54 51948->51949 51950 44bee8 51948->51950 51963 44baa4 GetVersionExA 51949->51963 51951 403420 4 API calls 51950->51951 51953 44bf0a GetModuleHandleA GetProcAddress 51951->51953 51953->51325 51954 44bb59 51954->51950 51964 44baf8 19 API calls 51954->51964 51956 44bb69 51957 42c84c 19 API calls 51956->51957 51958 44bb74 51957->51958 51959 40357c 18 API calls 51958->51959 51960 44bb81 51959->51960 51961 44bb89 LoadLibraryA 51960->51961 51961->51950 51962 44bb9a 47 API calls 51961->51962 51962->51950 51963->51954 51964->51956 51966 403738 51965->51966 51967 42e81c LoadLibraryA 51966->51967 51967->51502 51969 42ed3e 51968->51969 51970 4034e0 18 API calls 51969->51970 51971 42ed5b 51970->51971 51971->51505 51973 4577f4 51972->51973 51974 457814 51973->51974 51976 409090 33 API calls 51973->51976 51974->51510 51976->51974 51978 4581e4 51977->51978 51978->51524 51980 407934 18 API calls 51979->51980 51981 465209 51980->51981 51981->51530 51983 484e8f GetNativeSystemInfo GetProcAddress 51982->51983 51984 484ef4 GetSystemInfo 51982->51984 51985 484efe 51983->51985 51986 484ea7 GetCurrentProcess 51983->51986 51984->51985 51991 485194 GetVersionExA 51985->51991 51987 484eb0 51986->51987 51987->51985 51988 484ec3 GetProcAddress 51987->51988 51988->51985 51989 484ed2 GetModuleHandleA GetProcAddress 51988->51989 51989->51985 51990 484eeb 51989->51990 51990->51985 51992 4851af 51991->51992 51993 485246 51991->51993 51992->51993 51994 4851e1 GetVersionExA 51992->51994 51995 485237 51992->51995 51993->51554 51994->51993 51996 4851fd 51994->51996 51995->51993 52000 484fb0 RegOpenKeyExA RegQueryValueExA RegCloseKey 51995->52000 51996->51993 51998 485241 52001 485058 22 API calls 51998->52001 52000->51998 52001->51993 52003 42d89c 20 API calls 52002->52003 52004 45681a 52003->52004 52005 45685b 52004->52005 52048 42cec0 IsDBCSLeadByte 52004->52048 52006 403450 18 API calls 52005->52006 52008 456865 52006->52008 52010 403400 4 API calls 52008->52010 52009 456832 52009->52005 52011 456838 52009->52011 52017 456859 52010->52017 52012 403778 18 API calls 52011->52012 52014 456848 52012->52014 52013 403400 4 API calls 52015 456881 52013->52015 52016 403778 18 API calls 52014->52016 52015->51570 52016->52017 52017->52013 52049 42d6f0 52018->52049 52020 42d863 52021 42d875 52020->52021 52022 42d6f0 18 API calls 52020->52022 52023 403400 4 API calls 52021->52023 52022->52020 52024 42d88a 52023->52024 52024->51592 52026 42d8c3 GetModuleFileNameA 52025->52026 52027 42d8e7 GetCommandLineA 52025->52027 52028 4034e0 18 API calls 52026->52028 52036 42d8ec 52027->52036 52046->51589 52047->51589 52048->52009 52050 42d71c 52049->52050 52051 4034e0 18 API calls 52050->52051 52052 42d729 52051->52052 52053 403744 18 API calls 52052->52053 52054 42d731 52053->52054 52055 403450 18 API calls 52054->52055 52056 42d749 52055->52056 52057 403400 4 API calls 52056->52057 52058 42d76b 52057->52058 52058->52020 52206 42e708 52063->52206 52066 480628 52212 402778 GetSystemTime 52066->52212 52069 48063c 52069->51603 52213 42e4ec 52206->52213 52208 42e712 52208->52066 52209 42e714 52208->52209 52210 42e4ec 34 API calls 52209->52210 52211 42e71e 52210->52211 52211->52066 52212->52069 52214 42e508 AllocateAndInitializeSid 52213->52214 52229 42e4ff 52213->52229 52215 42e533 GetVersion 52214->52215 52214->52229 52216 42e552 GetModuleHandleA GetProcAddress 52215->52216 52217 42e569 52215->52217 52216->52217 52218 42e592 GetCurrentThread OpenThreadToken 52217->52218 52219 42e56d CheckTokenMembership 52217->52219 52222 42e5e3 GetTokenInformation 52218->52222 52223 42e5ae GetLastError 52218->52223 52220 42e581 52219->52220 52221 42e6b9 FreeSid 52219->52221 52220->52221 52221->52208 52225 42e626 52222->52225 52226 42e60d GetLastError 52222->52226 52224 42e5c4 GetCurrentProcess OpenProcessToken 52223->52224 52223->52229 52224->52222 52224->52229 52227 402648 18 API calls 52225->52227 52226->52225 52226->52229 52229->52208 52455 499793 52456 4997a7 52455->52456 52457 42f574 18 API calls 52456->52457 52458 4997d8 52457->52458 52459 42f574 18 API calls 52458->52459 52460 4997eb 52459->52460 52461 42f574 18 API calls 52460->52461 52462 4997fe 52461->52462 52463 42f574 18 API calls 52462->52463 52464 499811 52463->52464 52465 424714 19 API calls 52464->52465 52466 499821 52465->52466 52647 42d174 GetFileAttributesA 52466->52647 52468 49982b 52469 49984d 52468->52469 52470 49982f 52468->52470 52471 499866 52469->52471 52472 499856 52469->52472 52648 497b6c 57 API calls 52470->52648 52485 498914 52471->52485 52650 4983a0 37 API calls 52472->52650 52476 499848 52649 409030 19 API calls 52476->52649 52477 49985b 52478 499864 52477->52478 52651 498538 76 API calls 52477->52651 52652 457a90 GetWindowLongA DestroyWindow SendMessageA 52478->52652 52482 499889 52483 403400 4 API calls 52482->52483 52484 4998a8 52483->52484 52486 49893a 52485->52486 52487 498958 52486->52487 52488 498951 52486->52488 52490 498993 52487->52490 52491 498987 52487->52491 52831 47fa5c 6 API calls 52488->52831 52493 4989bd 52490->52493 52495 4989bf 52490->52495 52496 4989b3 52490->52496 52832 457950 47 API calls 52491->52832 52494 45850c 38 API calls 52493->52494 52497 498a0a 52494->52497 52834 4584b0 40 API calls 52495->52834 52833 4582f8 46 API calls 52496->52833 52500 403494 4 API calls 52497->52500 52501 498a17 52500->52501 52502 40357c 18 API calls 52501->52502 52503 498a25 52502->52503 52504 45850c 38 API calls 52503->52504 52505 498a2d 52504->52505 52506 403494 4 API calls 52505->52506 52507 498a3a 52506->52507 52508 40357c 18 API calls 52507->52508 52509 498a48 52508->52509 52510 45850c 38 API calls 52509->52510 52511 498a50 52510->52511 52512 403494 4 API calls 52511->52512 52513 498a5d 52512->52513 52514 42d77c 19 API calls 52513->52514 52515 498a65 52514->52515 52516 40357c 18 API calls 52515->52516 52517 498a70 52516->52517 52518 45850c 38 API calls 52517->52518 52519 498a78 52518->52519 52520 47faf8 38 API calls 52519->52520 52521 498a7d 52520->52521 52653 4982ec 36 API calls 52521->52653 52523 498a84 52654 45a944 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52523->52654 52525 498a95 52655 45cf44 19 API calls 52525->52655 52527 498ab0 52656 451b9c 18 API calls 52527->52656 52529 498ac2 52530 403450 18 API calls 52529->52530 52535 498acf 52530->52535 52531 498b0c 52532 498b49 52531->52532 52533 42e708 34 API calls 52531->52533 52657 4982ec 36 API calls 52532->52657 52537 498b1c 52533->52537 52535->52531 52835 4801e8 57 API calls 52535->52835 52536 498b5a 52658 45ae24 18 API calls 52536->52658 52537->52532 52837 4801e8 57 API calls 52537->52837 52540 498b07 52836 409030 19 API calls 52540->52836 52541 498b78 52542 498b86 52541->52542 52839 453aac 18 API calls 52541->52839 52545 498b9f 52542->52545 52546 498b8f 52542->52546 52840 4988c4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52545->52840 52548 403494 4 API calls 52546->52548 52552 498b9d 52548->52552 52550 498b44 52838 409030 19 API calls 52550->52838 52553 498bc1 52552->52553 52841 453aac 18 API calls 52552->52841 52555 498be8 52553->52555 52556 498c04 52553->52556 52557 498bfb 52555->52557 52842 453aac 18 API calls 52555->52842 52844 480640 38 API calls 52556->52844 52843 480640 38 API calls 52557->52843 52561 498c02 52659 47dea0 52561->52659 52564 498cf1 52565 498d7d 52564->52565 52812 496688 52564->52812 52568 498db7 52565->52568 52849 497b6c 57 API calls 52565->52849 52851 4981d0 32 API calls 52568->52851 52569 498c1f 52775 47e184 52569->52775 52571 498d45 52571->52565 52578 45850c 38 API calls 52571->52578 52575 498dad 52575->52568 52850 409030 19 API calls 52575->52850 52576 403450 18 API calls 52577 498c34 52576->52577 52581 403450 18 API calls 52577->52581 52582 498d78 52578->52582 52583 498c47 52581->52583 52848 409030 19 API calls 52582->52848 52586 403450 18 API calls 52583->52586 52585 498df3 52588 498e0f 52585->52588 52589 498df5 Sleep 52585->52589 52590 498c64 52586->52590 52856 451b9c 18 API calls 52588->52856 52855 4248fc 12 API calls 52589->52855 52593 403450 18 API calls 52590->52593 52596 498c71 52593->52596 52594 498dc0 52594->52585 52852 497b6c 57 API calls 52594->52852 52853 409030 19 API calls 52594->52853 52854 45ae60 24 API calls 52594->52854 52595 498e28 52598 42eef8 5 API calls 52595->52598 52599 403450 18 API calls 52596->52599 52600 498e38 52598->52600 52601 498c7e 52599->52601 52857 497a04 109 API calls 52600->52857 52603 403450 18 API calls 52601->52603 52605 498c8b 52603->52605 52604 498e3d 52858 4981d0 32 API calls 52604->52858 52845 498814 18 API calls 52605->52845 52607 498e46 GetTickCount 52859 45b970 194 API calls 52607->52859 52610 498e6a 52613 458718 38 API calls 52610->52613 52611 498c9d 52846 496438 21 API calls 52611->52846 52616 498e8f 52613->52616 52614 498ca9 52847 4964f0 18 API calls 52614->52847 52617 498f15 52616->52617 52860 496578 18 API calls 52616->52860 52618 458718 38 API calls 52617->52618 52620 498f66 52618->52620 52622 498f9c 52620->52622 52861 4248fc 12 API calls 52620->52861 52621 498eca 52621->52617 52624 498f3a 52621->52624 52625 498ed4 52621->52625 52862 4981d0 32 API calls 52622->52862 52628 45850c 38 API calls 52624->52628 52627 496688 32 API calls 52625->52627 52626 498f79 GetTickCount 52626->52622 52629 498f88 MsgWaitForMultipleObjects 52626->52629 52631 498f03 52627->52631 52628->52617 52629->52620 52631->52617 52635 45850c 38 API calls 52631->52635 52632 498faf 52633 498ff0 52632->52633 52634 498fb5 52632->52634 52636 499020 52633->52636 52864 497b6c 57 API calls 52633->52864 52637 498fee 52634->52637 52863 497b6c 57 API calls 52634->52863 52635->52617 52636->52637 52640 45850c 38 API calls 52636->52640 52865 4981d0 32 API calls 52637->52865 52640->52637 52642 499042 52643 4990d4 52642->52643 52866 4965d4 32 API calls 52642->52866 52645 42efa4 2 API calls 52643->52645 52646 499104 52645->52646 52646->52478 52647->52468 52648->52476 52650->52477 52651->52478 52652->52482 52653->52523 52654->52525 52655->52527 52656->52529 52657->52536 52658->52541 52660 47dea8 52659->52660 52660->52660 52867 45418c 52660->52867 52663 403450 18 API calls 52664 47ded5 52663->52664 52665 403494 4 API calls 52664->52665 52666 47dee2 52665->52666 52667 40357c 18 API calls 52666->52667 52668 47def0 52667->52668 52669 45850c 38 API calls 52668->52669 52670 47def8 52669->52670 52671 47df0b 52670->52671 52897 457d04 20 API calls 52670->52897 52673 42c84c 19 API calls 52671->52673 52674 47df18 52673->52674 52675 4035c0 18 API calls 52674->52675 52676 47df28 52675->52676 52677 47df32 CreateDirectoryA 52676->52677 52678 47df3c GetLastError 52677->52678 52700 47df98 52677->52700 52898 451b9c 18 API calls 52678->52898 52681 47df54 52899 4071b8 33 API calls 52681->52899 52682 47dfa5 52684 47dfce 52682->52684 52687 4035c0 18 API calls 52682->52687 52686 403420 4 API calls 52684->52686 52685 47df64 52688 42ed18 19 API calls 52685->52688 52689 47dfe8 52686->52689 52690 47dfbb 52687->52690 52692 47df74 52688->52692 52693 403420 4 API calls 52689->52693 52892 47de48 52690->52892 52900 451b6c 18 API calls 52692->52900 52696 47dff5 52693->52696 52694 47dfc6 52697 458c4c 18 API calls 52694->52697 52696->52564 52701 47d978 52696->52701 52697->52684 52698 47df89 52901 40905c 18 API calls 52698->52901 52885 458c0c 52700->52885 52702 42dce8 19 API calls 52701->52702 52703 47d99c 52702->52703 52704 403450 18 API calls 52703->52704 52705 47d9a9 52704->52705 52706 42dd14 19 API calls 52705->52706 52707 47d9b1 52706->52707 52708 403450 18 API calls 52707->52708 52709 47d9be 52708->52709 53000 42dd40 52709->53000 52711 47d9c6 52712 403450 18 API calls 52711->52712 52713 47d9d3 52712->52713 52714 47d9dc 52713->52714 52715 47d9f8 52713->52715 52716 42d658 19 API calls 52714->52716 52717 403400 4 API calls 52715->52717 52718 47d9e9 52716->52718 52719 47d9f6 52717->52719 52720 403450 18 API calls 52718->52720 52721 47da3d 52719->52721 53024 42cd1c 19 API calls 52719->53024 52720->52719 53004 47d800 52721->53004 52725 47da18 52727 403450 18 API calls 52725->52727 52726 403450 18 API calls 52729 47da59 52726->52729 52728 47da25 52727->52728 52728->52721 52731 403450 18 API calls 52728->52731 52730 47da77 52729->52730 52732 4035c0 18 API calls 52729->52732 52733 47d800 22 API calls 52730->52733 52731->52721 52732->52730 52734 47da86 52733->52734 52735 403450 18 API calls 52734->52735 52736 47da93 52735->52736 52737 47dabb 52736->52737 52738 42c84c 19 API calls 52736->52738 52739 47db22 52737->52739 52742 47d800 22 API calls 52737->52742 52740 47daa9 52738->52740 52741 47dbe8 52739->52741 52744 47db42 SHGetKnownFolderPath 52739->52744 52743 4035c0 18 API calls 52740->52743 52746 47dc12 52741->52746 52747 47dbf1 52741->52747 52745 47dad3 52742->52745 52743->52737 52749 47db95 SHGetKnownFolderPath 52744->52749 52750 47db5c 52744->52750 52751 403450 18 API calls 52745->52751 52748 42c84c 19 API calls 52746->52748 52752 42c84c 19 API calls 52747->52752 52753 47dc1f 52748->52753 52749->52741 52756 47dbaf 52749->52756 53027 403ba4 21 API calls 52750->53027 52755 47dae0 52751->52755 52757 47dbfe 52752->52757 52759 4035c0 18 API calls 52753->52759 52761 47daf3 52755->52761 53025 453aac 18 API calls 52755->53025 53028 403ba4 21 API calls 52756->53028 52758 4035c0 18 API calls 52757->52758 52763 47dc10 52758->52763 52759->52763 52760 47db77 CoTaskMemFree 52760->52569 52766 47d800 22 API calls 52761->52766 53015 47d8e4 52763->53015 52765 47dbca CoTaskMemFree 52765->52569 52768 47db02 52766->52768 52770 403450 18 API calls 52768->52770 52772 47db0f 52770->52772 52771 403400 4 API calls 52773 47dc4b 52771->52773 52772->52739 53026 453aac 18 API calls 52772->53026 52773->52569 52776 42dd14 19 API calls 52775->52776 52777 47e1ae 52776->52777 52778 42c84c 19 API calls 52777->52778 52779 47e1b9 52778->52779 52780 4035c0 18 API calls 52779->52780 52781 47e1c9 52780->52781 53052 452d1c 52781->53052 52784 47e239 52786 42dd14 19 API calls 52784->52786 52785 42c84c 19 API calls 52788 47e21c 52785->52788 52787 47e241 52786->52787 52789 42c84c 19 API calls 52787->52789 52790 4035c0 18 API calls 52788->52790 52791 47e24c 52789->52791 52792 47e22c 52790->52792 52793 40357c 18 API calls 52791->52793 52794 47de48 39 API calls 52792->52794 52795 47e259 52793->52795 52794->52784 52796 42e7e4 2 API calls 52795->52796 52797 47e266 52796->52797 52798 42e7e4 2 API calls 52797->52798 52799 47e273 52798->52799 52800 47e2a6 GetProcAddress 52799->52800 52801 47e281 52799->52801 52803 47e2c2 52800->52803 52804 47e2cc 52800->52804 53055 407d44 33 API calls 52801->53055 53057 453aac 18 API calls 52803->53057 52805 403420 4 API calls 52804->52805 52808 47e2e6 52805->52808 52806 47e29e 53056 453aac 18 API calls 52806->53056 52810 403400 4 API calls 52808->52810 52811 47e2ee 52810->52811 52811->52576 53073 43de68 52812->53073 52815 49673a 52817 496749 52815->52817 53107 495eb0 18 API calls 52815->53107 52816 4966b4 52818 432070 18 API calls 52816->52818 52817->52571 52820 4966c0 52818->52820 53078 4960e0 52820->53078 52826 4966fe 53105 495f44 18 API calls 52826->53105 52828 496712 53106 434270 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52828->53106 52830 496732 52830->52571 52831->52487 52832->52490 52833->52493 52834->52493 52835->52540 52837->52550 52839->52542 52840->52552 52841->52553 52842->52557 52843->52561 52844->52561 52845->52611 52846->52614 52847->52564 52849->52575 52851->52594 52852->52594 52854->52594 52855->52585 52856->52595 52857->52604 52858->52607 52859->52610 52860->52621 52861->52626 52862->52632 52863->52637 52864->52636 52865->52642 52866->52643 52880 4541ac 52867->52880 52869 453f18 25 API calls 52869->52880 52870 4541d1 CreateDirectoryA 52871 454249 52870->52871 52872 4541db GetLastError 52870->52872 52873 403494 4 API calls 52871->52873 52872->52880 52874 454253 52873->52874 52876 403420 4 API calls 52874->52876 52877 45426d 52876->52877 52879 403420 4 API calls 52877->52879 52881 45427a 52879->52881 52880->52869 52880->52870 52882 42ed18 19 API calls 52880->52882 52902 42de68 52880->52902 52925 451b9c 18 API calls 52880->52925 52926 4071b8 33 API calls 52880->52926 52927 451b6c 18 API calls 52880->52927 52928 40905c 18 API calls 52880->52928 52881->52663 52882->52880 52886 458c26 52885->52886 52887 458c18 52885->52887 52888 403400 4 API calls 52886->52888 52889 403494 4 API calls 52887->52889 52891 458c2d 52888->52891 52890 458c24 52889->52890 52890->52682 52891->52682 52953 40d39c 52892->52953 52896 47de7f 52896->52694 52897->52671 52898->52681 52899->52685 52900->52698 52901->52700 52929 42d658 52902->52929 52905 42de9a 52907 42d658 19 API calls 52905->52907 52909 42dee6 52905->52909 52908 42deaa 52907->52908 52910 42deb6 52908->52910 52912 42d198 21 API calls 52908->52912 52937 42cc54 52909->52937 52910->52909 52913 42dedb 52910->52913 52914 42d658 19 API calls 52910->52914 52912->52910 52913->52909 52949 42dce8 GetWindowsDirectoryA 52913->52949 52917 42decf 52914->52917 52917->52913 52920 42d198 21 API calls 52917->52920 52918 42c84c 19 API calls 52919 42defb 52918->52919 52921 403494 4 API calls 52919->52921 52920->52913 52922 42df05 52921->52922 52923 403420 4 API calls 52922->52923 52924 42df1f 52923->52924 52924->52880 52925->52880 52926->52880 52927->52880 52928->52880 52930 4038a4 18 API calls 52929->52930 52931 42d66b 52930->52931 52932 42d682 GetEnvironmentVariableA 52931->52932 52936 42d695 52931->52936 52952 42e020 18 API calls 52931->52952 52932->52931 52933 42d68e 52932->52933 52934 403400 4 API calls 52933->52934 52934->52936 52936->52905 52946 42d198 52936->52946 52938 403738 52937->52938 52939 42cc77 GetFullPathNameA 52938->52939 52940 42cc83 52939->52940 52941 42cc9a 52939->52941 52940->52941 52942 42cc8b 52940->52942 52943 403494 4 API calls 52941->52943 52944 4034e0 18 API calls 52942->52944 52945 42cc98 52943->52945 52944->52945 52945->52918 52947 42d11c 21 API calls 52946->52947 52948 42d19d 52947->52948 52948->52905 52950 407934 18 API calls 52949->52950 52951 42dd09 52950->52951 52951->52909 52952->52931 52954 40d3a6 52953->52954 52964 40d460 FindResourceA 52954->52964 52956 40d3d4 52957 47dd6c 52956->52957 52976 40d1f0 52957->52976 52959 47dda1 52960 403420 4 API calls 52959->52960 52961 47de31 52960->52961 52962 403400 4 API calls 52961->52962 52963 47de39 52962->52963 52963->52896 52965 40d485 52964->52965 52966 40d48c LoadResource 52964->52966 52974 40d3ec 33 API calls 52965->52974 52968 40d4a6 SizeofResource LockResource 52966->52968 52969 40d49f 52966->52969 52972 40d4c4 52968->52972 52975 40d3ec 33 API calls 52969->52975 52970 40d48b 52970->52966 52972->52956 52973 40d4a5 52973->52968 52974->52970 52975->52973 52981 40d0a0 52976->52981 52978 40d20a 52993 40d1d8 19 API calls 52978->52993 52980 40d225 52980->52959 52982 40d0ad 52981->52982 52983 40d0c9 52982->52983 52984 40d0fe 52982->52984 52994 407310 52983->52994 52998 4072d0 CreateFileA 52984->52998 52987 40d0d0 52992 40d0f7 52987->52992 52997 40917c 33 API calls 52987->52997 52988 40d108 52988->52992 52999 40917c 33 API calls 52988->52999 52991 40d12f 52991->52992 52992->52978 52993->52980 52995 403738 52994->52995 52996 40732c CreateFileA 52995->52996 52996->52987 52997->52992 52998->52988 52999->52991 53001 403400 4 API calls 53000->53001 53002 42dd50 GetModuleHandleA GetProcAddress 53001->53002 53003 42dd69 53002->53003 53003->52711 53029 42e26c 53004->53029 53006 47d826 53007 47d84c 53006->53007 53008 47d82a 53006->53008 53010 403400 4 API calls 53007->53010 53032 42e19c 53008->53032 53012 47d853 53010->53012 53012->52726 53013 47d841 RegCloseKey 53013->53012 53014 403400 4 API calls 53014->53013 53016 47d8f2 53015->53016 53017 42e26c RegOpenKeyExA 53016->53017 53018 47d91a 53017->53018 53019 47d94b 53018->53019 53020 42e19c 20 API calls 53018->53020 53019->52771 53021 47d930 53020->53021 53022 42e19c 20 API calls 53021->53022 53023 47d942 RegCloseKey 53022->53023 53023->53019 53024->52725 53025->52761 53026->52739 53027->52760 53028->52765 53030 42e277 53029->53030 53031 42e27d RegOpenKeyExA 53029->53031 53030->53031 53031->53006 53035 42e050 53032->53035 53036 42e076 RegQueryValueExA 53035->53036 53037 42e0bb 53036->53037 53042 42e099 53036->53042 53038 403400 4 API calls 53037->53038 53040 42e187 53038->53040 53039 42e0b3 53041 403400 4 API calls 53039->53041 53040->53013 53040->53014 53041->53037 53042->53037 53042->53039 53043 4034e0 18 API calls 53042->53043 53044 403744 18 API calls 53042->53044 53043->53042 53045 42e0f0 RegQueryValueExA 53044->53045 53045->53036 53046 42e10c 53045->53046 53046->53037 53047 4038a4 18 API calls 53046->53047 53048 42e14e 53047->53048 53049 42e160 53048->53049 53051 403744 18 API calls 53048->53051 53050 403450 18 API calls 53049->53050 53050->53037 53051->53049 53058 452c54 53052->53058 53054 452d29 53054->52784 53054->52785 53055->52806 53056->52800 53057->52804 53059 403738 53058->53059 53060 452c71 75381520 53059->53060 53061 452c7f 53060->53061 53062 452cf6 53060->53062 53063 402648 18 API calls 53061->53063 53066 452d09 53062->53066 53072 452a78 37 API calls 53062->53072 53065 452c86 75381500 53063->53065 53067 452cc4 53065->53067 53068 452caa 75381540 53065->53068 53066->53054 53071 402660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53067->53071 53068->53067 53070 452cee 53070->53054 53071->53070 53072->53066 53108 43238c 53073->53108 53075 403400 4 API calls 53076 43df16 53075->53076 53076->52815 53076->52816 53077 43de92 53077->53075 53079 4961b5 53078->53079 53083 4960fa 53078->53083 53085 4961f8 53079->53085 53081 43420c 18 API calls 53081->53083 53082 432140 18 API calls 53082->53083 53083->53079 53083->53081 53083->53082 53084 403450 18 API calls 53083->53084 53113 40905c 18 API calls 53083->53113 53084->53083 53086 496214 53085->53086 53114 43420c 53086->53114 53088 496219 53089 432140 18 API calls 53088->53089 53090 496224 53089->53090 53091 43da34 53090->53091 53092 43da61 53091->53092 53097 43da53 53091->53097 53092->52826 53093 43dadd 53101 43db97 53093->53101 53117 447524 53093->53117 53095 43db28 53123 43e1f0 53095->53123 53097->53092 53097->53093 53098 447524 18 API calls 53097->53098 53098->53097 53099 43dd9d 53099->53092 53143 4474c4 18 API calls 53099->53143 53101->53099 53102 43dd7e 53101->53102 53141 4474c4 18 API calls 53101->53141 53142 4474c4 18 API calls 53102->53142 53105->52828 53106->52830 53107->52817 53109 403494 4 API calls 53108->53109 53111 43239b 53109->53111 53110 4323c5 53110->53077 53111->53110 53112 403744 18 API calls 53111->53112 53112->53111 53113->53083 53115 402648 18 API calls 53114->53115 53116 43421b 53115->53116 53116->53088 53118 447543 53117->53118 53119 44754a 53117->53119 53144 4472d0 18 API calls 53118->53144 53121 432140 18 API calls 53119->53121 53122 44755a 53121->53122 53122->53095 53124 43e20c 53123->53124 53136 43e239 53123->53136 53124->53136 53145 402660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53124->53145 53126 43e26e 53126->53101 53128 440345 53128->53126 53150 4474c4 18 API calls 53128->53150 53130 43cdd8 18 API calls 53130->53136 53131 4474c4 18 API calls 53131->53136 53135 4341b8 18 API calls 53135->53136 53136->53126 53136->53128 53136->53130 53136->53131 53136->53135 53137 433fb8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53136->53137 53138 436af0 18 API calls 53136->53138 53139 4320e0 18 API calls 53136->53139 53140 4472d0 18 API calls 53136->53140 53146 4372ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53136->53146 53147 439b80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53136->53147 53148 43e0e8 32 API calls 53136->53148 53149 4341d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53136->53149 53137->53136 53138->53136 53139->53136 53140->53136 53141->53101 53142->53099 53143->53099 53144->53119 53145->53124 53146->53136 53147->53136 53148->53136 53149->53136 53150->53128 53151 42e83f SetErrorMode

                              Control-flow Graph

                              APIs
                              • AllocateAndInitializeSid.ADVAPI32(0049B788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E526
                              • GetVersion.KERNEL32(00000000,0042E6D0,?,0049B788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E543
                              • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E6D0,?,0049B788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E55C
                              • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E562
                              • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E6D0,?,0049B788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E577
                              • FreeSid.ADVAPI32(00000000,0042E6D7,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E6CA
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                              • String ID: CheckTokenMembership$advapi32.dll
                              • API String ID: 2252812187-1888249752
                              • Opcode ID: deafe6b7757909291430a7e68a5a22869ae20224b631ead964b334e030043609
                              • Instruction ID: 33373ee259e646c263c3edb0d375fd355344fbe6f0fea3053a31bb261822ccd7
                              • Opcode Fuzzy Hash: deafe6b7757909291430a7e68a5a22869ae20224b631ead964b334e030043609
                              • Instruction Fuzzy Hash: 33518371B44619AEDB10EAE69842B7F77ACDB19304FD4047BB500F72C2D57CD904876A

                              Control-flow Graph

                              APIs
                              • GetVersion.KERNEL32(00000000,00450AB1,?,?,?,?,00000000,00000000), ref: 004509BF
                                • Part of subcall function 00450964: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0045097C
                              • LoadLibraryA.KERNEL32(00000000,00000000,00450AB1,?,?,?,?,00000000,00000000), ref: 004509FB
                              • GetProcAddress.KERNEL32(00000000,RmStartSession), ref: 00450A19
                              • GetProcAddress.KERNEL32(00000000,RmRegisterResources), ref: 00450A2E
                              • GetProcAddress.KERNEL32(00000000,RmGetList), ref: 00450A43
                              • GetProcAddress.KERNEL32(00000000,RmShutdown), ref: 00450A58
                              • GetProcAddress.KERNEL32(00000000,RmRestart), ref: 00450A6D
                              • GetProcAddress.KERNEL32(00000000,RmEndSession), ref: 00450A82
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc$DirectoryLibraryLoadSystemVersion
                              • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                              • API String ID: 2754715182-3419246398
                              • Opcode ID: 48feb3d18bb3249ae5a53bbacc216d9b6c25640ebcfb5a938a283db57bcc8296
                              • Instruction ID: 7e76809d132c55fa29070b713de61cc7a3e08993567f6b48a797f9432d6667d5
                              • Opcode Fuzzy Hash: 48feb3d18bb3249ae5a53bbacc216d9b6c25640ebcfb5a938a283db57bcc8296
                              • Instruction Fuzzy Hash: 58212AB4A00304AEE710FBA5EC86A6E77F8E764755F50053BB810A71A3D6789D49CB1C

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 971 42405c-424090 972 424092-424093 971->972 973 4240c4-4240db call 423fb8 971->973 974 424095-4240b1 call 40b69c 972->974 979 42413c-424141 973->979 980 4240dd 973->980 1000 4240b3-4240bb 974->1000 1001 4240c0-4240c2 974->1001 981 424143 979->981 982 424177-42417c 979->982 983 4240e3-4240e6 980->983 984 4241a0-4241b0 980->984 990 424401-424409 981->990 991 424149-424151 981->991 985 424182-424185 982->985 986 4244ea-4244f8 IsIconic 982->986 992 424115-424118 983->992 993 4240e8 983->993 988 4241b2-4241b7 984->988 989 4241bb-4241c3 call 4245e4 984->989 994 424526-42453b call 424ca0 985->994 995 42418b-42418c 985->995 996 4245a2-4245aa 986->996 1005 4244fe-424509 GetFocus 986->1005 1002 4241c8-4241d0 call 42462c 988->1002 1003 4241b9-4241dc call 423fd4 988->1003 989->996 990->996 997 42440f-42441a call 418630 990->997 1006 424363-42438a SendMessageA 991->1006 1007 424157-42415c 991->1007 998 4241f9-424200 992->998 999 42411e-42411f 992->999 1008 424246-424256 call 423fd4 993->1008 1009 4240ee-4240f1 993->1009 994->996 1019 424192-424195 995->1019 1020 42453d-424544 995->1020 1017 4245c1-4245c7 996->1017 997->996 1052 424420-42442f call 418630 IsWindowEnabled 997->1052 998->996 1012 424206-42420d 998->1012 1013 424125-424128 999->1013 1014 42438f-424396 999->1014 1000->1017 1001->973 1001->974 1002->996 1003->996 1005->996 1024 42450f-424518 call 41f444 1005->1024 1006->996 1015 424162-424163 1007->1015 1016 42449a-4244a5 1007->1016 1008->996 1025 4240f7-4240fa 1009->1025 1026 42426e-42428a PostMessageA call 423fd4 1009->1026 1012->996 1033 424213-424219 1012->1033 1034 42412e-424131 1013->1034 1035 42428f-4242af call 423fd4 1013->1035 1014->996 1042 42439c-4243a1 call 404e54 1014->1042 1036 4244c2-4244cd 1015->1036 1037 424169-42416c 1015->1037 1016->996 1039 4244ab-4244bd 1016->1039 1040 424570-424577 1019->1040 1041 42419b 1019->1041 1030 424546-424559 call 424924 1020->1030 1031 42455b-42456e call 42497c 1020->1031 1024->996 1083 42451e-424524 SetFocus 1024->1083 1027 424100-424103 1025->1027 1028 4242f5-4242fc 1025->1028 1026->996 1047 424109-42410a 1027->1047 1048 42421e-42422c IsIconic 1027->1048 1049 4242fe-424311 call 423f64 1028->1049 1050 42432f-424340 call 423fd4 1028->1050 1030->996 1031->996 1033->996 1053 424137 1034->1053 1054 42425b-424269 call 4245c8 1034->1054 1094 4242d3-4242f0 call 423ed4 PostMessageA 1035->1094 1095 4242b1-4242ce call 423f64 PostMessageA 1035->1095 1036->996 1061 4244d3-4244e5 1036->1061 1058 424172 1037->1058 1059 4243a6-4243ae 1037->1059 1039->996 1056 42458a-424599 1040->1056 1057 424579-424588 1040->1057 1060 42459b-42459c call 423fd4 1041->1060 1042->996 1067 424110 1047->1067 1068 4241e1-4241e9 1047->1068 1074 42423a-424241 call 423fd4 1048->1074 1075 42422e-424235 call 424010 1048->1075 1098 424323-42432a call 423fd4 1049->1098 1099 424313-42431d call 41f3a8 1049->1099 1103 424342-424350 call 41f2f4 1050->1103 1104 424356-42435e call 423ed4 1050->1104 1052->996 1100 424435-424444 call 418630 IsWindowVisible 1052->1100 1053->1060 1054->996 1056->996 1057->996 1058->1060 1059->996 1081 4243b4-4243bb 1059->1081 1090 4245a1 1060->1090 1061->996 1067->1060 1068->996 1084 4241ef-4241f4 call 42309c 1068->1084 1074->996 1075->996 1081->996 1093 4243c1-4243d0 call 418630 IsWindowEnabled 1081->1093 1083->996 1084->996 1090->996 1093->996 1121 4243d6-4243ec call 412760 1093->1121 1094->996 1095->996 1098->996 1099->1098 1100->996 1123 42444a-424495 GetFocus call 418630 SetFocus call 415690 SetFocus 1100->1123 1103->1104 1104->996 1121->996 1126 4243f2-4243fc 1121->1126 1123->996 1126->996
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 21c1d4311efb6c65e198997e93c19565dd4c2e83c258eeb41370f625f2e8048b
                              • Instruction ID: 43e49367b0b6739e18dd975752e7d81306140be7a57883210305ee73c05c6530
                              • Opcode Fuzzy Hash: 21c1d4311efb6c65e198997e93c19565dd4c2e83c258eeb41370f625f2e8048b
                              • Instruction Fuzzy Hash: 59E16E30704124EFD710DB6AE685A5DB7F4EF84314FA540A6F6859B392CB38EE81DB09
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,00453207,?,?,-00000001,00000000), ref: 004531E1
                              • GetLastError.KERNEL32(00000000,?,00000000,00453207,?,?,-00000001,00000000), ref: 004531E9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorFileFindFirstLast
                              • String ID:
                              • API String ID: 873889042-0
                              • Opcode ID: 463e487d8d9145aa6576d943d4051b9a59c7b8ef21b6fe351ba6d4d416e364c7
                              • Instruction ID: d0bf465202dae3429285692917932fac375c13b7b10a14b33624456fe0da4cd4
                              • Opcode Fuzzy Hash: 463e487d8d9145aa6576d943d4051b9a59c7b8ef21b6fe351ba6d4d416e364c7
                              • Instruction Fuzzy Hash: FEF02371A046047BCB10DF7AAC0145EF7ACDB4577675046BBFC14D3291DB784F088558
                              APIs
                              • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049D4C4,00000001,?,00408A83,?,00000000,00408B62), ref: 004089D6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: InfoLocale
                              • String ID:
                              • API String ID: 2299586839-0
                              • Opcode ID: 40f9e6ad7b9874a9b05efedc53f019727417c817c0661ecad43f37488e602a1d
                              • Instruction ID: 37d1d3aac47cb6b8cd62020f591dd9ac8cec50bf03644e7f1bddec785b1dbc63
                              • Opcode Fuzzy Hash: 40f9e6ad7b9874a9b05efedc53f019727417c817c0661ecad43f37488e602a1d
                              • Instruction Fuzzy Hash: 63E0227170021452C315A91A8C82AFAB24C9B18314F00427FB948E73C3EDB89E8042ED
                              APIs
                              • NtdllDefWindowProc_A.USER32(?,?,?,?,?,004245A1,?,00000000,004245AC), ref: 00423FFE
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: NtdllProc_Window
                              • String ID:
                              • API String ID: 4255912815-0
                              • Opcode ID: 15ec92afe3337674697e5aaff926351660f6d808b83c1ecc1d592f8d8ff41db7
                              • Instruction ID: 626c949ff67c0b5daba62b8ffba664747ea83a29b03f4787c3cb7294a8149fcf
                              • Opcode Fuzzy Hash: 15ec92afe3337674697e5aaff926351660f6d808b83c1ecc1d592f8d8ff41db7
                              • Instruction Fuzzy Hash: 9CF0B379205608AF8B40DF99C588D4ABBE8AB4C260B058295B988CB321C234EE808F94
                              APIs
                              • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F9DC
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: NtdllProc_Window
                              • String ID:
                              • API String ID: 4255912815-0
                              • Opcode ID: 2621fde08b5d071fc730d3c03362a0ac5d2de45ee12ad7e5c10e42539110ff87
                              • Instruction ID: 416a4692ed3cb8c0a12f59f0b22837e163b9cfd3c66ebd18f18690eb3ad7abe4
                              • Opcode Fuzzy Hash: 2621fde08b5d071fc730d3c03362a0ac5d2de45ee12ad7e5c10e42539110ff87
                              • Instruction Fuzzy Hash: 07D0A7B220010C7FDB00DE98D840D6B33BC9B8C700B90C826F945C7241D234EDA0CBB8

                              Control-flow Graph

                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32.dll,00000000,0040668E,?,?,?,?,00000000,?,0049A4A8), ref: 0040640F
                              • GetVersion.KERNEL32(kernel32.dll,00000000,0040668E,?,?,?,?,00000000,?,0049A4A8), ref: 00406416
                              • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0040642B
                              • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406453
                              • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406655
                              • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040666B
                              • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,kernel32.dll,00000000,0040668E,?,?,?,?,00000000,?,0049A4A8), ref: 00406676
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModulePolicyProcessVersion
                              • String ID: SetDefaultDllDirectories$SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$apphelp.dll$clbcatq.dll$comres.dll$cryptbase.dll$dwmapi.dll$kernel32.dll$oleacc.dll$profapi.dll$propsys.dll$setupapi.dll$userenv.dll$uxtheme.dll$version.dll
                              • API String ID: 3297890031-2388063882
                              • Opcode ID: 5389efc0ffea24bf8a606d939aa13ccb9694e00964d43272de38489a6f5244ea
                              • Instruction ID: 52ceb319b1b10a2745084cc2a18598c2ecefae742a63aceaaee3a2f28509b87b
                              • Opcode Fuzzy Hash: 5389efc0ffea24bf8a606d939aa13ccb9694e00964d43272de38489a6f5244ea
                              • Instruction Fuzzy Hash: 7061F130A00109EBCB01FBA6D982D8E77B9AB44709B214077B405772E6DB3DEF199B5D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 866 484e68-484e8d GetModuleHandleA GetProcAddress 867 484e8f-484ea5 GetNativeSystemInfo GetProcAddress 866->867 868 484ef4-484ef9 GetSystemInfo 866->868 869 484efe-484f07 867->869 870 484ea7-484eb2 GetCurrentProcess 867->870 868->869 871 484f09-484f0d 869->871 872 484f17-484f1e 869->872 870->869 877 484eb4-484eb8 870->877 874 484f0f-484f13 871->874 875 484f20-484f27 871->875 876 484f39-484f3e 872->876 878 484f29-484f30 874->878 879 484f15-484f32 874->879 875->876 877->869 880 484eba-484ec1 call 452e60 877->880 878->876 879->876 880->869 884 484ec3-484ed0 GetProcAddress 880->884 884->869 885 484ed2-484ee9 GetModuleHandleA GetProcAddress 884->885 885->869 886 484eeb-484ef2 885->886 886->869
                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00484E79
                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00484E86
                              • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00484E94
                              • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00484E9C
                              • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00484EA8
                              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00484EC9
                              • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00484EDC
                              • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00484EE2
                              • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00484EF9
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                              • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                              • API String ID: 2230631259-2623177817
                              • Opcode ID: a9e7c72b88ffdf774222e8b1eec2b6d32a2bc4fa4b8ab495cd5abb19adf26cf6
                              • Instruction ID: 19f93fc1e60286517b98713993879556ba5b021e510ed05db2a10d1898c9039d
                              • Opcode Fuzzy Hash: a9e7c72b88ffdf774222e8b1eec2b6d32a2bc4fa4b8ab495cd5abb19adf26cf6
                              • Instruction Fuzzy Hash: E8110351109353A4E721B3796E46B7F25889B8031CF080C7F7B84666C6EA7CC845833F

                              Control-flow Graph

                              APIs
                                • Part of subcall function 0042DCE8: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,0045451C,00000000,004547CE,?,?,00000000,0049D62C,00000004,00000000,00000000,00000000,?,00499C8D), ref: 0042DCFB
                                • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                • Part of subcall function 0042DD40: GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,004542C2,00000000,00454365,?,?,00000000,00000000,00000000,00000000,00000000,?,00454755,00000000), ref: 0042DD5A
                                • Part of subcall function 0042DD40: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042DD60
                              • SHGetKnownFolderPath.SHELL32(0049BD44,00008000,00000000,?,00000000,0047DC4C), ref: 0047DB52
                              • CoTaskMemFree.OLE32(?,0047DB95), ref: 0047DB88
                                • Part of subcall function 0042D658: GetEnvironmentVariableA.KERNEL32(00000000,00000000,00000000,?,?,00000000,0042DE8E,00000000,0042DF20,?,?,?,0049D62C,00000000,00000000), ref: 0042D683
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Directory$AddressEnvironmentFolderFreeHandleKnownModulePathProcSystemTaskVariableWindows
                              • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                              • API String ID: 3771764029-544719455
                              • Opcode ID: 6ec6ff986ef5dd5265772e09c3445ba75f4a3d0a7ec86f160005d9c17a7e769a
                              • Instruction ID: 0fe7c2c5921331aa3b985ab989dbf77b3a087c61dea5e3792aec770f31e1cce1
                              • Opcode Fuzzy Hash: 6ec6ff986ef5dd5265772e09c3445ba75f4a3d0a7ec86f160005d9c17a7e769a
                              • Instruction Fuzzy Hash: A061B234E24204AFDB11EFA6D84269E7B78EF84318F51C57BE404AB391D77CAA41CA1D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1130 47e184-47e1d6 call 42dd14 call 42c84c call 4035c0 call 452d1c 1139 47e1f3-47e1fa 1130->1139 1140 47e1d8-47e1df 1130->1140 1143 47e205-47e207 1139->1143 1144 47e1fc-47e203 1139->1144 1141 47e1e1-47e1e8 1140->1141 1142 47e209 1140->1142 1141->1139 1145 47e1ea-47e1f1 1141->1145 1146 47e20b-47e20d 1142->1146 1143->1146 1144->1142 1144->1143 1145->1139 1145->1142 1147 47e20f-47e234 call 42c84c call 4035c0 call 47de48 1146->1147 1148 47e239-47e26e call 42dd14 call 42c84c call 40357c call 42e7e4 * 2 1146->1148 1147->1148 1163 47e273-47e27f 1148->1163 1164 47e2a6-47e2c0 GetProcAddress 1163->1164 1165 47e281-47e2a1 call 407d44 call 453aac 1163->1165 1167 47e2c2-47e2c7 call 453aac 1164->1167 1168 47e2cc-47e2ee call 403420 call 403400 1164->1168 1165->1164 1167->1168
                              APIs
                                • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                              • GetProcAddress.KERNEL32(00000000,SHGetFolderPathA), ref: 0047E2B1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressDirectoryProcSystem
                              • String ID: 2$Failed to get address of SHGetFolderPath function$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                              • API String ID: 996212319-3422985891
                              • Opcode ID: f69e38f6b699ed73f32ac96f2dd1254bf471a540d8ea9ce7556b74a8ed90f622
                              • Instruction ID: 9758cc0716918fe71002c31ee1435c1447d2ac946059de1b269defc554b01a12
                              • Opcode Fuzzy Hash: f69e38f6b699ed73f32ac96f2dd1254bf471a540d8ea9ce7556b74a8ed90f622
                              • Instruction Fuzzy Hash: C9415830A00119DFDB10DFA6C9415DE77B8FB48309F50C9BBE414A7252D7389E05CB59

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1176 423cc4-423cce 1177 423df7-423dfb 1176->1177 1178 423cd4-423cf6 call 41f814 GetClassInfoA 1176->1178 1181 423d27-423d30 GetSystemMetrics 1178->1181 1182 423cf8-423d0f RegisterClassA 1178->1182 1183 423d32 1181->1183 1184 423d35-423d3f GetSystemMetrics 1181->1184 1182->1181 1185 423d11-423d22 call 40910c call 40311c 1182->1185 1183->1184 1187 423d41 1184->1187 1188 423d44-423da0 call 403738 call 4062f8 call 403400 call 423a9c SetWindowLongA 1184->1188 1185->1181 1187->1188 1199 423da2-423db5 call 4245c8 SendMessageA 1188->1199 1200 423dba-423de8 GetSystemMenu DeleteMenu * 2 1188->1200 1199->1200 1200->1177 1202 423dea-423df2 DeleteMenu 1200->1202 1202->1177
                              APIs
                                • Part of subcall function 0041F814: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041F1F4,?,00423CDF,0042405C,0041F1F4), ref: 0041F832
                              • GetClassInfoA.USER32(00400000,00423ACC), ref: 00423CEF
                              • RegisterClassA.USER32(0049B630), ref: 00423D07
                              • GetSystemMetrics.USER32(00000000), ref: 00423D29
                              • GetSystemMetrics.USER32(00000001), ref: 00423D38
                              • SetWindowLongA.USER32(004108B0,000000FC,00423ADC), ref: 00423D94
                              • SendMessageA.USER32(004108B0,00000080,00000001,00000000), ref: 00423DB5
                              • GetSystemMenu.USER32(004108B0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042405C,0041F1F4), ref: 00423DC0
                              • DeleteMenu.USER32(00000000,0000F030,00000000,004108B0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042405C,0041F1F4), ref: 00423DCF
                              • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,004108B0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 00423DDC
                              • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,004108B0,00000000,00000000,00400000,00000000,00000000,00000000), ref: 00423DF2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                              • String ID:
                              • API String ID: 183575631-0
                              • Opcode ID: 3116a5487ebf53a9d66fce753d5cf134baefce0d2e8bfc1e8daa4fcba584e635
                              • Instruction ID: 7df3f4c256e16cf88ed5bb8a347b5b3a25df550de305930316ee8fcfc6e0617b
                              • Opcode Fuzzy Hash: 3116a5487ebf53a9d66fce753d5cf134baefce0d2e8bfc1e8daa4fcba584e635
                              • Instruction Fuzzy Hash: 203164B17502106AEB10AF65DC86F6A3698D714709F60017AFA40EF2D7C6BDED40476D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1204 482c40-482c6f call 45850c 1207 482d3c-482d4b 1204->1207 1208 482c75-482c77 1204->1208 1214 482d4d-482d4e 1207->1214 1215 482d7e-482d98 1207->1215 1209 482c79-482cb9 call 496758 1208->1209 1210 482cdb-482d37 call 4965d4 call 42e7d4 1208->1210 1209->1210 1210->1207 1218 482d50-482d7c call 45304c 1214->1218 1224 482dca-482de0 call 46e178 1215->1224 1225 482d9a-482dc8 call 453554 1215->1225 1218->1215 1235 482dee-482df5 1224->1235 1236 482de2-482de7 1224->1236 1225->1224 1238 482e02-482e09 1235->1238 1239 482df7-482dfd FreeLibrary 1235->1239 1236->1235 1240 482e0b-482e11 FreeLibrary 1238->1240 1241 482e16-482e1b call 47e3d0 call 47e0a8 1238->1241 1239->1238 1240->1241 1245 482e20-482e27 1241->1245 1246 482e29-482e30 1245->1246 1247 482e43-482e5c call 457a90 call 42efa4 1245->1247 1246->1247 1248 482e32-482e3c call 45850c 1246->1248 1255 482e5e-482e6f call 45850c 1247->1255 1256 482e8f-482ea4 call 403400 1247->1256 1248->1247 1261 482e8a call 4803c8 1255->1261 1262 482e71-482e88 SendNotifyMessageA 1255->1262 1261->1256 1262->1256
                              APIs
                              • FreeLibrary.KERNEL32(00000000), ref: 00482DFD
                              • FreeLibrary.KERNEL32(00000000), ref: 00482E11
                              • SendNotifyMessageA.USER32(000103E6,00000496,00002710,00000000), ref: 00482E83
                              Strings
                              • Not restarting Windows because Setup is being run from the debugger., xrefs: 00482E32
                              • Deinitializing Setup., xrefs: 00482C5E
                              • Restarting Windows., xrefs: 00482E5E
                              • DeinitializeSetup, xrefs: 00482CF9
                              • GetCustomSetupExitCode, xrefs: 00482C9D
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FreeLibrary$MessageNotifySend
                              • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                              • API String ID: 3817813901-1884538726
                              • Opcode ID: 9c2bbffa538aa2e5b055a523d915f2d38be36e5908d6c0a026212498e4b0fc52
                              • Instruction ID: 87ca8a1097935e6c4637b022688acffdd958b69fb8a4991d3dc3ea9519d40e2c
                              • Opcode Fuzzy Hash: 9c2bbffa538aa2e5b055a523d915f2d38be36e5908d6c0a026212498e4b0fc52
                              • Instruction Fuzzy Hash: F851AA30600200EFD711EF6AD949B6E7BE4EB19718F51897BE800D72A1DBB89C45CB5D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1264 42fa00-42fa0a 1265 42fa14-42fa51 call 402b30 GetActiveWindow GetFocus call 41f2f4 1264->1265 1266 42fa0c-42fa0f call 402d30 1264->1266 1272 42fa63-42fa6b 1265->1272 1273 42fa53-42fa5d RegisterClassA 1265->1273 1266->1265 1274 42faf2-42fb0e SetFocus call 403400 1272->1274 1275 42fa71-42faa2 CreateWindowExA 1272->1275 1273->1272 1275->1274 1277 42faa4-42fae8 call 4246cc call 403738 CreateWindowExA 1275->1277 1277->1274 1283 42faea-42faed ShowWindow 1277->1283 1283->1274
                              APIs
                              • GetActiveWindow.USER32 ref: 0042FA2F
                              • GetFocus.USER32 ref: 0042FA37
                              • RegisterClassA.USER32(0049B7AC), ref: 0042FA58
                              • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042FB2C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042FA96
                              • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042FADC
                              • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042FAED
                              • SetFocus.USER32(00000000,00000000,0042FB0F,?,?,?,00000001,00000000,?,00458B4E,00000000,0049D62C), ref: 0042FAF4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$CreateFocus$ActiveClassRegisterShow
                              • String ID: TWindowDisabler-Window
                              • API String ID: 3167913817-1824977358
                              • Opcode ID: 3c7406693a806fc702599f26db20f40cbea2d46a7ea9eeed4cdd03095dd28fc9
                              • Instruction ID: be32ada46e774ba6914a87ad40c025b2c9e25f6d11d521099bf08b28c91ad89a
                              • Opcode Fuzzy Hash: 3c7406693a806fc702599f26db20f40cbea2d46a7ea9eeed4cdd03095dd28fc9
                              • Instruction Fuzzy Hash: E121B570B40720BAE210EB65EC03F1A76B4EB04B04FA1813BF504BB2D1D7B96C1487AD

                              Control-flow Graph

                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004539F2,?,?,?,?,00000000,00000000,?,0049A4EE), ref: 00453956
                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045395C
                              • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004539F2,?,?,?,?,00000000,00000000,?,0049A4EE), ref: 00453970
                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453976
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                              • API String ID: 1646373207-2130885113
                              • Opcode ID: 1fb098f05e18c104bfd33b87b24b51fb30a113402864c12f9b3e2886ec2a11b3
                              • Instruction ID: a193a4472c2853cf72940ff7690ab9972ac4b2f80f688c1a00737a0c34b4483d
                              • Opcode Fuzzy Hash: 1fb098f05e18c104bfd33b87b24b51fb30a113402864c12f9b3e2886ec2a11b3
                              • Instruction Fuzzy Hash: B211E3B0A00244BBDB00EF66DC03F5E7BA8D70475AF60447BF84166282D6BC9F088A2D

                              Control-flow Graph

                              APIs
                              • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430DE8
                              • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430DF7
                              • GetCurrentThreadId.KERNEL32 ref: 00430E11
                              • GlobalAddAtomA.KERNEL32(00000000), ref: 00430E32
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                              • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                              • API String ID: 4130936913-2943970505
                              • Opcode ID: 3d8cc781ee18fa8c952338c7aeccd5cde5f7178f92cefd0c0b13886a56b953da
                              • Instruction ID: dd09876b0f9c3184917b018614b917cdad608ae665b29eb2c15b2e3af62d5cdc
                              • Opcode Fuzzy Hash: 3d8cc781ee18fa8c952338c7aeccd5cde5f7178f92cefd0c0b13886a56b953da
                              • Instruction Fuzzy Hash: 98F082B09483409ED300EF26890371A7AE0AB58708F404F3FB48CA2291D7399910CB1F

                              Control-flow Graph

                              APIs
                              • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,00455994,00455994,?,00455994,00000000), ref: 00455922
                              • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,00455994,00455994,?,00455994), ref: 0045592F
                                • Part of subcall function 004556E4: WaitForInputIdle.USER32(?,00000032), ref: 00455710
                                • Part of subcall function 004556E4: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00455732
                                • Part of subcall function 004556E4: GetExitCodeProcess.KERNEL32(?,?), ref: 00455741
                                • Part of subcall function 004556E4: CloseHandle.KERNEL32(?,0045576E,00455767,?,?,?,00000000,?,?,00455943,?,?,?,00000044,00000000,00000000), ref: 00455761
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                              • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                              • API String ID: 854858120-615399546
                              • Opcode ID: 73fd1b88a1d83c3c694b0698d8f27993cd14c46a6ca70bf0dbfba164b18fe5ee
                              • Instruction ID: 19165e213e9236b89a5b086241af4e71530f18fc7e42ed674525c8849c01d6f6
                              • Opcode Fuzzy Hash: 73fd1b88a1d83c3c694b0698d8f27993cd14c46a6ca70bf0dbfba164b18fe5ee
                              • Instruction Fuzzy Hash: F4514A7060074DABDB11EF96C892BEEBBB9AF44315F50403BF804BB282D77C99198759
                              APIs
                              • LoadIconA.USER32(00400000,MAINICON), ref: 00423B6C
                              • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00419436,00000000,?,?,?,00000001), ref: 00423B99
                              • OemToCharA.USER32(?,?), ref: 00423BAC
                              • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00419436,00000000,?,?,?,00000001), ref: 00423BEC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Char$FileIconLoadLowerModuleName
                              • String ID: 2$MAINICON
                              • API String ID: 3935243913-3181700818
                              • Opcode ID: 5bb029359a14fe80b98f3d31a1bddee7a09f53b94ef6d4528e1ea31487fdaa44
                              • Instruction ID: e5d3831d9b5483d4bbbd2f836839ca6b10e9aa02fde8f17f2ef2fb4492c3d901
                              • Opcode Fuzzy Hash: 5bb029359a14fe80b98f3d31a1bddee7a09f53b94ef6d4528e1ea31487fdaa44
                              • Instruction Fuzzy Hash: 6031A271A042549ADB10EF29C8C57C67BE8AF14308F4045BAE844DB383D7BED988CB59
                              APIs
                              • GetCurrentProcessId.KERNEL32(00000000), ref: 0041938D
                              • GlobalAddAtomA.KERNEL32(00000000), ref: 004193AE
                              • GetCurrentThreadId.KERNEL32 ref: 004193C9
                              • GlobalAddAtomA.KERNEL32(00000000), ref: 004193EA
                                • Part of subcall function 00423518: GetDC.USER32(00000000), ref: 0042356E
                                • Part of subcall function 00423518: EnumFontsA.GDI32(00000000,00000000,004234B8,004108B0,00000000,?,?,00000000,?,00419423,00000000,?,?,?,00000001), ref: 00423581
                                • Part of subcall function 00423518: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423589
                                • Part of subcall function 00423518: ReleaseDC.USER32(00000000,00000000), ref: 00423594
                                • Part of subcall function 00423ADC: LoadIconA.USER32(00400000,MAINICON), ref: 00423B6C
                                • Part of subcall function 00423ADC: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00419436,00000000,?,?,?,00000001), ref: 00423B99
                                • Part of subcall function 00423ADC: OemToCharA.USER32(?,?), ref: 00423BAC
                                • Part of subcall function 00423ADC: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00419436,00000000,?,?,?,00000001), ref: 00423BEC
                                • Part of subcall function 0041F568: GetVersion.KERNEL32(?,00419440,00000000,?,?,?,00000001), ref: 0041F576
                                • Part of subcall function 0041F568: SetErrorMode.KERNEL32(00008000,?,00419440,00000000,?,?,?,00000001), ref: 0041F592
                                • Part of subcall function 0041F568: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419440,00000000,?,?,?,00000001), ref: 0041F59E
                                • Part of subcall function 0041F568: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419440,00000000,?,?,?,00000001), ref: 0041F5AC
                                • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F5DC
                                • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F605
                                • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F61A
                                • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F62F
                                • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F644
                                • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F659
                                • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F66E
                                • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F683
                                • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F698
                                • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F6AD
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$CapsDeviceEnumFileFontsIconLibraryLowerModuleNameProcessReleaseThreadVersion
                              • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                              • API String ID: 316262546-2767913252
                              • Opcode ID: f95d04e94164b50ac2ab58baf663b117a75a9c0d8836e65ac0a83676a8f573fc
                              • Instruction ID: 7870b9ea93aa7f75565cd31cdf92f475c288cd9ab0443d66b722f1effdfa130a
                              • Opcode Fuzzy Hash: f95d04e94164b50ac2ab58baf663b117a75a9c0d8836e65ac0a83676a8f573fc
                              • Instruction Fuzzy Hash: 8D112C70A182419AC300FF36D44279A7AE09BA430CF50893FF488AB3A1DB3D9D458B5E
                              APIs
                              • RtlEnterCriticalSection.KERNEL32(0049D420,00000000,00401B68), ref: 00401ABD
                              • LocalFree.KERNEL32(00000000,00000000,00401B68), ref: 00401ACF
                              • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,00401B68), ref: 00401AEE
                              • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00401B68), ref: 00401B2D
                              • RtlLeaveCriticalSection.KERNEL32(0049D420,00401B6F), ref: 00401B58
                              • RtlDeleteCriticalSection.KERNEL32(0049D420,00401B6F), ref: 00401B62
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                              • String ID:
                              • API String ID: 3782394904-0
                              • Opcode ID: a09964db7d5e1398f2afb7250b5a8c8ddfedb2b5ecba3fe18733cc428a63f314
                              • Instruction ID: 86217af8f0c65890f5da76d4fe10d609cc5e2f7049d93a5e71f2b830536aceac
                              • Opcode Fuzzy Hash: a09964db7d5e1398f2afb7250b5a8c8ddfedb2b5ecba3fe18733cc428a63f314
                              • Instruction Fuzzy Hash: 7A11BF70E003405AEB15AB659D82B267BE4976570CF44007BF50067AF1D77CB840C76E
                              APIs
                              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047DFF6,?,?,00000000,0049D62C,00000000,00000000,?,00499E21,00000000,00499FCA,?,00000000), ref: 0047DF33
                              • GetLastError.KERNEL32(00000000,00000000,00000000,0047DFF6,?,?,00000000,0049D62C,00000000,00000000,?,00499E21,00000000,00499FCA,?,00000000), ref: 0047DF3C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CreateDirectoryErrorLast
                              • String ID: Created temporary directory: $\_setup64.tmp$_isetup
                              • API String ID: 1375471231-2952887711
                              • Opcode ID: 3cf7176a2f833250ea6f039e9bac44038ac4a0ff8092d6bf07e5b81213f8e26d
                              • Instruction ID: ecaa8d991a706e785fb0a456308ec2ceb04ba6e672c042181299f5b248b5f278
                              • Opcode Fuzzy Hash: 3cf7176a2f833250ea6f039e9bac44038ac4a0ff8092d6bf07e5b81213f8e26d
                              • Instruction Fuzzy Hash: A2414634A101099BCB01EF95DC81ADEB7B9EF44309F50847BE901B7392DB38AE05CB69
                              APIs
                              • FindNextFileA.KERNEL32(000000FF,?,00000000,00454AAE,?,00000000,00454B22,?,?,-00000001,00000000,?,0047E107,00000000,0047E054,00000000), ref: 00454A8A
                              • FindClose.KERNEL32(000000FF,00454AB5,00454AAE,?,00000000,00454B22,?,?,-00000001,00000000,?,0047E107,00000000,0047E054,00000000,00000000), ref: 00454AA8
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Find$CloseFileNext
                              • String ID: .H$ .H
                              • API String ID: 2066263336-1676226347
                              • Opcode ID: b812543ddd1e95e384549bb7c1e7a692720bc7ce5864c938cf5b8a0bd1faa7d1
                              • Instruction ID: 86a97b531f1ad2b4b7463d4220b8e0547854eedc1a857b6a9afda59406c2b972
                              • Opcode Fuzzy Hash: b812543ddd1e95e384549bb7c1e7a692720bc7ce5864c938cf5b8a0bd1faa7d1
                              • Instruction Fuzzy Hash: CF81A43490428DAFCF11DF65C8417EFBBB4AF89309F1440A6D8546B392C3399E8ACB58
                              APIs
                              • 75381520.VERSION(00000000,?,?,?,?), ref: 00452C74
                              • 75381500.VERSION(00000000,?,00000000,?,00000000,00452CEF,?,00000000,?,?,?,?), ref: 00452CA1
                              • 75381540.VERSION(?,00452D18,?,?,00000000,?,00000000,?,00000000,00452CEF,?,00000000,?,?,?,?), ref: 00452CBB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: 753815007538152075381540
                              • String ID: )-E
                              • API String ID: 3367396946-3997256589
                              • Opcode ID: 1e3fa64680b4daa2d15fd70f35a4d6916cc241641b57064dc1621c371eabb0d9
                              • Instruction ID: 50707f88950aac898d8c4389756beb7c92bb5193b179b1fc1fca76f0aa7be7f8
                              • Opcode Fuzzy Hash: 1e3fa64680b4daa2d15fd70f35a4d6916cc241641b57064dc1621c371eabb0d9
                              • Instruction Fuzzy Hash: 2B219275A00648AFDB01DAA99D419AFB7FCEB4A301F554077FC00E3282D6B99E088769
                              APIs
                              • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                              • ExitProcess.KERNEL32 ref: 00404E0D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ExitMessageProcess
                              • String ID: Error$Runtime error at 00000000
                              • API String ID: 1220098344-2970929446
                              • Opcode ID: 6146da9580bef9965da9cda28fdf8b1f09917d9546c5f1af2fde060953d626be
                              • Instruction ID: c00c8b1b907268fe45c84c5108a6570d36dd98a08fca56cdb76ff5d345661702
                              • Opcode Fuzzy Hash: 6146da9580bef9965da9cda28fdf8b1f09917d9546c5f1af2fde060953d626be
                              • Instruction Fuzzy Hash: 8F21D360E452418ADB10AB75ED8171A3B8097F930CF04817BE700B73E2C67CD84687AE
                              APIs
                              • EnumWindows.USER32(00423E6C), ref: 00423EF8
                              • GetWindow.USER32(?,00000003), ref: 00423F0D
                              • GetWindowLongA.USER32(?,000000EC), ref: 00423F1C
                              • SetWindowPos.USER32(00000000,004245AC,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004245FB,?,?,004241C3), ref: 00423F52
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$EnumLongWindows
                              • String ID:
                              • API String ID: 4191631535-0
                              • Opcode ID: da7c6a1f1adb1243b5fa3636d4e877867cfe7b0e5d1887425f7f41af5dac74a2
                              • Instruction ID: 800f3c7d6b650a9444741cf3b456662361ea129bec99247a5177c247b1bc03b7
                              • Opcode Fuzzy Hash: da7c6a1f1adb1243b5fa3636d4e877867cfe7b0e5d1887425f7f41af5dac74a2
                              • Instruction Fuzzy Hash: 5B117071B04610ABDB109F28ED85F5673F4EB08715F12026AF9649B2E2C37CDD40CB58
                              APIs
                              • GetDC.USER32(00000000), ref: 0042356E
                              • EnumFontsA.GDI32(00000000,00000000,004234B8,004108B0,00000000,?,?,00000000,?,00419423,00000000,?,?,?,00000001), ref: 00423581
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423589
                              • ReleaseDC.USER32(00000000,00000000), ref: 00423594
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CapsDeviceEnumFontsRelease
                              • String ID:
                              • API String ID: 2698912916-0
                              • Opcode ID: bb643e78eddffdc26f40f16d9b8672dcc85dc1c54bcbb46a45d6df83db9bb269
                              • Instruction ID: 3e91f746c00fb2f600ae5fc17e333cd129bb14a9c5a67b8d5949c9a763c02f3d
                              • Opcode Fuzzy Hash: bb643e78eddffdc26f40f16d9b8672dcc85dc1c54bcbb46a45d6df83db9bb269
                              • Instruction Fuzzy Hash: 5C019EB17457102AE710BF6A5C82B9B37A49F0531DF40427FF908AB3C2DA7E990547AE
                              APIs
                              • WaitForInputIdle.USER32(?,00000032), ref: 00455710
                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00455732
                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00455741
                              • CloseHandle.KERNEL32(?,0045576E,00455767,?,?,?,00000000,?,?,00455943,?,?,?,00000044,00000000,00000000), ref: 00455761
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                              • String ID:
                              • API String ID: 4071923889-0
                              • Opcode ID: 0e2e22314dae304e5bf22728ddaa36dde328adca970e968fdbe7b68800f3fe31
                              • Instruction ID: d914ecb4f604d225e93de076450c6742835d04a0b91abb11bcb899d5d614385b
                              • Opcode Fuzzy Hash: 0e2e22314dae304e5bf22728ddaa36dde328adca970e968fdbe7b68800f3fe31
                              • Instruction Fuzzy Hash: 6101B570A40A09FEEB20A7A58D16F7F7BADDB49760F610167F904D32C2C6789D00CA68
                              APIs
                              • RtlInitializeCriticalSection.KERNEL32(0049D420,00000000,00401A82,?,?,0040222E,02202B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                              • RtlEnterCriticalSection.KERNEL32(0049D420,0049D420,00000000,00401A82,?,?,0040222E,02202B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                              • LocalAlloc.KERNEL32(00000000,00000FF8,0049D420,00000000,00401A82,?,?,0040222E,02202B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                              • RtlLeaveCriticalSection.KERNEL32(0049D420,00401A89,00000000,00401A82,?,?,0040222E,02202B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                              • String ID:
                              • API String ID: 730355536-0
                              • Opcode ID: 6924fe21b1383dcef356c9aa5819c214f6a77f33e1d4e548cd75cfb9fc70e511
                              • Instruction ID: 7339f3ebbe1eed2a5a633cb922c09bf0bd68a71b88021a6e55e3f3fb74b7268e
                              • Opcode Fuzzy Hash: 6924fe21b1383dcef356c9aa5819c214f6a77f33e1d4e548cd75cfb9fc70e511
                              • Instruction Fuzzy Hash: AB01CCB0E482405EFB19AF699902B293FD4D799748F51803BF441A7AF1CA7C6840CB2E
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLast$CountSleepTick
                              • String ID:
                              • API String ID: 2227064392-0
                              • Opcode ID: 9058e7e476f03d8e95d8f18454d4e24bc94f2ef3d9c0d2f85b863d506517b458
                              • Instruction ID: 9be5390d37519caeffefa09d8943b7800c28e667e42796fceef54f4227176e6c
                              • Opcode Fuzzy Hash: 9058e7e476f03d8e95d8f18454d4e24bc94f2ef3d9c0d2f85b863d506517b458
                              • Instruction Fuzzy Hash: 28E0E5213092A855C63035BB58C26AF45C9DA89768B244ABFE088D6283C89C4C05652E
                              APIs
                                • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,0049A49E), ref: 0040334B
                                • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,0049A49E), ref: 00403356
                                • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(kernel32.dll,00000000,0040668E,?,?,?,?,00000000,?,0049A4A8), ref: 0040640F
                                • Part of subcall function 004063F4: GetVersion.KERNEL32(kernel32.dll,00000000,0040668E,?,?,?,?,00000000,?,0049A4A8), ref: 00406416
                                • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0040642B
                                • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406453
                                • Part of subcall function 00406814: 6FB81CD0.COMCTL32(0049A4AD), ref: 00406814
                                • Part of subcall function 00410BB4: GetCurrentThreadId.KERNEL32 ref: 00410C02
                                • Part of subcall function 00419490: GetVersion.KERNEL32(0049A4C6), ref: 00419490
                                • Part of subcall function 0044FD1C: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,0049A4DA), ref: 0044FD57
                                • Part of subcall function 0044FD1C: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044FD5D
                                • Part of subcall function 004501E8: GetVersionExA.KERNEL32(0049D794,0049A4DF), ref: 004501F7
                                • Part of subcall function 00453934: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004539F2,?,?,?,?,00000000,00000000,?,0049A4EE), ref: 00453956
                                • Part of subcall function 00453934: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045395C
                                • Part of subcall function 00453934: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004539F2,?,?,?,?,00000000,00000000,?,0049A4EE), ref: 00453970
                                • Part of subcall function 00453934: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453976
                                • Part of subcall function 00457850: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004578AA
                                • Part of subcall function 00465214: LoadLibraryA.KERNEL32(00000000,SHPathPrepareForWriteA,00000000,0046528A,?,?,?,?,00000000,00000000,?,0049A502), ref: 0046525F
                                • Part of subcall function 00465214: GetProcAddress.KERNEL32(00000000,00000000), ref: 00465265
                                • Part of subcall function 0046DAB0: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046DAFB
                                • Part of subcall function 00479E68: GetModuleHandleA.KERNEL32(kernel32.dll,?,0049A50C), ref: 00479E6E
                                • Part of subcall function 00479E68: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00479E7B
                                • Part of subcall function 00479E68: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00479E8B
                                • Part of subcall function 00485374: GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00485485
                                • Part of subcall function 0049749C: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 004974B5
                              • SetErrorMode.KERNEL32(00000001,00000000,0049A554), ref: 0049A526
                                • Part of subcall function 0049A250: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,0049A530,00000001,00000000,0049A554), ref: 0049A25A
                                • Part of subcall function 0049A250: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0049A260
                                • Part of subcall function 00424924: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424943
                                • Part of subcall function 00424714: SetWindowTextA.USER32(?,00000000), ref: 0042472C
                              • ShowWindow.USER32(?,00000005,00000000,0049A554), ref: 0049A587
                                • Part of subcall function 004839B4: SetActiveWindow.USER32(?), ref: 00483A62
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule$VersionWindow$ActiveClipboardCommandCurrentErrorFormatLibraryLineLoadMessageModeRegisterSendShowTextThread
                              • String ID: Setup
                              • API String ID: 56708735-3839654196
                              • Opcode ID: 5ebf63c816ce0926393bda34e310f182705e6753737ca883e7f4fbe973062e60
                              • Instruction ID: 2627a5300f3eb19f067de96b875d46ae0be93d5911e26a22e66c9acfb87dca20
                              • Opcode Fuzzy Hash: 5ebf63c816ce0926393bda34e310f182705e6753737ca883e7f4fbe973062e60
                              • Instruction Fuzzy Hash: AA31B3712046409EDB01BBB7AC1391D3BA8EB8971CB62487FF90486563DE3D5C24867F
                              APIs
                              • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0045427B,?,?,00000000,0049D62C,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004541D2
                              • GetLastError.KERNEL32(00000000,00000000,?,00000000,0045427B,?,?,00000000,0049D62C,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004541DB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CreateDirectoryErrorLast
                              • String ID: .tmp
                              • API String ID: 1375471231-2986845003
                              • Opcode ID: cd2a3252ecaf260815823af67aa2b094056b5513c9df15a8aebd7a9e3b97fefd
                              • Instruction ID: f8da180511d522ff1cc3db6e91f047bd7ddaecfb92c8c1642a91e8309ff3a61b
                              • Opcode Fuzzy Hash: cd2a3252ecaf260815823af67aa2b094056b5513c9df15a8aebd7a9e3b97fefd
                              • Instruction Fuzzy Hash: 19214E75A002189BDB01EFA1C8465DEB7BDEF44305F50457BF801B7382D67C5E458BA9
                              APIs
                                • Part of subcall function 00484E68: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00484E79
                                • Part of subcall function 00484E68: GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00484E86
                                • Part of subcall function 00484E68: GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00484E94
                                • Part of subcall function 00484E68: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00484E9C
                                • Part of subcall function 00484E68: GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00484EA8
                                • Part of subcall function 00484E68: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00484EC9
                                • Part of subcall function 00484E68: GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00484EDC
                                • Part of subcall function 00484E68: GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00484EE2
                                • Part of subcall function 00485194: GetVersionExA.KERNEL32(?,004853AA,00000000,004854AA,?,?,?,?,00000000,00000000,?,0049A511), ref: 004851A2
                                • Part of subcall function 00485194: GetVersionExA.KERNEL32(0000009C,?,004853AA,00000000,004854AA,?,?,?,?,00000000,00000000,?,0049A511), ref: 004851F4
                                • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                • Part of subcall function 0042E7E4: SetErrorMode.KERNEL32(00008000), ref: 0042E7EE
                                • Part of subcall function 0042E7E4: LoadLibraryA.KERNEL32(00000000,00000000,0042E838,?,00000000,0042E856,?,00008000), ref: 0042E81D
                              • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00485485
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModuleSystemVersion$CurrentDirectoryErrorInfoLibraryLoadModeNativeProcess
                              • String ID: SHGetKnownFolderPath$shell32.dll
                              • API String ID: 1303913335-2936008475
                              • Opcode ID: 30b2113fc11c108fefb6c9d7cc484c8701cb0e3681c30726207d50507da89b68
                              • Instruction ID: 7070cd684f6103364e9f8a31a7d8965128adaac247882cc77746aeeddc076857
                              • Opcode Fuzzy Hash: 30b2113fc11c108fefb6c9d7cc484c8701cb0e3681c30726207d50507da89b68
                              • Instruction Fuzzy Hash: F9215E70600200ABC711FFAF995674E37A4EB9570CB51993FF400AB2D1D77DA8059B6E
                              APIs
                              • DeleteFileA.KERNEL32(00000000,00000000,004530A9,?,-00000001,?), ref: 00453083
                              • GetLastError.KERNEL32(00000000,00000000,004530A9,?,-00000001,?), ref: 0045308B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID: @8H
                              • API String ID: 2018770650-3762495883
                              • Opcode ID: 740164d06d4b5ecf50d785a3f514d94b90e51079369cdd24e5e2a0e59ac3d097
                              • Instruction ID: 483a50349848f844724b37c9089874c2f5155cc8dca7ffd3c90c1c5b4081c312
                              • Opcode Fuzzy Hash: 740164d06d4b5ecf50d785a3f514d94b90e51079369cdd24e5e2a0e59ac3d097
                              • Instruction Fuzzy Hash: 74F0C871A04708AFCB01DFB9AC4249EB7ECDB0975675045B7FC04E3282EB785F188599
                              APIs
                              • RemoveDirectoryA.KERNEL32(00000000,00000000,004535B1,?,-00000001,00000000), ref: 0045358B
                              • GetLastError.KERNEL32(00000000,00000000,004535B1,?,-00000001,00000000), ref: 00453593
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: DirectoryErrorLastRemove
                              • String ID: @8H
                              • API String ID: 377330604-3762495883
                              • Opcode ID: 3231ec27617ec579b03d87c8a7638ffef7de7386d21531307dfc59fc3638464b
                              • Instruction ID: 7fd71ab76445d730fbf8dcc8275d2678ef65a3f2b88ec35f2c7a4b5c8e56db9b
                              • Opcode Fuzzy Hash: 3231ec27617ec579b03d87c8a7638ffef7de7386d21531307dfc59fc3638464b
                              • Instruction Fuzzy Hash: B2F0C271A04608BBCB01EFB9AC4249EB7E8EB0975675049BBFC04E3242F7785F088598
                              APIs
                                • Part of subcall function 004577E0: CoInitialize.OLE32(00000000), ref: 004577E6
                                • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                • Part of subcall function 0042E7E4: SetErrorMode.KERNEL32(00008000), ref: 0042E7EE
                                • Part of subcall function 0042E7E4: LoadLibraryA.KERNEL32(00000000,00000000,0042E838,?,00000000,0042E856,?,00008000), ref: 0042E81D
                              • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004578AA
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressDirectoryErrorInitializeLibraryLoadModeProcSystem
                              • String ID: SHCreateItemFromParsingName$shell32.dll
                              • API String ID: 1013667774-2320870614
                              • Opcode ID: 1792bbe59ceac3f7532cfc20468d2190806302f686f303ce2f9deea7295c62da
                              • Instruction ID: 9566a5db5de29e1f96e1247fa15de811f0c6c8f84fbefe9709ba2c3b4718617c
                              • Opcode Fuzzy Hash: 1792bbe59ceac3f7532cfc20468d2190806302f686f303ce2f9deea7295c62da
                              • Instruction Fuzzy Hash: 4DF03670604608BBE701FBA6E842F5D7BACDB45759F604477B800A6592D67CAE04C92D
                              APIs
                                • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                • Part of subcall function 0042E7E4: SetErrorMode.KERNEL32(00008000), ref: 0042E7EE
                                • Part of subcall function 0042E7E4: LoadLibraryA.KERNEL32(00000000,00000000,0042E838,?,00000000,0042E856,?,00008000), ref: 0042E81D
                              • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046DAFB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressDirectoryErrorLibraryLoadModeProcSystem
                              • String ID: SHPathPrepareForWriteA$shell32.dll
                              • API String ID: 2552568031-2683653824
                              • Opcode ID: 2d5343be83e8358071b9bd9d4eaaac5a82e789fda822a879ea0601a38230bab5
                              • Instruction ID: 91b75a77547c13e1772f921c750cf7bd45708da1ec0dc58a0f4cb33c0377533c
                              • Opcode Fuzzy Hash: 2d5343be83e8358071b9bd9d4eaaac5a82e789fda822a879ea0601a38230bab5
                              • Instruction Fuzzy Hash: B5F04430B04608BBD700EF52DC52F5DBBACEB45B14FA14076B40067595E678AE048A2D
                              APIs
                              • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047DC36,00000000,0047DC4C), ref: 0047D946
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Close
                              • String ID: RegisteredOrganization$RegisteredOwner
                              • API String ID: 3535843008-1113070880
                              • Opcode ID: 4417b24f936b773814fa274ae0962c207b01253452d24554fe1b7e397a44036f
                              • Instruction ID: 03cfcff152a519ea80d4f5543ba1c5a79f91faf414c5488bd5ec988fdc31f9f9
                              • Opcode Fuzzy Hash: 4417b24f936b773814fa274ae0962c207b01253452d24554fe1b7e397a44036f
                              • Instruction Fuzzy Hash: B6F0BBB0B042449BDB04D667AC93BDB37B9CB41308F24847BA2459B392D67C9D00D75D
                              APIs
                              Strings
                              • Failed to remove temporary directory: , xrefs: 0047E10B
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CountTick
                              • String ID: Failed to remove temporary directory:
                              • API String ID: 536389180-3544197614
                              • Opcode ID: 9feb2f6085af5a8b024ba5244f206146ce975ac7a9d5adcf9a00534459b24a1c
                              • Instruction ID: ac5e1a37918f7d070e72ace47ef54387b1d6805ebc6ff4ed15476670fa48ed12
                              • Opcode Fuzzy Hash: 9feb2f6085af5a8b024ba5244f206146ce975ac7a9d5adcf9a00534459b24a1c
                              • Instruction Fuzzy Hash: 5A017930604204AADB11EB73DC47FDA3798DB49709F6089BBB504B62E2DBBC9D04D55C
                              APIs
                              • RtlUnwind.KERNEL32(?,?,Function_00002E70,00000000,?,?,Function_00002E70,?), ref: 00402EDC
                                • Part of subcall function 00402D90: RaiseException.KERNEL32(0EEDFAD4,00000000,00000002), ref: 00402DA6
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ExceptionRaiseUnwind
                              • String ID: /@
                              • API String ID: 478881706-2472096700
                              • Opcode ID: 499441b971b57391d74a26d503e0120d5b334c1de8607420bc0463d9fe128394
                              • Instruction ID: 9ce5d78024ec260da94c0a854ad992de276e46e661de1c3f6cf596ac2f908521
                              • Opcode Fuzzy Hash: 499441b971b57391d74a26d503e0120d5b334c1de8607420bc0463d9fe128394
                              • Instruction Fuzzy Hash: 260139B0200201AFD310DB55CA89F27B7F9EF88744F15C5B9B508672E1C774EC40CA69
                              APIs
                                • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                              • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047DA4C,00000000,0047DC4C), ref: 0047D845
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047D815
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseOpen
                              • String ID: Software\Microsoft\Windows\CurrentVersion
                              • API String ID: 47109696-1019749484
                              • Opcode ID: e9682fbab4657f03bea14a90e8bd788d9062128f143b0ad79c7d71c705787334
                              • Instruction ID: 9e1ac37bc360ea69ca44dde089ba04ba4b826bb97de6a423fadd5e819c649f8f
                              • Opcode Fuzzy Hash: e9682fbab4657f03bea14a90e8bd788d9062128f143b0ad79c7d71c705787334
                              • Instruction Fuzzy Hash: 09F08231B04114A7DB00B69A9C42BAEA7AC8F84758F20807BF519EB242D9B99E0143AD
                              APIs
                              • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                              Strings
                              • System\CurrentControlSet\Control\Windows, xrefs: 0042E286
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Open
                              • String ID: System\CurrentControlSet\Control\Windows
                              • API String ID: 71445658-1109719901
                              • Opcode ID: ba599b357b8d4751e1ab922ebb55064d8a8854d38c942fc45e646e4ab9ecaa7b
                              • Instruction ID: 65e6a506820a5022674633d18044d67bbd02e357da0c4a821f6ebd0b5300d4b8
                              • Opcode Fuzzy Hash: ba599b357b8d4751e1ab922ebb55064d8a8854d38c942fc45e646e4ab9ecaa7b
                              • Instruction Fuzzy Hash: B7D09272910228BBAB009A89DC41DFB77ADDB1A760F80806AF91897241D2B4AC519BF4
                              APIs
                              • GetACP.KERNEL32(?,?,00000001,00000000,0047FA57,?,-0000001A,00481956,-00000010,?,00000004,0000001C,00000000,00481CA3,?,0045E364), ref: 0047F7EE
                                • Part of subcall function 0042E76C: GetDC.USER32(00000000), ref: 0042E77B
                                • Part of subcall function 0042E76C: EnumFontsA.GDI32(?,00000000,0042E758,00000000,00000000,0042E7C4,?,00000000,00000000,?,?,00000001,00000000,00000002,00000000,00482671), ref: 0042E7A6
                                • Part of subcall function 0042E76C: ReleaseDC.USER32(00000000,?), ref: 0042E7BE
                              • SendNotifyMessageA.USER32(000103E6,00000496,00002711,-00000001), ref: 0047F9BE
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: EnumFontsMessageNotifyReleaseSend
                              • String ID:
                              • API String ID: 2649214853-0
                              • Opcode ID: f63ddfb2871cf1e66e6cb65ad1930d9627398cbe91e727e5a4f1e93d11453290
                              • Instruction ID: 2351f95844d6f0f86e4a4553bb1ee5652cba21286aa46acec5315b7e6dd2a420
                              • Opcode Fuzzy Hash: f63ddfb2871cf1e66e6cb65ad1930d9627398cbe91e727e5a4f1e93d11453290
                              • Instruction Fuzzy Hash: 865196B46001009BD710FF26D98179A37A9EB54309B50C53BA4099F3A7CB3CED4ACB9E
                              APIs
                              • RtlEnterCriticalSection.KERNEL32(0049D420,00000000,004021FC), ref: 004020CB
                                • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049D420,00000000,00401A82,?,?,0040222E,02202B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049D420,0049D420,00000000,00401A82,?,?,0040222E,02202B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049D420,00000000,00401A82,?,?,0040222E,02202B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049D420,00401A89,00000000,00401A82,?,?,0040222E,02202B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                              • String ID:
                              • API String ID: 296031713-0
                              • Opcode ID: d8e299963bb2c4fed4ff4e3414f532efba3796fb7efe986e1124fe849202073f
                              • Instruction ID: 28de6049d60bc6243b4bd9e8b7e4b04bc6e7afcf6678d0e749794f980a6998b8
                              • Opcode Fuzzy Hash: d8e299963bb2c4fed4ff4e3414f532efba3796fb7efe986e1124fe849202073f
                              • Instruction Fuzzy Hash: 3D41C4B2E003019FDB10CF69DE8521A77A4F7A9328F15417BD954A77E1D378A842CB48
                              APIs
                              • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042E188), ref: 0042E08C
                              • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042E188), ref: 0042E0FC
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID:
                              • API String ID: 3660427363-0
                              • Opcode ID: fb659fd4e3abd397cfb8b0300bb5eb5c22831bf077ba98013b241e0a6da047f3
                              • Instruction ID: f9a1da9ca9b7937b0bb3d9b331acc3eaa2fb365deabda7ea02547e95fe34f262
                              • Opcode Fuzzy Hash: fb659fd4e3abd397cfb8b0300bb5eb5c22831bf077ba98013b241e0a6da047f3
                              • Instruction Fuzzy Hash: 77415E71E00129ABDB11DF92D881BBFB7B9EB01704F944576E814F7281D778AE01CBA9
                              APIs
                              • CreateProcessA.KERNEL32(00000000,00000000,?,?,00458A74,00000000,00458A5C,?,?,?,00000000,00452FA6,?,?,?,00000001), ref: 00452F80
                              • GetLastError.KERNEL32(00000000,00000000,?,?,00458A74,00000000,00458A5C,?,?,?,00000000,00452FA6,?,?,?,00000001), ref: 00452F88
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CreateErrorLastProcess
                              • String ID:
                              • API String ID: 2919029540-0
                              • Opcode ID: 45a7ef4815598ad6d760f922fca5c8b784324ceeca6d5903799f39ea771ca291
                              • Instruction ID: 1642ece03f316e66375c060ca7626bc18a341a32778e3b1f8c5ba0bc81bd916e
                              • Opcode Fuzzy Hash: 45a7ef4815598ad6d760f922fca5c8b784324ceeca6d5903799f39ea771ca291
                              • Instruction Fuzzy Hash: E7112772A04208AF8B40DEA9ED41D9FB7ECEB4E310B11456BBD08D3241D678AD159B68
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 0041F343
                              • EnumThreadWindows.USER32(00000000,0041F2A4,00000000), ref: 0041F349
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Thread$CurrentEnumWindows
                              • String ID:
                              • API String ID: 2396873506-0
                              • Opcode ID: 26a01034718a754fac2428515d88d868d648ddf0343dd67eaafc6563d075de98
                              • Instruction ID: ded2603fe903b3ccb75c053802ed51acc4a1ef0e0cc57bb05547c7342bcbb188
                              • Opcode Fuzzy Hash: 26a01034718a754fac2428515d88d868d648ddf0343dd67eaafc6563d075de98
                              • Instruction Fuzzy Hash: B2016D74A04B08BFD301CF66ED1195ABBF8F749724B22C877E854D3AA0E73459119E58
                              APIs
                              • LoadCursorA.USER32(00000000,00007F00), ref: 00423699
                              • LoadCursorA.USER32(00000000,00000000), ref: 004236C3
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CursorLoad
                              • String ID:
                              • API String ID: 3238433803-0
                              • Opcode ID: f140cec9cfa9b30dc2305244e4258a11cf30c4d8c1b352010c949b8b0dda8ca8
                              • Instruction ID: 05fd857f6409e6a60644ea24615d01c87e42662e453bf4d6e4e1dfbb00014e4e
                              • Opcode Fuzzy Hash: f140cec9cfa9b30dc2305244e4258a11cf30c4d8c1b352010c949b8b0dda8ca8
                              • Instruction Fuzzy Hash: F2F0A7517002107ADA205E3E6CC0A2A72ADCBC1735B61437BFA2AE73D1C72D5D45556D
                              APIs
                              • SetErrorMode.KERNEL32(00008000), ref: 0042E7EE
                              • LoadLibraryA.KERNEL32(00000000,00000000,0042E838,?,00000000,0042E856,?,00008000), ref: 0042E81D
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLibraryLoadMode
                              • String ID:
                              • API String ID: 2987862817-0
                              • Opcode ID: 1888120ec642a14ddfe20f8f6a13270cb26bc9381dbb943de7a3fd9ae0886bdd
                              • Instruction ID: 76a16bdd6934cf9e499703eeb82aeaab1faf94a78ecb328ba4f7015bbedd62a6
                              • Opcode Fuzzy Hash: 1888120ec642a14ddfe20f8f6a13270cb26bc9381dbb943de7a3fd9ae0886bdd
                              • Instruction Fuzzy Hash: 13F08270B14744BEDB116F779C6282BBBECE749B1079348B6F800A3A91E63C4C10C968
                              APIs
                              • SHGetKnownFolderPath.SHELL32(0049BD54,00008000,00000000,?), ref: 0047DBA5
                              • CoTaskMemFree.OLE32(?,0047DBE8), ref: 0047DBDB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FolderFreeKnownPathTask
                              • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                              • API String ID: 969438705-544719455
                              • Opcode ID: 40c9fceec1849ef55c2d9e9b165fa2d81ca6f89bfe3325e062340eef34f4dc70
                              • Instruction ID: 547cb950fcd41f41a68947569da9652c82defc7c7397c5e87919afd81bca1a0c
                              • Opcode Fuzzy Hash: 40c9fceec1849ef55c2d9e9b165fa2d81ca6f89bfe3325e062340eef34f4dc70
                              • Instruction Fuzzy Hash: F5E06534714640BEEB119A619D12B5977B8EB85B04FB28476F50496690D678A9009A18
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Global$AllocLock
                              • String ID:
                              • API String ID: 15508794-0
                              • Opcode ID: 38fdb687bb69d238822be17628ba02d3430ff360103c12c92fad93c094244837
                              • Instruction ID: 56019af84ea84d57b40f02c4528a45173e4f1cdf38a2be340d0d32551c2e1a06
                              • Opcode Fuzzy Hash: 38fdb687bb69d238822be17628ba02d3430ff360103c12c92fad93c094244837
                              • Instruction Fuzzy Hash: 699002C4C01A00A4DC0072B20C0BD3F101CD8C072C3D1486F7044B6483887C88000979
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                              • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Virtual$AllocFree
                              • String ID:
                              • API String ID: 2087232378-0
                              • Opcode ID: 7e62aa1badbe9b7bec7abb2084251aae76f03f49734707af951965b808a3b35c
                              • Instruction ID: a6323659c4e3f22e280215c11bf30f87fcb27bed7f3312751ebcd43238c0638b
                              • Opcode Fuzzy Hash: 7e62aa1badbe9b7bec7abb2084251aae76f03f49734707af951965b808a3b35c
                              • Instruction Fuzzy Hash: CCF08272A0063067EB60596A4C81B5359849BC5794F154076FD09FF3E9D6B58C0142A9
                              APIs
                              • GetSystemDefaultLCID.KERNEL32(00000000,00408B62), ref: 00408A4B
                                • Part of subcall function 0040723C: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00407259
                                • Part of subcall function 004089B8: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049D4C4,00000001,?,00408A83,?,00000000,00408B62), ref: 004089D6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: DefaultInfoLoadLocaleStringSystem
                              • String ID:
                              • API String ID: 1658689577-0
                              • Opcode ID: bb57ecfbcf6c99401787c1e244de85808a7a992296f2a947b18206caa06ad51e
                              • Instruction ID: 2280d21d464d6860fad4d2303e4b2489916fa30e512bd771d5ffef80d8a4ef38
                              • Opcode Fuzzy Hash: bb57ecfbcf6c99401787c1e244de85808a7a992296f2a947b18206caa06ad51e
                              • Instruction Fuzzy Hash: F6315275E001099BCF00EF95C8819EEB779EF84314F51857BE815BB385E738AE058B99
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FindWindow
                              • String ID:
                              • API String ID: 134000473-0
                              • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                              • Instruction ID: 0aa468cb5a5762bb6f279ef61ce1387cc8ae2cf3aa5b1c02f01331a8f16cbc06
                              • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                              • Instruction Fuzzy Hash: F8F06D30604109DBEB1CEF59D4619AF7BA0EF59340B20806FE517873B0DA34AE80D658
                              APIs
                              • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00450F48
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 71421a353c7d946f4a8c6fccaaf9ef1ebb7d4f3a2acf703d7621df67c6c459cb
                              • Instruction ID: 8219f7e09200e9d280371fd8822ce49b3febf2e1364c7dcaf59ee2aef9f1cf3d
                              • Opcode Fuzzy Hash: 71421a353c7d946f4a8c6fccaaf9ef1ebb7d4f3a2acf703d7621df67c6c459cb
                              • Instruction Fuzzy Hash: E2E0EDB53541483ED6809AAD7D42F9667DCD71A724F008033B998D7241D5619D158BE8
                              APIs
                              • GetFileAttributesA.KERNEL32(00000000,00000000,0042D164,?,00000001,?,?,00000000,?,0042D1B6,00000000,00453169,00000000,0045318A,?,00000000), ref: 0042D147
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 52a97f63493a2405b18f7ceeeb4c5583b1fc3ffb9d272bcba16263c996160de7
                              • Instruction ID: 9806b9c164805e7544688198397d180b04c1e4ca63c7d3d80aa3ce68cdb407ca
                              • Opcode Fuzzy Hash: 52a97f63493a2405b18f7ceeeb4c5583b1fc3ffb9d272bcba16263c996160de7
                              • Instruction Fuzzy Hash: 74E09271704704BFD701EF62DC53E6BBBECDB89B18BA14876B400E7692D6789E10D468
                              APIs
                              • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004539D7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042ED37
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FormatMessage
                              • String ID:
                              • API String ID: 1306739567-0
                              • Opcode ID: 09ac2101c8e17b0b2705a927b8a5b1ff093a5eaf49e610a8aec8846a662564db
                              • Instruction ID: 20bfa46e39afc277729b0f592bdc1926ad718625f52f7f76be7811270f12921f
                              • Opcode Fuzzy Hash: 09ac2101c8e17b0b2705a927b8a5b1ff093a5eaf49e610a8aec8846a662564db
                              • Instruction Fuzzy Hash: 0DE0206179471216F2351416AC47B77530E43C0704F944436BF50DD3E3D6AED906465E
                              APIs
                              • CreateWindowExA.USER32(00000000,00423ACC,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042405C), ref: 00406321
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CreateWindow
                              • String ID:
                              • API String ID: 716092398-0
                              • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                              • Instruction ID: 1e3b386673cc32b76f3712ab4659b14af7d7742474b1f2ca80afcc4f691b27f6
                              • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                              • Instruction Fuzzy Hash: 26E002B221430DBFDB00DE8ADCC1DABB7ACFB4C654F808105BB1C972528675AC608B71
                              APIs
                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00407374
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FileWrite
                              • String ID:
                              • API String ID: 3934441357-0
                              • Opcode ID: 56f2c6ca40c6286e2407e08fcad0208f925abe1420ed3d4fba62cc8f550d2764
                              • Instruction ID: 7137799a8a619894c36928dc497025c8ae4ce5b7c347e91e7b4e2a044eac2fb2
                              • Opcode Fuzzy Hash: 56f2c6ca40c6286e2407e08fcad0208f925abe1420ed3d4fba62cc8f550d2764
                              • Instruction Fuzzy Hash: CFD05B723082507BE320A55B5C44EAB6BDCCBC5774F10063EF958D31C1D6349C01C675
                              APIs
                                • Part of subcall function 00423A48: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 00423A5D
                              • ShowWindow.USER32(004108B0,00000009,?,00000000,0041F1F4,00423D8A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042405C), ref: 00423AB7
                                • Part of subcall function 00423A78: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423A94
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: InfoParametersSystem$ShowWindow
                              • String ID:
                              • API String ID: 3202724764-0
                              • Opcode ID: b1c2cd61143bf12a0bef37db47b635a6d3ef0f027e429c080d83374e888f6fa5
                              • Instruction ID: b4979a057c5364df20928e0f8112b75834207fc47edce7a1cb621b48fadbe9ee
                              • Opcode Fuzzy Hash: b1c2cd61143bf12a0bef37db47b635a6d3ef0f027e429c080d83374e888f6fa5
                              • Instruction Fuzzy Hash: E4D0A7137811703143117BB738469BF46EC4DD26AB38808BBB5C0DB303E91E8E051278
                              APIs
                              • SetWindowTextA.USER32(?,00000000), ref: 0042472C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: TextWindow
                              • String ID:
                              • API String ID: 530164218-0
                              • Opcode ID: 0f798d55b4a563aaf07053da431746ff1fcbe1b34a54896860b3a53b831deb59
                              • Instruction ID: 0401e0c0b6f3d46f422729750133087b7afca2a32056b90ced50410e3746bfe3
                              • Opcode Fuzzy Hash: 0f798d55b4a563aaf07053da431746ff1fcbe1b34a54896860b3a53b831deb59
                              • Instruction Fuzzy Hash: 17D05EE27011602BCB01BAAD54C4ACA67CC8B8936AB1440BBF908EF257C638CE458398
                              APIs
                              • GetFileAttributesA.KERNEL32(00000000,?,00453399,00000000,004533B2,?,-00000001,00000000), ref: 0042D1C7
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 7c6ebe174506a89767f7ee592df00eb0c72a5955deab68b848f445c8102e14c6
                              • Instruction ID: bf35e0695d646f252302ae8c05399a3b1551c06c76099583daea3b520eb86f7d
                              • Opcode Fuzzy Hash: 7c6ebe174506a89767f7ee592df00eb0c72a5955deab68b848f445c8102e14c6
                              • Instruction Fuzzy Hash: 3ED022D071121001DE10A0BC28C533711880B74336BA41A33BD69E26E3C33D8823542C
                              APIs
                              • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040AB24,0040D0D0,?,00000000,?), ref: 0040732D
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: b7ab38c9d2030f91d4c2faf0e26377bdf9e0bb8d1fc7b6e238f7ff5e282f1814
                              • Instruction ID: a78e408fffc15bc8d0ee8a54c686fbaa4e2694f5c3f88f37cecd524e454749ad
                              • Opcode Fuzzy Hash: b7ab38c9d2030f91d4c2faf0e26377bdf9e0bb8d1fc7b6e238f7ff5e282f1814
                              • Instruction Fuzzy Hash: ADC048B13C130032F93025A61C87F1604889714B1AE60943AB740BE1C2D8E9A818016C
                              APIs
                              • FreeLibrary.KERNEL32(00000000,00482E1B), ref: 0047E3E6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID:
                              • API String ID: 3664257935-0
                              • Opcode ID: 6c53cdab159c99083d4d98b8786732a30233f1b333e0139ad3d8075ed81d35ad
                              • Instruction ID: be2fe49a244c431ec9946715e535269e6deba234050b303873a188c7b9bcae40
                              • Opcode Fuzzy Hash: 6c53cdab159c99083d4d98b8786732a30233f1b333e0139ad3d8075ed81d35ad
                              • Instruction Fuzzy Hash: C5C00271511210AED750DFBA9D4C75637D4A71832AF068477F40CC3160F6344840CB09
                              APIs
                              • SetErrorMode.KERNEL32(?,0042E85D), ref: 0042E850
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorMode
                              • String ID:
                              • API String ID: 2340568224-0
                              • Opcode ID: bbf0f8014a804afebd1604ab393a38912dcaab738292d82ddfa54d7cc6c30dd0
                              • Instruction ID: 289f6c2202f902c5fbbb0b24ee8d848b414576690a26c35d590b8c03c3951524
                              • Opcode Fuzzy Hash: bbf0f8014a804afebd1604ab393a38912dcaab738292d82ddfa54d7cc6c30dd0
                              • Instruction Fuzzy Hash: A7B09B76B0C6005DF705D6D5745152D63D4D7C57203E1457BF454D35C0D93C58004918
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7ee96f6740eff3dbf417435cfc9d3f388c69a0176123ded3721ea93298cab944
                              • Instruction ID: 95dd084d42e1a0ec26c41173bf9ec14b880c0887755d66d69d77494f4da09d79
                              • Opcode Fuzzy Hash: 7ee96f6740eff3dbf417435cfc9d3f388c69a0176123ded3721ea93298cab944
                              • Instruction Fuzzy Hash: 1B5157B4E041099FDB01EFA9C882AAEBBF5EB45314F50417AE504E7391DB389D45CB98
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041F1F4,?,00423CDF,0042405C,0041F1F4), ref: 0041F832
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 3cd9b2b82d3c03bb1042e3aec431f22b9c9f9b479e5e8d2dc048638413a345c3
                              • Instruction ID: 12b252a98648104a36852bc9e66bdd9c626d3d2234b6f24232172dde86ff5d2a
                              • Opcode Fuzzy Hash: 3cd9b2b82d3c03bb1042e3aec431f22b9c9f9b479e5e8d2dc048638413a345c3
                              • Instruction Fuzzy Hash: FA1148746007059BCB10DF19C880B82FBE4EB98350F10C53AE9588B385D374E849CBA8
                              APIs
                              • VirtualFree.KERNEL32(00000000,00000000,00004000,?,?,?,?,?,00401973), ref: 00401766
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FreeVirtual
                              • String ID:
                              • API String ID: 1263568516-0
                              • Opcode ID: c75a05877fa6d12c6d50048bf692a8cb9b872a1b30c0c7aeae6369689fd3dcf9
                              • Instruction ID: 191f0f4b7cd680364798b3dc381f6aadc2f07e0dbee61be3c45a65ffd8c3a871
                              • Opcode Fuzzy Hash: c75a05877fa6d12c6d50048bf692a8cb9b872a1b30c0c7aeae6369689fd3dcf9
                              • Instruction Fuzzy Hash: 9E01FC766442148FC3109E29DCC0E2677E8D794378F15453EDA85673A1D37A7C4187D8
                              APIs
                              • GetVersion.KERNEL32(?,00419440,00000000,?,?,?,00000001), ref: 0041F576
                              • SetErrorMode.KERNEL32(00008000,?,00419440,00000000,?,?,?,00000001), ref: 0041F592
                              • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419440,00000000,?,?,?,00000001), ref: 0041F59E
                              • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419440,00000000,?,?,?,00000001), ref: 0041F5AC
                              • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F5DC
                              • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F605
                              • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F61A
                              • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F62F
                              • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F644
                              • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F659
                              • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F66E
                              • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F683
                              • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F698
                              • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F6AD
                              • FreeLibrary.KERNEL32(00000001,?,00419440,00000000,?,?,?,00000001), ref: 0041F6BF
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                              • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                              • API String ID: 2323315520-3614243559
                              • Opcode ID: 4f7f688a8a3f112daba0e3eddd409aebec5aa7d0bd61d62da445d46955fd6860
                              • Instruction ID: 05ddd3b6a7babc3b5f2b58818bfec20f43c940fb7309246182468bed43dc01b1
                              • Opcode Fuzzy Hash: 4f7f688a8a3f112daba0e3eddd409aebec5aa7d0bd61d62da445d46955fd6860
                              • Instruction Fuzzy Hash: C93104B1A00604BBD710EF75BD46A6933A4F728B28B59093BB148D71A2E77C9C468F5C
                              APIs
                              • GetTickCount.KERNEL32 ref: 00458E2B
                              • QueryPerformanceCounter.KERNEL32(00000000,00000000,004590BE,?,?,00000000,00000000,?,004597BA,?,00000000,00000000), ref: 00458E34
                              • GetSystemTimeAsFileTime.KERNEL32(00000000,00000000), ref: 00458E3E
                              • GetCurrentProcessId.KERNEL32(?,00000000,00000000,004590BE,?,?,00000000,00000000,?,004597BA,?,00000000,00000000), ref: 00458E47
                              • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00458EBD
                              • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,00000000,00000000), ref: 00458ECB
                              • CreateFileA.KERNEL32(00000000,C0000000,00000000,0049BB24,00000003,00000000,00000000,00000000,0045907A), ref: 00458F13
                              • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00459069,?,00000000,C0000000,00000000,0049BB24,00000003,00000000,00000000,00000000,0045907A), ref: 00458F4C
                                • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                              • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458FF5
                              • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 0045902B
                              • CloseHandle.KERNEL32(000000FF,00459070,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00459063
                                • Part of subcall function 00453C04: GetLastError.KERNEL32(00000000,00454799,00000005,00000000,004547CE,?,?,00000000,0049D62C,00000004,00000000,00000000,00000000,?,00499C8D,00000000), ref: 00453C07
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                              • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                              • API String ID: 770386003-3271284199
                              • Opcode ID: 82c233c88e0d37a263cb0783750b3b387f228d13c71702c9729d38acfd602ae7
                              • Instruction ID: c4bf9a6304175502231bb311a6f33329fdfd9ee29416440b986483e0f2b1c780
                              • Opcode Fuzzy Hash: 82c233c88e0d37a263cb0783750b3b387f228d13c71702c9729d38acfd602ae7
                              • Instruction Fuzzy Hash: 9071F270A00654DADB10DF65CC46B9E7BF8EB05705F1045AAF908FB282DB785D448F69
                              APIs
                              • CoCreateInstance.OLE32(0049BA74,00000000,00000001,0049B774,?,00000000,0045717F), ref: 00456E1A
                              • CoCreateInstance.OLE32(0049B764,00000000,00000001,0049B774,?,00000000,0045717F), ref: 00456E40
                              • SysFreeString.OLEAUT32(00000000), ref: 00456FF7
                              Strings
                              • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 004570A0
                              • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 0045702E
                              • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 00456F8D
                              • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 00456FDC
                              • IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption), xrefs: 00457066
                              • IPersistFile::Save, xrefs: 004570FE
                              • %ProgramFiles(x86)%\, xrefs: 00456ECA
                              • {pf32}\, xrefs: 00456EBA
                              • CoCreateInstance, xrefs: 00456E4B
                              • IPropertyStore::Commit, xrefs: 0045707F
                              • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 00456F59
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CreateInstance$FreeString
                              • String ID: %ProgramFiles(x86)%\$CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)${pf32}\
                              • API String ID: 308859552-2363233914
                              • Opcode ID: 3ac96debb6eb05856b77dec55ef76563f881696d2ef6aa7bf2a4a7380679b832
                              • Instruction ID: 02ec3099c1e013a4d2a6014e0405d8002507ef7a0ca247d1a979c15f6e32810c
                              • Opcode Fuzzy Hash: 3ac96debb6eb05856b77dec55ef76563f881696d2ef6aa7bf2a4a7380679b832
                              • Instruction Fuzzy Hash: 57B18071A04204AFDB11DFA9D845B9E7BF8AF08706F5440B6F904E7262DB38DD48CB69
                              APIs
                                • Part of subcall function 004795B8: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02207A54,?,?,?,02207A54,0047977C,00000000,0047989A,?,?,?,?), ref: 004795D1
                                • Part of subcall function 004795B8: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004795D7
                                • Part of subcall function 004795B8: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02207A54,?,?,?,02207A54,0047977C,00000000,0047989A,?,?,?,?), ref: 004795EA
                                • Part of subcall function 004795B8: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02207A54,?,?,?,02207A54), ref: 00479614
                                • Part of subcall function 004795B8: CloseHandle.KERNEL32(00000000,?,?,?,02207A54,0047977C,00000000,0047989A,?,?,?,?), ref: 00479632
                                • Part of subcall function 00479690: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,00479722,?,?,?,02207A54,?,00479784,00000000,0047989A,?,?,?,?), ref: 004796C0
                              • ShellExecuteEx.SHELL32(0000003C), ref: 004797D4
                              • GetLastError.KERNEL32(00000000,0047989A,?,?,?,?), ref: 004797DD
                              • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 0047982A
                              • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 0047984E
                              • CloseHandle.KERNEL32(00000000,0047987F,00000000,00000000,000000FF,000000FF,00000000,00479878,?,00000000,0047989A,?,?,?,?), ref: 00479872
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                              • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                              • API String ID: 883996979-221126205
                              • Opcode ID: 8e3fa59751d95d2da539948543dbf141a7a7757bbf4aff0c1985467a287ac7a1
                              • Instruction ID: ef977962423105e2be3f30a06cf623b0e2f7e3d3d4ebd630472f9d2e264b432c
                              • Opcode Fuzzy Hash: 8e3fa59751d95d2da539948543dbf141a7a7757bbf4aff0c1985467a287ac7a1
                              • Instruction Fuzzy Hash: 35314471910204AADB10FFAA88416DEBAB8EF45314F51857FF518F7281D77C8D058B1A
                              APIs
                              • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422E44
                              • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,0042300E), ref: 00422E54
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: MessageSendShowWindow
                              • String ID:
                              • API String ID: 1631623395-0
                              • Opcode ID: da2a8fcb43fd68633aa304b3626bddf0313ebff2ba0c1bed8b946ec021528c35
                              • Instruction ID: bacc4b86db7cb1d0e13acf93141a7ddfdaa0ad6c2af5cb9121abc77d57b19b6c
                              • Opcode Fuzzy Hash: da2a8fcb43fd68633aa304b3626bddf0313ebff2ba0c1bed8b946ec021528c35
                              • Instruction Fuzzy Hash: 1B916270B14254AFD700DBA9DB46F9E77F4AB04304F5600B6F904AB292C7B8AE01AB58
                              APIs
                              • IsIconic.USER32(?), ref: 004187E3
                              • GetWindowPlacement.USER32(?,0000002C), ref: 00418800
                              • GetWindowRect.USER32(?), ref: 0041881C
                              • GetWindowLongA.USER32(?,000000F0), ref: 0041882A
                              • GetWindowLongA.USER32(?,000000F8), ref: 0041883F
                              • ScreenToClient.USER32(00000000), ref: 00418848
                              • ScreenToClient.USER32(00000000,?), ref: 00418853
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$ClientLongScreen$IconicPlacementRect
                              • String ID: ,
                              • API String ID: 2266315723-3772416878
                              • Opcode ID: b787cf8406b328f9ec3a8af6233a206f78ef01905e488829e8331a9627355685
                              • Instruction ID: c8128d77bd0d7ceb2c04d713c679bf83e48da9b619e6265fa23865d78167b210
                              • Opcode Fuzzy Hash: b787cf8406b328f9ec3a8af6233a206f78ef01905e488829e8331a9627355685
                              • Instruction Fuzzy Hash: 1B111971505201ABDB00EF69C885E9B77E8AF48314F140A7EB958DB286C738D900CB65
                              APIs
                              • IsIconic.USER32(?), ref: 0042F744
                              • GetWindowLongA.USER32(?,000000F0), ref: 0042F758
                              • GetWindowLongA.USER32(?,000000EC), ref: 0042F76F
                              • GetActiveWindow.USER32 ref: 0042F778
                              • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F7A5
                              • SetActiveWindow.USER32(?,0042F8D5,00000000,?), ref: 0042F7C6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$ActiveLong$IconicMessage
                              • String ID:
                              • API String ID: 1633107849-0
                              • Opcode ID: 2f4e0ac8b91a9cac30f41a6fef11267aa66e4b9fa18fe0b08669371a869f6fb0
                              • Instruction ID: 4c2db8bb30fa69d0e852579bfabd785c91e73d104037fd1269e13a33cc275b58
                              • Opcode Fuzzy Hash: 2f4e0ac8b91a9cac30f41a6fef11267aa66e4b9fa18fe0b08669371a869f6fb0
                              • Instruction Fuzzy Hash: 0D31B170A00654AFDB01EFB5DC52D6EBBF8EB09704B9244BBF804E7291D6389D04CB18
                              APIs
                              • GetCurrentProcess.KERNEL32(00000028), ref: 00455D8F
                              • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00455D95
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00455DAE
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455DD5
                              • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455DDA
                              • ExitWindowsEx.USER32(00000002,00000000), ref: 00455DEB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                              • String ID: SeShutdownPrivilege
                              • API String ID: 107509674-3733053543
                              • Opcode ID: 6b93d7df648ddfbe47d244892cbfb38d0bfa797355aef2af63c68983705a1af9
                              • Instruction ID: 02e3d1fa5e569da00b44776faf89310fbaa28c239a726f1a6525e170f6cce7ee
                              • Opcode Fuzzy Hash: 6b93d7df648ddfbe47d244892cbfb38d0bfa797355aef2af63c68983705a1af9
                              • Instruction Fuzzy Hash: 55F06871294B02BAE650A6718C1BF7B21A8DB40749F50892ABD41EA1C3D7BDD40C8A7A
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,00499ACA,?,?,00000000,0049D62C,?,00499C54,00000000,00499CA8,?,?,00000000,0049D62C), ref: 004999E3
                              • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 00499A66
                              • FindNextFileA.KERNEL32(000000FF,?,00000000,00499AA2,?,00000000,?,00000000,00499ACA,?,?,00000000,0049D62C,?,00499C54,00000000), ref: 00499A7E
                              • FindClose.KERNEL32(000000FF,00499AA9,00499AA2,?,00000000,?,00000000,00499ACA,?,?,00000000,0049D62C,?,00499C54,00000000,00499CA8), ref: 00499A9C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FileFind$AttributesCloseFirstNext
                              • String ID: isRS-$isRS-???.tmp
                              • API String ID: 134685335-3422211394
                              • Opcode ID: a1f0fefd34916e957a48392730316672e9a8d2ce3a74582890db343c928d0c72
                              • Instruction ID: e7bbbac40fef3dfc3cc8058b31a588cc53a4b1370f1491e53b11de7997221e0f
                              • Opcode Fuzzy Hash: a1f0fefd34916e957a48392730316672e9a8d2ce3a74582890db343c928d0c72
                              • Instruction Fuzzy Hash: 98318871A015586FDF10EF66CC41ADEBBBCDB45304F5184BBA808A32A1DA389F45CE58
                              APIs
                              • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457E0D
                              • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457E34
                              • SetForegroundWindow.USER32(?), ref: 00457E45
                              • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,0045811D,?,00000000,00458159), ref: 00458108
                              Strings
                              • Cannot evaluate variable because [Code] isn't running yet, xrefs: 00457F88
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: MessagePostWindow$ForegroundNtdllProc_
                              • String ID: Cannot evaluate variable because [Code] isn't running yet
                              • API String ID: 2236967946-3182603685
                              • Opcode ID: 685519442a570b48cb17621a111e6bc8b93d65fea83153691f85968c0254f361
                              • Instruction ID: fc8679ff921622e129be82b5c7b8b9d6156041410e322bf9d6052ebf871bd799
                              • Opcode Fuzzy Hash: 685519442a570b48cb17621a111e6bc8b93d65fea83153691f85968c0254f361
                              • Instruction Fuzzy Hash: E8911234604204DFDB15CF55D952F1ABBF9EB88700F2180BAED04AB792CB79AE05CB58
                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,004566E7), ref: 004565D8
                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004565DE
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: GetDiskFreeSpaceExA$kernel32.dll
                              • API String ID: 1646373207-3712701948
                              • Opcode ID: 19b29b05b4f049c71285320e67c4507336b438f8c50447e7cc98b76a431b265d
                              • Instruction ID: b48cc3d91c9fc3d8a1033014b63779c50d18bc65ef0bc06e4cd1291adb105b9d
                              • Opcode Fuzzy Hash: 19b29b05b4f049c71285320e67c4507336b438f8c50447e7cc98b76a431b265d
                              • Instruction Fuzzy Hash: A2417471A00249AFCF01EFA5C8829EFBBB8EF48304F514567F800F7252D6795D098B69
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,0047628A,?,?,0049E1E4,00000000), ref: 00476179
                              • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,0047628A,?,?,0049E1E4,00000000), ref: 00476256
                              • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,0047628A,?,?,0049E1E4,00000000), ref: 00476264
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Find$File$CloseFirstNext
                              • String ID: unins$unins???.*
                              • API String ID: 3541575487-1009660736
                              • Opcode ID: 5e70da6d7b7899624856419d642b9a30a3442578c6172b99f9e5aa13c9ee4f6f
                              • Instruction ID: eb89464c752a784b36226a23c26c23c5edadcf818cb3280f2000aa581376a5b5
                              • Opcode Fuzzy Hash: 5e70da6d7b7899624856419d642b9a30a3442578c6172b99f9e5aa13c9ee4f6f
                              • Instruction Fuzzy Hash: 11312E70600548ABDB50EB65CC81ADEBBADDB45314F5180F6A84CAB3A6DB389F418F58
                              APIs
                              • IsIconic.USER32(?), ref: 0041815F
                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 0041817D
                              • GetWindowPlacement.USER32(?,0000002C), ref: 004181B3
                              • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 004181DA
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$Placement$Iconic
                              • String ID: ,
                              • API String ID: 568898626-3772416878
                              • Opcode ID: 3939ae1d6e1c590614f47c3d4bcf148a2532e1c37498b01d3d2c2056b4d5783c
                              • Instruction ID: 655d5dfc889397085a04c255a013ff48624dbcd9c32011b5bbe491b24769000a
                              • Opcode Fuzzy Hash: 3939ae1d6e1c590614f47c3d4bcf148a2532e1c37498b01d3d2c2056b4d5783c
                              • Instruction Fuzzy Hash: 3C211D72600204ABDF00EF69CCC1ADA77E8AF49314F55456AFD18DF246CB78D9458BA8
                              APIs
                              • SetErrorMode.KERNEL32(00000001,00000000,00464A8D), ref: 00464901
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,00464A60,?,00000001,00000000,00464A8D), ref: 00464990
                              • FindNextFileA.KERNEL32(000000FF,?,00000000,00464A42,?,00000000,?,00000000,00464A60,?,00000001,00000000,00464A8D), ref: 00464A22
                              • FindClose.KERNEL32(000000FF,00464A49,00464A42,?,00000000,?,00000000,00464A60,?,00000001,00000000,00464A8D), ref: 00464A3C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Find$File$CloseErrorFirstModeNext
                              • String ID:
                              • API String ID: 4011626565-0
                              • Opcode ID: 48c0732eae783cba177e05ac1aa234ae16bb41976722f902c089bc45bad1ce8e
                              • Instruction ID: ae00aa0afc7aa582470d59ca75ba9400823c3a1943f8949d3747a5def8a0c8eb
                              • Opcode Fuzzy Hash: 48c0732eae783cba177e05ac1aa234ae16bb41976722f902c089bc45bad1ce8e
                              • Instruction Fuzzy Hash: B541C570A00658AFDF11EFA5DC45ADEB7B8EB89305F4044BAF404E7381E63C9E488E19
                              APIs
                              • SetErrorMode.KERNEL32(00000001,00000000,00464F33), ref: 00464DC1
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,00464EFE,?,00000001,00000000,00464F33), ref: 00464E07
                              • FindNextFileA.KERNEL32(000000FF,?,00000000,00464EE0,?,00000000,?,00000000,00464EFE,?,00000001,00000000,00464F33), ref: 00464EBC
                              • FindClose.KERNEL32(000000FF,00464EE7,00464EE0,?,00000000,?,00000000,00464EFE,?,00000001,00000000,00464F33), ref: 00464EDA
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Find$File$CloseErrorFirstModeNext
                              • String ID:
                              • API String ID: 4011626565-0
                              • Opcode ID: ec937dbce600953c5d0d9fe6d2f2e6b7206311b8e6b35776b55d12eec71b02e8
                              • Instruction ID: 8e27f6cc4c7e55bed8f6d5ebd72a4c3c722eac7afebeb0f1b00dc6af3d7f2fe3
                              • Opcode Fuzzy Hash: ec937dbce600953c5d0d9fe6d2f2e6b7206311b8e6b35776b55d12eec71b02e8
                              • Instruction Fuzzy Hash: 31416535A006589FCB11EFA5CD859DEB7B9FBC8305F5044AAF804E7341EB389E448E59
                              APIs
                              • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00453683,00000000,004536A4), ref: 0042EDA6
                              • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042EDD1
                              • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00453683,00000000,004536A4), ref: 0042EDDE
                              • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00453683,00000000,004536A4), ref: 0042EDE6
                              • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00453683,00000000,004536A4), ref: 0042EDEC
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                              • String ID:
                              • API String ID: 1177325624-0
                              • Opcode ID: 29db8fce105cec5f3143bbfa5ea21b58fd084d018b29bb323eae88079787b565
                              • Instruction ID: d5f14a2582f403684e4f7b299b1070748df424b87161b08669007267f0031b9d
                              • Opcode Fuzzy Hash: 29db8fce105cec5f3143bbfa5ea21b58fd084d018b29bb323eae88079787b565
                              • Instruction Fuzzy Hash: 21F0F0723A07203AF620B17A6C82F7F018CC784B68F10423AF704FF1D1D9A84D0515AD
                              APIs
                              • IsIconic.USER32(?), ref: 00484D66
                              • GetWindowLongA.USER32(00000000,000000F0), ref: 00484D84
                              • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049E0AC,00484242,00484276,00000000,00484296,?,?,?,0049E0AC), ref: 00484DA6
                              • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049E0AC,00484242,00484276,00000000,00484296,?,?,?,0049E0AC), ref: 00484DBA
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$Show$IconicLong
                              • String ID:
                              • API String ID: 2754861897-0
                              • Opcode ID: 6d02ab3679acd20c13477f6129401e215db0be7c9c4dcc708735b62ecc99512f
                              • Instruction ID: c453c85064c149f2f8de5328ae0569b6634ad2f96c4c2f1b45344ef68f201c80
                              • Opcode Fuzzy Hash: 6d02ab3679acd20c13477f6129401e215db0be7c9c4dcc708735b62ecc99512f
                              • Instruction Fuzzy Hash: 3D015E706002129EDB10FB769D89B9A22D95B50344F19083FB8449B2E2CB7C9841975C
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,00463418), ref: 0046339C
                              • FindNextFileA.KERNEL32(000000FF,?,00000000,004633F8,?,00000000,?,00000000,00463418), ref: 004633D8
                              • FindClose.KERNEL32(000000FF,004633FF,004633F8,?,00000000,?,00000000,00463418), ref: 004633F2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Find$File$CloseFirstNext
                              • String ID:
                              • API String ID: 3541575487-0
                              • Opcode ID: 635e217b2fc9f7435441bd5570030132af4e7fadc4977a31bbca5b6ea47d96a6
                              • Instruction ID: 0500e82312f9f08261d57c94a6d9b1f58695be5d4d7593f033a5dbf80f84d4fc
                              • Opcode Fuzzy Hash: 635e217b2fc9f7435441bd5570030132af4e7fadc4977a31bbca5b6ea47d96a6
                              • Instruction Fuzzy Hash: 1421DB315046886FDB11DF66CC41ADEB7ACDB49305F5084F7B808D3251EA389F44C959
                              APIs
                              • IsIconic.USER32(?), ref: 00424634
                              • SetActiveWindow.USER32(?,?,?,?,0046DA13), ref: 00424641
                                • Part of subcall function 00423A9C: ShowWindow.USER32(004108B0,00000009,?,00000000,0041F1F4,00423D8A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042405C), ref: 00423AB7
                                • Part of subcall function 00423F64: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,022025AC,0042465A,?,?,?,?,0046DA13), ref: 00423F9F
                              • SetFocus.USER32(00000000,?,?,?,?,0046DA13), ref: 0042466E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$ActiveFocusIconicShow
                              • String ID:
                              • API String ID: 649377781-0
                              • Opcode ID: f6b17c850702daf3fe2f22264f5d8e983b40a127641bef431db8629b7e0b9e45
                              • Instruction ID: 5ae1608fbac1b61a262bbd8080f57afdf1b64e8a1d97d82fcb33e84f02d7d1dc
                              • Opcode Fuzzy Hash: f6b17c850702daf3fe2f22264f5d8e983b40a127641bef431db8629b7e0b9e45
                              • Instruction Fuzzy Hash: DBF0D07170122187CB00BFA9D9C5A9633A8AF48714B56407BBD09DF25BC67CDC458768
                              APIs
                              • InitializeSecurityDescriptor.ADVAPI32(00000001,00000001), ref: 0042F261
                              • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000,00000001,00000001), ref: 0042F271
                              • CreateMutexA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0042F299
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: DescriptorSecurity$CreateDaclInitializeMutex
                              • String ID:
                              • API String ID: 3525989157-0
                              • Opcode ID: 296a65e85b4cf530d2912259c248fa0dd98adb1b483a3bccc15e2a953cf47158
                              • Instruction ID: b330794617a7040f76ad0da05c7b1ee5a1856395dd3e8d048ce20caf316d4231
                              • Opcode Fuzzy Hash: 296a65e85b4cf530d2912259c248fa0dd98adb1b483a3bccc15e2a953cf47158
                              • Instruction Fuzzy Hash: 18E0C0B16443007EE200EE758C82F5F76DCDB48714F00483AB654DB1C1E679D9489B96
                              APIs
                              • IsIconic.USER32(?), ref: 0041815F
                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 0041817D
                              • GetWindowPlacement.USER32(?,0000002C), ref: 004181B3
                              • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 004181DA
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$Placement$Iconic
                              • String ID:
                              • API String ID: 568898626-0
                              • Opcode ID: add44dc6c1a8246b0274be2cc60e43faf0e8d0d1d4c3491e9dc610c53a27efe0
                              • Instruction ID: b17f17ea660f77e7302433a0225cb82371cce2f83056bcd31e3690383aca5fbc
                              • Opcode Fuzzy Hash: add44dc6c1a8246b0274be2cc60e43faf0e8d0d1d4c3491e9dc610c53a27efe0
                              • Instruction Fuzzy Hash: E5012C72300104BBDF10EE69CCC1EEB7798AB55364F55416AFD18DF242DA38ED8287A8
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CaptureIconic
                              • String ID:
                              • API String ID: 2277910766-0
                              • Opcode ID: ac6aa1af0e1d137f6700960f31413d4ebc5a5ea2cfe80ba42947f9ea9a851159
                              • Instruction ID: c42435c704d87005acf5b6d7044dd68bff31d3bfeee1bac994fdbb5906758c2c
                              • Opcode Fuzzy Hash: ac6aa1af0e1d137f6700960f31413d4ebc5a5ea2cfe80ba42947f9ea9a851159
                              • Instruction Fuzzy Hash: 79F049313446014BD720A72DC889AAF62F99F84394B1C643BE41AC7756EB7DDDC48758
                              APIs
                              • IsIconic.USER32(?), ref: 004245EB
                                • Part of subcall function 00423ED4: EnumWindows.USER32(00423E6C), ref: 00423EF8
                                • Part of subcall function 00423ED4: GetWindow.USER32(?,00000003), ref: 00423F0D
                                • Part of subcall function 00423ED4: GetWindowLongA.USER32(?,000000EC), ref: 00423F1C
                                • Part of subcall function 00423ED4: SetWindowPos.USER32(00000000,004245AC,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004245FB,?,?,004241C3), ref: 00423F52
                              • SetActiveWindow.USER32(?,?,?,004241C3,00000000,004245AC), ref: 004245FF
                                • Part of subcall function 00423A9C: ShowWindow.USER32(004108B0,00000009,?,00000000,0041F1F4,00423D8A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042405C), ref: 00423AB7
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$ActiveEnumIconicLongShowWindows
                              • String ID:
                              • API String ID: 2671590913-0
                              • Opcode ID: 1a354955b864757cfaa5613f9b306845f8d366a619694d2750710a135c8cdae9
                              • Instruction ID: 0eb0e95855424de6865fa4d756a676c77cd5728601e575884a8a50090c80911a
                              • Opcode Fuzzy Hash: 1a354955b864757cfaa5613f9b306845f8d366a619694d2750710a135c8cdae9
                              • Instruction Fuzzy Hash: 3BE01A6070010187DB00EFAAE8C4B8622A8BF88305F55017ABC08CF24BDA3CDC048728
                              APIs
                              • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,00412C25), ref: 00412C13
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: NtdllProc_Window
                              • String ID:
                              • API String ID: 4255912815-0
                              • Opcode ID: de892e97fbd68e1bb7582f7974717f862a539d23c567f166e41cd9819a8f42aa
                              • Instruction ID: cdfe5c129d614e166dcfab814c58775b37bd24f4e82d9105b90a581207f53ed6
                              • Opcode Fuzzy Hash: de892e97fbd68e1bb7582f7974717f862a539d23c567f166e41cd9819a8f42aa
                              • Instruction Fuzzy Hash: 0451C2316082058FC720DF6AD781A9AF3E5EF98304B2086ABD904C7351EAB9ED91C74D
                              APIs
                              • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00479E56
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: NtdllProc_Window
                              • String ID:
                              • API String ID: 4255912815-0
                              • Opcode ID: 462738d441aef1136b86fc8094aec41bc4a49bb6b5bf6afc55cbfc6645c50547
                              • Instruction ID: 77384fbc8b33c5310ab19163c687e45bac72601044cd1e9f95c219b02d082465
                              • Opcode Fuzzy Hash: 462738d441aef1136b86fc8094aec41bc4a49bb6b5bf6afc55cbfc6645c50547
                              • Instruction Fuzzy Hash: 71414A75604105EFCB20CF99C6808AAB7F5EB48310B74C9A6E849DB745D338EE41DB94
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: NameUser
                              • String ID:
                              • API String ID: 2645101109-0
                              • Opcode ID: aa3a47175e92b859a3c3631cc0a30abc799c89e82c4a450a6b7a51612d703bec
                              • Instruction ID: 82cf1e81aeab4cdf4c711474db213eebdc1b2e178f500b1422eacd8e28b83923
                              • Opcode Fuzzy Hash: aa3a47175e92b859a3c3631cc0a30abc799c89e82c4a450a6b7a51612d703bec
                              • Instruction Fuzzy Hash: 0AD0C27230460063C700AAA99C826AA359C8B84305F00883F3CC5DA2C3EABDDA4C5696
                              APIs
                                • Part of subcall function 0044BAA4: GetVersionExA.KERNEL32(00000094), ref: 0044BAC1
                                • Part of subcall function 0044BAF8: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0044BB10
                              • LoadLibraryA.KERNEL32(00000000,00000000,0044BF0B,?,?,?,?,00000000,00000000,?,0044FD4D,0049A4DA), ref: 0044BB8A
                              • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044BBA2
                              • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044BBB4
                              • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044BBC6
                              • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044BBD8
                              • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044BBEA
                              • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044BBFC
                              • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044BC0E
                              • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044BC20
                              • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044BC32
                              • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044BC44
                              • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044BC56
                              • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044BC68
                              • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044BC7A
                              • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044BC8C
                              • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044BC9E
                              • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044BCB0
                              • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044BCC2
                              • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044BCD4
                              • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044BCE6
                              • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044BCF8
                              • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044BD0A
                              • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044BD1C
                              • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044BD2E
                              • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044BD40
                              • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044BD52
                              • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044BD64
                              • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044BD76
                              • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044BD88
                              • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044BD9A
                              • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044BDAC
                              • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044BDBE
                              • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044BDD0
                              • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044BDE2
                              • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044BDF4
                              • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044BE06
                              • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044BE18
                              • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044BE2A
                              • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044BE3C
                              • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044BE4E
                              • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044BE60
                              • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044BE72
                              • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044BE84
                              • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044BE96
                              • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044BEA8
                              • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044BEBA
                              • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044BECC
                              • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044BEDE
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc$DirectoryLibraryLoadSystemVersion
                              • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                              • API String ID: 2754715182-2910565190
                              • Opcode ID: 1a560d406fd28363c82114fe615e1cf3cd8c7e96d78b4122faffdbe0687169de
                              • Instruction ID: 345b4916510d3cb7c096cba84ec2b1d1bd9d6ff2ab3c947e91cb1c242a843473
                              • Opcode Fuzzy Hash: 1a560d406fd28363c82114fe615e1cf3cd8c7e96d78b4122faffdbe0687169de
                              • Instruction Fuzzy Hash: 49A16AB0A41A50EBEB00EFF5DC86A2A37A8EB15B14B1405BBB444EF295D678DC048F5D
                              APIs
                              • Sleep.KERNEL32(00000000,00000000,004944E1,?,?,?,?,00000000,00000000,00000000), ref: 0049402C
                              • FindWindowA.USER32(00000000,00000000), ref: 0049405D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FindSleepWindow
                              • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                              • API String ID: 3078808852-3310373309
                              • Opcode ID: 6c13f5a393d1a9c00e8787351cf7d3ffbfb63decb9f63bc49c4143e268631f25
                              • Instruction ID: aaf63752e06fee66a7d05b71673dc8e7902340e663ecb0da5339ca9489632561
                              • Opcode Fuzzy Hash: 6c13f5a393d1a9c00e8787351cf7d3ffbfb63decb9f63bc49c4143e268631f25
                              • Instruction Fuzzy Hash: 7EC14060B0421027DB14FB7ACC4692E5A999BD4704750CA3FB40AEB78BDE3CDC0B4799
                              APIs
                              • GetDC.USER32(00000000), ref: 0041CE90
                              • CreateCompatibleDC.GDI32(?), ref: 0041CE9C
                              • CreateBitmap.GDI32(0041AD94,?,00000001,00000001,00000000), ref: 0041CEC0
                              • CreateCompatibleBitmap.GDI32(?,0041AD94,?), ref: 0041CED0
                              • SelectObject.GDI32(0041D28C,00000000), ref: 0041CEEB
                              • FillRect.USER32(0041D28C,?,?), ref: 0041CF26
                              • SetTextColor.GDI32(0041D28C,00000000), ref: 0041CF3B
                              • SetBkColor.GDI32(0041D28C,00000000), ref: 0041CF52
                              • PatBlt.GDI32(0041D28C,00000000,00000000,0041AD94,?,00FF0062), ref: 0041CF68
                              • CreateCompatibleDC.GDI32(?), ref: 0041CF7B
                              • SelectObject.GDI32(00000000,00000000), ref: 0041CFAC
                              • SelectPalette.GDI32(00000000,00000000,00000001), ref: 0041CFC4
                              • RealizePalette.GDI32(00000000), ref: 0041CFCD
                              • SelectPalette.GDI32(0041D28C,00000000,00000001), ref: 0041CFDC
                              • RealizePalette.GDI32(0041D28C), ref: 0041CFE5
                              • SetTextColor.GDI32(00000000,00000000), ref: 0041CFFE
                              • SetBkColor.GDI32(00000000,00000000), ref: 0041D015
                              • BitBlt.GDI32(0041D28C,00000000,00000000,0041AD94,?,00000000,00000000,00000000,00CC0020), ref: 0041D031
                              • SelectObject.GDI32(00000000,?), ref: 0041D03E
                              • DeleteDC.GDI32(00000000), ref: 0041D054
                                • Part of subcall function 0041A4A8: GetSysColor.USER32(?), ref: 0041A4B2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ColorSelect$CreatePalette$CompatibleObject$BitmapRealizeText$DeleteFillRect
                              • String ID:
                              • API String ID: 269503290-0
                              • Opcode ID: 5e0ecd7f746a94368510dc98cd5b3d13ae19e4ca4739b00519ae71ef4424a664
                              • Instruction ID: f3cd37e79d0242250547ce8a95e3067296a2558137ee74c5e82542f4c8f5946c
                              • Opcode Fuzzy Hash: 5e0ecd7f746a94368510dc98cd5b3d13ae19e4ca4739b00519ae71ef4424a664
                              • Instruction Fuzzy Hash: 6F61CD71A44604AFDB10EBE9DC46FAFB7B8EF48704F10446AF504E7281C67CA9418B69
                              APIs
                                • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                              • RegCloseKey.ADVAPI32(?,00469C26,?,?,00000001,00000000,00000000,00469C41,?,00000000,00000000,?), ref: 00469C0F
                              Strings
                              • Inno Setup: Icon Group, xrefs: 00469AEA
                              • Inno Setup: User Info: Serial, xrefs: 00469BF1
                              • Inno Setup: Selected Tasks, xrefs: 00469B7B
                              • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00469A6B
                              • Inno Setup: No Icons, xrefs: 00469AF7
                              • Inno Setup: Deselected Tasks, xrefs: 00469B9D
                              • Inno Setup: User Info: Organization, xrefs: 00469BDE
                              • Inno Setup: App Path, xrefs: 00469ACE
                              • Inno Setup: User Info: Name, xrefs: 00469BCB
                              • Inno Setup: Setup Type, xrefs: 00469B1E
                              • Inno Setup: Selected Components, xrefs: 00469B2E
                              • %s\%s_is1, xrefs: 00469A89
                              • Inno Setup: Deselected Components, xrefs: 00469B50
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseOpen
                              • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                              • API String ID: 47109696-1093091907
                              • Opcode ID: 483f58ed5ea1caa2215aad72aa4fbba2634ec1474e25935b186163811d3f8b9c
                              • Instruction ID: c7de7197f4a769c9e7c3cd52df4c64fbb683598124d789e1de9a85ab418445f9
                              • Opcode Fuzzy Hash: 483f58ed5ea1caa2215aad72aa4fbba2634ec1474e25935b186163811d3f8b9c
                              • Instruction Fuzzy Hash: C4519430A006089BCB15DB66D941BEEB7F9EF49304F5084BAE84067395E7B8AF01CB5D
                              APIs
                                • Part of subcall function 0042CC54: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042CC78
                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00473C58
                              • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00473D73
                              • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 00473D89
                              • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00473DAE
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                              • String ID: .lnk$.pif$.url$Creating the icon.$Desktop.ini$Dest filename: %s$Successfully created the icon.$target.lnk${group}\
                              • API String ID: 971782779-2902529204
                              • Opcode ID: c6b7fa7affdc9fb62b84ae8e421d73df12b763fd4200ba090a8c7e9b83a24d61
                              • Instruction ID: 9b31a6288a8d0ad81c732a29d19026b8086b57763a6276d7ac4447936d78ea7d
                              • Opcode Fuzzy Hash: c6b7fa7affdc9fb62b84ae8e421d73df12b763fd4200ba090a8c7e9b83a24d61
                              • Instruction Fuzzy Hash: EBD11374A00148ABDB11DFA9D582BDDBBF4AF08305F50806AF804B7392D778AE45DB69
                              APIs
                              • ShowWindow.USER32(?,00000005,00000000,0049A050,?,?,00000000,?,00000000,00000000,?,0049A407,00000000,0049A411,?,00000000), ref: 00499D3B
                              • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,0049A050,?,?,00000000,?,00000000,00000000,?,0049A407,00000000), ref: 00499D4E
                              • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,0049A050,?,?,00000000,?,00000000,00000000), ref: 00499D5E
                              • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00499D7F
                              • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,0049A050,?,?,00000000,?,00000000), ref: 00499D8F
                                • Part of subcall function 0042D89C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D92A,?,?,?,00000001,?,0045681A,00000000,00456882), ref: 0042D8D1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                              • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                              • API String ID: 2000705611-3672972446
                              • Opcode ID: 6c6239035cda5b1c4d26cc66e6061e20cf0a5a8c62d227012637540de454186f
                              • Instruction ID: 24b702ce4587ab849973673670b37801b9677cadbfb3bf4f1077f7c12e9ac28d
                              • Opcode Fuzzy Hash: 6c6239035cda5b1c4d26cc66e6061e20cf0a5a8c62d227012637540de454186f
                              • Instruction Fuzzy Hash: 5591C430A04205AFDF11EF69C852BAEBBB4EB49304F51447AF500AB792C63DAC05CB6D
                              APIs
                              • GetLastError.KERNEL32(00000000,0045B190,?,?,?,?,?,00000006,?,00000000,00499145,?,00000000,004991E8), ref: 0045B042
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                              • API String ID: 1452528299-3112430753
                              • Opcode ID: 3d9e3a5314c5b4e0fd7d2bce45321bf51c5b66cfc100c7b458080a39117b5d19
                              • Instruction ID: 1722664f16d817fc675012576ec738190a07adef69c32437d7057340c1fc2b4b
                              • Opcode Fuzzy Hash: 3d9e3a5314c5b4e0fd7d2bce45321bf51c5b66cfc100c7b458080a39117b5d19
                              • Instruction Fuzzy Hash: 3271AE307006445BDB01EB6A88927AE7BA5EF49755F50846BFC01EB383CB7C8E49879D
                              APIs
                              • GetVersion.KERNEL32 ref: 0045D3D6
                              • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045D3F6
                              • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045D403
                              • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045D410
                              • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045D41E
                                • Part of subcall function 0045D2C4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045D363,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045D33D
                              • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D611,?,?,00000000), ref: 0045D4D7
                              • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D611,?,?,00000000), ref: 0045D4E0
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                              • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                              • API String ID: 59345061-4263478283
                              • Opcode ID: c51607bbed49a3986bcf40b6c03b8a94b2df1a44d19d34c8b1d67d5ae9631035
                              • Instruction ID: 1fdbc06bdf38f6500452038ca5d2f44928d617c4984e35671f0aa61f53d98d16
                              • Opcode Fuzzy Hash: c51607bbed49a3986bcf40b6c03b8a94b2df1a44d19d34c8b1d67d5ae9631035
                              • Instruction Fuzzy Hash: D35183B1D00208EFDB20DF99C841BAEB7B8EF49315F14806AF904B7382D6789945CF69
                              APIs
                              • CreateCompatibleDC.GDI32(00000000), ref: 0041B813
                              • CreateCompatibleDC.GDI32(00000000), ref: 0041B81D
                              • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B82F
                              • CreateBitmap.GDI32(0000000B,?,00000001,00000001,00000000), ref: 0041B846
                              • GetDC.USER32(00000000), ref: 0041B852
                              • CreateCompatibleBitmap.GDI32(00000000,0000000B,?), ref: 0041B87F
                              • ReleaseDC.USER32(00000000,00000000), ref: 0041B8A5
                              • SelectObject.GDI32(00000000,?), ref: 0041B8C0
                              • SelectObject.GDI32(?,00000000), ref: 0041B8CF
                              • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B8FB
                              • SelectObject.GDI32(00000000,00000000), ref: 0041B909
                              • SelectObject.GDI32(?,00000000), ref: 0041B917
                              • DeleteDC.GDI32(00000000), ref: 0041B920
                              • DeleteDC.GDI32(?), ref: 0041B929
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
                              • String ID:
                              • API String ID: 644427674-0
                              • Opcode ID: 545e798d89bfd874ee53134500b0446245b84f374f10eb2ff5fc30c629433f8f
                              • Instruction ID: 5456327a1e321ce8c2b8187df1c916a831ebe275c46a8a968a344784d91ca00b
                              • Opcode Fuzzy Hash: 545e798d89bfd874ee53134500b0446245b84f374f10eb2ff5fc30c629433f8f
                              • Instruction Fuzzy Hash: FC419F71E44609ABDB10EAE9C845FEFB7BCEB08704F104466F614F7281D7786D418BA8
                              APIs
                                • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                              • RegQueryValueExA.ADVAPI32(0045B366,00000000,00000000,?,00000000,?,00000000,00455275,?,0045B366,00000003,00000000,00000000,004552AC), ref: 004550F5
                                • Part of subcall function 0042ED18: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004539D7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042ED37
                              • RegQueryValueExA.ADVAPI32(0045B366,00000000,00000000,00000000,?,00000004,00000000,004551BF,?,0045B366,00000000,00000000,?,00000000,?,00000000), ref: 00455179
                              • RegQueryValueExA.ADVAPI32(0045B366,00000000,00000000,00000000,?,00000004,00000000,004551BF,?,0045B366,00000000,00000000,?,00000000,?,00000000), ref: 004551A8
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00455013
                              • , xrefs: 00455066
                              • RegOpenKeyEx, xrefs: 00455078
                              • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045504C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: QueryValue$FormatMessageOpen
                              • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                              • API String ID: 2812809588-1577016196
                              • Opcode ID: 02c8e919cbe9c8ea519eaa916f6c6eac6bc29195dc3cf6561bf7061779b77b2a
                              • Instruction ID: 06452bf81ef06fa34888f2ab1cc7b3841a1100f4c60e90cd60a05f06e497d7d6
                              • Opcode Fuzzy Hash: 02c8e919cbe9c8ea519eaa916f6c6eac6bc29195dc3cf6561bf7061779b77b2a
                              • Instruction Fuzzy Hash: E0913371D04608ABDB10DFA5C952BEEB7F8EB08305F50406BF904F7282D6799E088B69
                              APIs
                                • Part of subcall function 00459B60: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459C9D,00000000,00459E55,?,00000000,00000000,00000000), ref: 00459BAD
                              • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459E55,?,00000000,00000000,00000000), ref: 00459CFB
                              • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459E55,?,00000000,00000000,00000000), ref: 00459D65
                                • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                              • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,00459E55,?,00000000,00000000,00000000), ref: 00459DCC
                              Strings
                              • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 00459D18
                              • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 00459D7F
                              • .NET Framework version %s not found, xrefs: 00459E05
                              • .NET Framework not found, xrefs: 00459E19
                              • v1.1.4322, xrefs: 00459DBE
                              • v4.0.30319, xrefs: 00459CED
                              • v2.0.50727, xrefs: 00459D57
                              • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 00459CAE
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Close$Open
                              • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                              • API String ID: 2976201327-446240816
                              • Opcode ID: a3f1e93d4e7ba3fda042b2f30cdd9edc56e8298a3f53841293840353788f2ced
                              • Instruction ID: 13a12a4b366685baa8d6a2e304724611cbcec49206d2204e0959de5a5d6478e2
                              • Opcode Fuzzy Hash: a3f1e93d4e7ba3fda042b2f30cdd9edc56e8298a3f53841293840353788f2ced
                              • Instruction Fuzzy Hash: 6451B235A04104EFCB04DB66D862BEE77BADB49305F1844BBA941D7382E7799E0D8B18
                              APIs
                              • CloseHandle.KERNEL32(?), ref: 00459277
                              • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00459293
                              • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 004592A1
                              • GetExitCodeProcess.KERNEL32(?), ref: 004592B2
                              • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 004592F9
                              • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00459315
                              Strings
                              • Stopping 64-bit helper process. (PID: %u), xrefs: 00459269
                              • Helper process exited with failure code: 0x%x, xrefs: 004592DF
                              • Helper process exited, but failed to get exit code., xrefs: 004592EB
                              • Helper isn't responding; killing it., xrefs: 00459283
                              • Helper process exited., xrefs: 004592C1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                              • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                              • API String ID: 3355656108-1243109208
                              • Opcode ID: 230b5ddc3981dfca21d5636881bab7241834d3e40b9cb852e8f413207b64b114
                              • Instruction ID: 475b633a8f1197f12a32b7740e8dffccf3703e2e74a756bc360da45c31bde27f
                              • Opcode Fuzzy Hash: 230b5ddc3981dfca21d5636881bab7241834d3e40b9cb852e8f413207b64b114
                              • Instruction Fuzzy Hash: 7B215C70604700EAC720EA7DC486B5B77D49F49305F048D2EB899DB693DA7CEC489B2A
                              APIs
                                • Part of subcall function 0042E234: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042E260
                              • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,00454E67,?,00000000,00454F2B), ref: 00454DB7
                              • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,00454E67,?,00000000,00454F2B), ref: 00454EF3
                                • Part of subcall function 0042ED18: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004539D7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042ED37
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454CCF
                              • RegCreateKeyEx, xrefs: 00454D2B
                              • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454CFF
                              • , xrefs: 00454D19
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseCreateFormatMessageQueryValue
                              • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                              • API String ID: 2481121983-1280779767
                              • Opcode ID: 651842d0f4ad9c4ad2a8b1aa2e40d639b19969428397b1c3b65e76aead969962
                              • Instruction ID: 61cb1c98edcfe528623c145d9993427f2b00fea00e486b8f0244815ce8f04fab
                              • Opcode Fuzzy Hash: 651842d0f4ad9c4ad2a8b1aa2e40d639b19969428397b1c3b65e76aead969962
                              • Instruction Fuzzy Hash: 18810175900209ABDB01DFD5C942BDEB7B8FB49709F50442AF900FB282D7789A49CB69
                              APIs
                                • Part of subcall function 00454024: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00498709,_iu,?,00000000,0045415E), ref: 00454113
                                • Part of subcall function 00454024: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00498709,_iu,?,00000000,0045415E), ref: 00454123
                              • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 004985B5
                              • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00498709), ref: 004985D6
                              • CreateWindowExA.USER32(00000000,STATIC,00498718,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 004985FD
                              • SetWindowLongA.USER32(?,000000FC,00497D90), ref: 00498610
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004986DC,?,?,000000FC,00497D90,00000000,STATIC,00498718), ref: 00498640
                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004986B4
                              • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004986DC,?,?,000000FC,00497D90,00000000), ref: 004986C0
                                • Part of subcall function 00454498: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0045457F
                              • DestroyWindow.USER32(?,004986E3,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004986DC,?,?,000000FC,00497D90,00000000,STATIC), ref: 004986D6
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$File$CloseCreateHandle$AttributesCopyDestroyLongMultipleObjectsPrivateProfileStringWaitWrite
                              • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                              • API String ID: 1549857992-2312673372
                              • Opcode ID: e7778411e9b1b6630edda92c2df3270715494436d156fffcbb967f4de96f6acd
                              • Instruction ID: 19a9ac76a87cbdbac9fefc72f4bc8d66673aab5a8439699f4ab81f25108c8d39
                              • Opcode Fuzzy Hash: e7778411e9b1b6630edda92c2df3270715494436d156fffcbb967f4de96f6acd
                              • Instruction Fuzzy Hash: 78414771A54204AFDF00EBA5CC42F9E7BF8EB09714F51457AF500FB291DA799E048B58
                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E96D,?,00000000,0047F9E0,00000000), ref: 0042E891
                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E897
                              • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E96D,?,00000000,0047F9E0,00000000), ref: 0042E8E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressCloseHandleModuleProc
                              • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll$hE
                              • API String ID: 4190037839-2100363064
                              • Opcode ID: 239c3c02294f51b8c912056430f27a88fc2a2be1332949b179e9f088037ce780
                              • Instruction ID: 343416b7bfae85f45959abe8e21461bd4048f30ead5244c3b453dfa896624356
                              • Opcode Fuzzy Hash: 239c3c02294f51b8c912056430f27a88fc2a2be1332949b179e9f088037ce780
                              • Instruction Fuzzy Hash: 06214470B00229EBDB50EAA7DC42BAE77A8EB44314F904477A500E7281DB7C9E45DB1C
                              APIs
                              • GetActiveWindow.USER32 ref: 004635F0
                              • GetModuleHandleA.KERNEL32(user32.dll), ref: 00463604
                              • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00463611
                              • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0046361E
                              • GetWindowRect.USER32(?,00000000), ref: 0046366A
                              • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 004636A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$AddressProc$ActiveHandleModuleRect
                              • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                              • API String ID: 2610873146-3407710046
                              • Opcode ID: ad842200cfa6e8a47196dba0d23866f984cf60195872fdf45755fb4f31d5380a
                              • Instruction ID: 23225dc964baf5770c03b9449d190f9fd0809e25ab0c2f23061680c52a7637e8
                              • Opcode Fuzzy Hash: ad842200cfa6e8a47196dba0d23866f984cf60195872fdf45755fb4f31d5380a
                              • Instruction Fuzzy Hash: AE21C2B17006446BD320EE68CC45F3B76D9EB84B05F09452EF944DB3C1EA78DD004B5A
                              APIs
                              • GetActiveWindow.USER32 ref: 0042F620
                              • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F634
                              • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F641
                              • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F64E
                              • GetWindowRect.USER32(?,00000000), ref: 0042F69A
                              • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F6D8
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$AddressProc$ActiveHandleModuleRect
                              • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                              • API String ID: 2610873146-3407710046
                              • Opcode ID: 12727d74b9d159a374f9225cc8b39a186865ffad57b7795b885c82a727b8d1b1
                              • Instruction ID: 8e363f887434259cf3ecd6bfca6d9ac669349ab4594bae960fb014309ef79425
                              • Opcode Fuzzy Hash: 12727d74b9d159a374f9225cc8b39a186865ffad57b7795b885c82a727b8d1b1
                              • Instruction Fuzzy Hash: BC21C2B27006146FD600EA68DC85F3B72A9EB84704F89463AF944DB391DA78DC098B59
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,004595F7,?,00000000,0045965A,?,?,00000000,00000000), ref: 00459475
                              • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,0045958C,?,00000000,00000001,00000000,00000000,00000000,004595F7), ref: 004594D2
                              • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,0045958C,?,00000000,00000001,00000000,00000000,00000000,004595F7), ref: 004594DF
                              • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 0045952B
                              • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00459565,?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,0045958C,?,00000000), ref: 00459551
                              • GetLastError.KERNEL32(?,?,00000000,00000001,00459565,?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,0045958C,?,00000000), ref: 00459558
                                • Part of subcall function 00453C04: GetLastError.KERNEL32(00000000,00454799,00000005,00000000,004547CE,?,?,00000000,0049D62C,00000004,00000000,00000000,00000000,?,00499C8D,00000000), ref: 00453C07
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                              • String ID: CreateEvent$TransactNamedPipe
                              • API String ID: 2182916169-3012584893
                              • Opcode ID: b55503e34f8d962b7f84c3645a894460d14b73b41b2716c2d68c559e670bf211
                              • Instruction ID: 77fbb71d8e7aac064b87aac98c1c55f9fcb2258c1561d492b861e589c0c855dd
                              • Opcode Fuzzy Hash: b55503e34f8d962b7f84c3645a894460d14b73b41b2716c2d68c559e670bf211
                              • Instruction Fuzzy Hash: CF418B71A00208FFDB11DF99C981F9EB7F9EB48710F5040AAF904E7282D6789E54CB68
                              APIs
                              • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00457621,?,?,00000031,?), ref: 004574E4
                              • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 004574EA
                              • LoadTypeLib.OLEAUT32(00000000,?), ref: 00457537
                                • Part of subcall function 00453C04: GetLastError.KERNEL32(00000000,00454799,00000005,00000000,004547CE,?,?,00000000,0049D62C,00000004,00000000,00000000,00000000,?,00499C8D,00000000), ref: 00453C07
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressErrorHandleLastLoadModuleProcType
                              • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                              • API String ID: 1914119943-2711329623
                              • Opcode ID: 8cf50e875a9dcf410b8dd877ec8f296a8ac8dcccebe425cefeb95bbf43ac864a
                              • Instruction ID: 559faf3bdf9cccbe36ab56d48fd8e4aa4276a02661c60707683b87f46ce48c1c
                              • Opcode Fuzzy Hash: 8cf50e875a9dcf410b8dd877ec8f296a8ac8dcccebe425cefeb95bbf43ac864a
                              • Instruction Fuzzy Hash: 8131B471A04604BFCB01EFAADC01D5FB7BEEB8975571044B6BD04D3652EA38DD04CA68
                              APIs
                              • RectVisible.GDI32(?,?), ref: 00417263
                              • SaveDC.GDI32(?), ref: 00417277
                              • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 0041729A
                              • RestoreDC.GDI32(?,?), ref: 004172B5
                              • CreateSolidBrush.GDI32(00000000), ref: 00417335
                              • FrameRect.USER32(?,?,?), ref: 00417368
                              • DeleteObject.GDI32(?), ref: 00417372
                              • CreateSolidBrush.GDI32(00000000), ref: 00417382
                              • FrameRect.USER32(?,?,?), ref: 004173B5
                              • DeleteObject.GDI32(?), ref: 004173BF
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                              • String ID:
                              • API String ID: 375863564-0
                              • Opcode ID: 7081892d67a76e5858c75433181940d26fd285d77869ff40be0b6357be773945
                              • Instruction ID: 6654575de22a121332528345891e4d9aada139d791074539051cb87a9fd886f5
                              • Opcode Fuzzy Hash: 7081892d67a76e5858c75433181940d26fd285d77869ff40be0b6357be773945
                              • Instruction Fuzzy Hash: 30515D712086455FDB50EF69C8C0B9B7BE8AF48314F1455AAFD588B286C738EC81CB99
                              APIs
                              • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                              • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                              • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                              • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                              • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                              • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                              • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                              • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                              • GetLastError.KERNEL32(000000F5), ref: 00404C46
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                              • String ID:
                              • API String ID: 1694776339-0
                              • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                              • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                              • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                              • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                              APIs
                              • GetSystemMenu.USER32(00000000,00000000), ref: 00422683
                              • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 004226A1
                              • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004226AE
                              • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004226BB
                              • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004226C8
                              • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 004226D5
                              • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 004226E2
                              • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 004226EF
                              • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 0042270D
                              • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 00422729
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Menu$Delete$EnableItem$System
                              • String ID:
                              • API String ID: 3985193851-0
                              • Opcode ID: 28c3c26aa58a7b1d0b737a17757400c93c751d32761aa9437bbdc0a385d65993
                              • Instruction ID: df9c0873c136ddd24b8aa988775969986c1613bec62327c4069b14a2c43cb384
                              • Opcode Fuzzy Hash: 28c3c26aa58a7b1d0b737a17757400c93c751d32761aa9437bbdc0a385d65993
                              • Instruction Fuzzy Hash: 5F2156743847047AE721E724CD8BF9B7BD89B54748F144069B6487F2D3C6FCAA40869C
                              APIs
                              • SHGetMalloc.SHELL32(?), ref: 004621AF
                              • GetActiveWindow.USER32 ref: 00462213
                              • CoInitialize.OLE32(00000000), ref: 00462227
                              • SHBrowseForFolder.SHELL32(?), ref: 0046223E
                              • CoUninitialize.OLE32(0046227F,00000000,?,?,?,?,?,00000000,00462303), ref: 00462253
                              • SetActiveWindow.USER32(?,0046227F,00000000,?,?,?,?,?,00000000,00462303), ref: 00462269
                              • SetActiveWindow.USER32(?,?,0046227F,00000000,?,?,?,?,?,00000000,00462303), ref: 00462272
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                              • String ID: A
                              • API String ID: 2684663990-3554254475
                              • Opcode ID: 1d7e40e0b8975f0196f46b8df0cc514a16ab06fdd2250966ca1bbca8027be4ac
                              • Instruction ID: 1e82777cc352b96db12449cf8796706bfa71e84f11e11660080683620fe74db3
                              • Opcode Fuzzy Hash: 1d7e40e0b8975f0196f46b8df0cc514a16ab06fdd2250966ca1bbca8027be4ac
                              • Instruction Fuzzy Hash: E23130B0E04208AFDB00EFB5D945ADEBBF8EB09304F51447AF914E7251E7789A04CB59
                              APIs
                              • GetFileAttributesA.KERNEL32(00000000,00000000,00473A11,?,?,?,00000008,00000000,00000000,00000000,?,00473C6D,?,?,00000000,00473EF0), ref: 00473974
                                • Part of subcall function 0042D1E4: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042D25A
                                • Part of subcall function 004073A0: DeleteFileA.KERNEL32(00000000,0049D62C,00499FD9,00000000,0049A02E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 004073AB
                              • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00473A11,?,?,?,00000008,00000000,00000000,00000000,?,00473C6D), ref: 004739EB
                              • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00473A11,?,?,?,00000008,00000000,00000000,00000000), ref: 004739F1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                              • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                              • API String ID: 884541143-1710247218
                              • Opcode ID: c5ee601f3e9953c735d8bf0a71158fe3e64be6cf92b19d5fab08f93ca351b12b
                              • Instruction ID: bfb262a57c212aacfed1a05d1298e64af55acb3d3cb9d0523fd91374b550827c
                              • Opcode Fuzzy Hash: c5ee601f3e9953c735d8bf0a71158fe3e64be6cf92b19d5fab08f93ca351b12b
                              • Instruction Fuzzy Hash: 8F11D3B07006047BD701EA698C83AAE73ACDB48715F50813BB844A72C1DB3C9F02961D
                              APIs
                              • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045DAB9
                              • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045DAC9
                              • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045DAD9
                              • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045DAE9
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc
                              • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                              • API String ID: 190572456-3516654456
                              • Opcode ID: 9767c856fa4677b80cc6d2bf323e91fa1147838bf647a7aa43f1430cd9329df0
                              • Instruction ID: 9991d33b7b3f44c4a287d390de66c621eb38f0a325e11cae05c3c9c0ae6f74c7
                              • Opcode Fuzzy Hash: 9767c856fa4677b80cc6d2bf323e91fa1147838bf647a7aa43f1430cd9329df0
                              • Instruction Fuzzy Hash: ED016CB0D00710DAE324DF335C827223AA79B94306F1584376B4853266D3FC184DCE2D
                              APIs
                              • SetBkColor.GDI32(?,00000000), ref: 0041AE09
                              • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0041AE43
                              • SetBkColor.GDI32(?,?), ref: 0041AE58
                              • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AEA2
                              • SetTextColor.GDI32(00000000,00000000), ref: 0041AEAD
                              • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AEBD
                              • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AEFC
                              • SetTextColor.GDI32(00000000,00000000), ref: 0041AF06
                              • SetBkColor.GDI32(00000000,?), ref: 0041AF13
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Color$StretchText
                              • String ID:
                              • API String ID: 2984075790-0
                              • Opcode ID: b2e79564dac12e93c58a92479de6674996e515196b856df7b31fa3c4552ba36b
                              • Instruction ID: 4ec4bb7d7ecd06ab75a809c898bbb7394ceff3bd51f581de865bbf99f3132505
                              • Opcode Fuzzy Hash: b2e79564dac12e93c58a92479de6674996e515196b856df7b31fa3c4552ba36b
                              • Instruction Fuzzy Hash: E761A6B5A01605EFC740EFADE985E9AB7F9EF08318B108566F518DB251C734ED408F98
                              APIs
                                • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                              • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00458A74,?, /s ",?,regsvr32.exe",?,00458A74), ref: 004589E6
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseDirectoryHandleSystem
                              • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                              • API String ID: 2051275411-1862435767
                              • Opcode ID: 155819c64c430fb45d55460a0d10478e2dbda3fe00918e678cc052cf01514edf
                              • Instruction ID: 5e566bfdb395c8031f807e0e6dfcda5b961088fbae7d5a2ae3caad0b9f5d9a1a
                              • Opcode Fuzzy Hash: 155819c64c430fb45d55460a0d10478e2dbda3fe00918e678cc052cf01514edf
                              • Instruction Fuzzy Hash: 94410770A003486BDB10EFE5C842B9DB7F9AF45305F50407FA914BB296DF789E098B59
                              APIs
                              • OffsetRect.USER32(?,00000001,00000001), ref: 0044D781
                              • GetSysColor.USER32(00000014), ref: 0044D788
                              • SetTextColor.GDI32(00000000,00000000), ref: 0044D7A0
                              • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D7C9
                              • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D7D3
                              • GetSysColor.USER32(00000010), ref: 0044D7DA
                              • SetTextColor.GDI32(00000000,00000000), ref: 0044D7F2
                              • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D81B
                              • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D846
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Text$Color$Draw$OffsetRect
                              • String ID:
                              • API String ID: 1005981011-0
                              • Opcode ID: c732eae71167dd8aa6631ccdc206b1dcbb1a1316a8d8e9d7e0f026f0b59abdf9
                              • Instruction ID: 83f763003a0c4173e52025d9049416b14570b2719a823760897ab970dc451d42
                              • Opcode Fuzzy Hash: c732eae71167dd8aa6631ccdc206b1dcbb1a1316a8d8e9d7e0f026f0b59abdf9
                              • Instruction Fuzzy Hash: B221ACB46015047FC710FB2ACD8AE8AB7DC9F59319B00857BB918EB3A3C67CDE444669
                              APIs
                              • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467EB3
                              • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467ED9
                                • Part of subcall function 00467D4C: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00467DE7
                                • Part of subcall function 00467D4C: DestroyCursor.USER32(00000000), ref: 00467DFD
                              • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 00467F30
                              • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00467F91
                              • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467FB7
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                              • String ID: c:\directory$shell32.dll
                              • API String ID: 3376378930-1375355148
                              • Opcode ID: 875611d6e7e42d004a6822cd0457b29277af2731bfce7ef18235f4e05af839d0
                              • Instruction ID: adf232676f9dc8545d434ff73a7213ff4163269ef5d9f53791e9b27a0c2465ea
                              • Opcode Fuzzy Hash: 875611d6e7e42d004a6822cd0457b29277af2731bfce7ef18235f4e05af839d0
                              • Instruction Fuzzy Hash: 64516D70644208AFD750EF65CC85FDEBBA8EB48308F1085A7F5089B391DA399E85CB59
                              APIs
                                • Part of subcall function 00451070: SetEndOfFile.KERNEL32(?,?,0045CB3E,00000000,0045CCC9,?,00000000,00000002,00000002), ref: 00451077
                                • Part of subcall function 004073A0: DeleteFileA.KERNEL32(00000000,0049D62C,00499FD9,00000000,0049A02E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 004073AB
                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 00497E6D
                              • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00497E81
                              • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00497E9B
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00497EA7
                              • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00497EAD
                              • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00497EC0
                              Strings
                              • Deleting Uninstall data files., xrefs: 00497DE3
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                              • String ID: Deleting Uninstall data files.
                              • API String ID: 1570157960-2568741658
                              • Opcode ID: 76f4a073d4d431fcb8e24e0d71c40f55804fe31760389f23b01cbf0fd8bd04be
                              • Instruction ID: 7989a93d4f85e89f9f4a8d52eef74e044f35551c753dc98037dc67a034be62a8
                              • Opcode Fuzzy Hash: 76f4a073d4d431fcb8e24e0d71c40f55804fe31760389f23b01cbf0fd8bd04be
                              • Instruction Fuzzy Hash: 78213270718204BEEF10EBB6AC42B5737A8E755758F15497BF500961E2EA7C5C048B1D
                              APIs
                                • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                              • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,00471155,?,?,?,?,00000000), ref: 004710BF
                              • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,00471155), ref: 004710D6
                              • AddFontResourceA.GDI32(00000000), ref: 004710F3
                              • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00471107
                              Strings
                              • Failed to set value in Fonts registry key., xrefs: 004710C8
                              • AddFontResource, xrefs: 00471111
                              • Failed to open Fonts registry key., xrefs: 004710DD
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseFontMessageNotifyOpenResourceSendValue
                              • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                              • API String ID: 955540645-649663873
                              • Opcode ID: a03f27855fc87ca96a169c1e143b765b8136624149cc9ecf5b4944870508d104
                              • Instruction ID: e530b8863bd5b0940b7b47d45e6c2b04f0dd933a31ed90210a2cbfb1d5868c86
                              • Opcode Fuzzy Hash: a03f27855fc87ca96a169c1e143b765b8136624149cc9ecf5b4944870508d104
                              • Instruction Fuzzy Hash: 3821B27074024477D710EA6A9C42F9A77ACCB09708F60C43BBA04EB3D2DA7CDE05862D
                              APIs
                                • Part of subcall function 00416860: GetClassInfoA.USER32(00400000,?,?), ref: 004168CF
                                • Part of subcall function 00416860: UnregisterClassA.USER32(?,00400000), ref: 004168FB
                                • Part of subcall function 00416860: RegisterClassA.USER32(?), ref: 0041691E
                              • GetVersion.KERNEL32 ref: 00463A54
                              • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 00463A92
                              • SHGetFileInfo.SHELL32(00463B30,00000000,?,00000160,00004011), ref: 00463AAF
                              • LoadCursorA.USER32(00000000,00007F02), ref: 00463ACD
                              • SetCursor.USER32(00000000,00000000,00007F02,00463B30,00000000,?,00000160,00004011), ref: 00463AD3
                              • SetCursor.USER32(?,00463B13,00007F02,00463B30,00000000,?,00000160,00004011), ref: 00463B06
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                              • String ID: Explorer
                              • API String ID: 2594429197-512347832
                              • Opcode ID: 65d5975a7585ee049415f6ae244e5feecb2e1e5ddbe746441fb4960a5f53db61
                              • Instruction ID: 0956d246c88e4b13c617490cc10e92cdb10fa67267cb1644ec11604dcab5a564
                              • Opcode Fuzzy Hash: 65d5975a7585ee049415f6ae244e5feecb2e1e5ddbe746441fb4960a5f53db61
                              • Instruction Fuzzy Hash: 6A212C307403446AE710BFB58C47F9A76989B08708F5000BFBA09EE1C3EABD9D4586AD
                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02207A54,?,?,?,02207A54,0047977C,00000000,0047989A,?,?,?,?), ref: 004795D1
                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004795D7
                              • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02207A54,?,?,?,02207A54,0047977C,00000000,0047989A,?,?,?,?), ref: 004795EA
                              • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02207A54,?,?,?,02207A54), ref: 00479614
                              • CloseHandle.KERNEL32(00000000,?,?,?,02207A54,0047977C,00000000,0047989A,?,?,?,?), ref: 00479632
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                              • String ID: GetFinalPathNameByHandleA$kernel32.dll
                              • API String ID: 2704155762-2318956294
                              • Opcode ID: 7a7a0c7d3d9abbb2ee4536f3f8a99bce4920bee079e61f013f30ba3956b0f975
                              • Instruction ID: 19ddb68189d16dccfde8b10573e35333770f7cebea86a77b7f1be6907437da3a
                              • Opcode Fuzzy Hash: 7a7a0c7d3d9abbb2ee4536f3f8a99bce4920bee079e61f013f30ba3956b0f975
                              • Instruction Fuzzy Hash: CC01D26034470436E52131BA4C86FBB248C8B50768F148237BA1CEA2E2EDAD9E0601AE
                              APIs
                              • GetLastError.KERNEL32(00000000,0045A78A,?,00000000,00000000,00000000,?,00000006,?,00000000,00499145,?,00000000,004991E8), ref: 0045A6CE
                                • Part of subcall function 00454B5C: FindClose.KERNEL32(000000FF,00454C52), ref: 00454C41
                              Strings
                              • Failed to delete directory (%d). Will retry later., xrefs: 0045A6E7
                              • Failed to strip read-only attribute., xrefs: 0045A69C
                              • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 0045A743
                              • Deleting directory: %s, xrefs: 0045A657
                              • Stripped read-only attribute., xrefs: 0045A690
                              • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 0045A6A8
                              • Failed to delete directory (%d)., xrefs: 0045A764
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseErrorFindLast
                              • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                              • API String ID: 754982922-1448842058
                              • Opcode ID: 1f29af1371db45d32686fca523b5f3451fb5bee88339468040673f7751c6b4fe
                              • Instruction ID: 6800a92dfaec35f14ad088af188abd42280c19cea7490fe80134e7d3278dcbe3
                              • Opcode Fuzzy Hash: 1f29af1371db45d32686fca523b5f3451fb5bee88339468040673f7751c6b4fe
                              • Instruction Fuzzy Hash: 62418630A002485ACB10EB6988017AE7AF59B4D306F55867FAC11A7393DB7CCE1D875B
                              APIs
                              • GetCapture.USER32 ref: 004232F4
                              • GetCapture.USER32 ref: 00423303
                              • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00423309
                              • ReleaseCapture.USER32 ref: 0042330E
                              • GetActiveWindow.USER32 ref: 0042331D
                              • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 0042339C
                              • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00423400
                              • GetActiveWindow.USER32 ref: 0042340F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CaptureMessageSend$ActiveWindow$Release
                              • String ID:
                              • API String ID: 862346643-0
                              • Opcode ID: b33e7267c2f8ff98d33321ddaf8eefadd9ab5bb9bc7e5d18a67e741f193460e0
                              • Instruction ID: 3a9af59dda1f98e95100fec3f153a7acb7f05633bd4cd2eb2e4992da2b7770c9
                              • Opcode Fuzzy Hash: b33e7267c2f8ff98d33321ddaf8eefadd9ab5bb9bc7e5d18a67e741f193460e0
                              • Instruction Fuzzy Hash: 68414170B10258AFDB10EFAAD942B9DB7F1AF44704F5140BAE404AB292DB7C9F41CB18
                              APIs
                              • GetDC.USER32(00000000), ref: 004298DA
                              • GetTextMetricsA.GDI32(00000000), ref: 004298E3
                                • Part of subcall function 0041A638: CreateFontIndirectA.GDI32(?), ref: 0041A6F7
                              • SelectObject.GDI32(00000000,00000000), ref: 004298F2
                              • GetTextMetricsA.GDI32(00000000,?), ref: 004298FF
                              • SelectObject.GDI32(00000000,00000000), ref: 00429906
                              • ReleaseDC.USER32(00000000,00000000), ref: 0042990E
                              • GetSystemMetrics.USER32(00000006), ref: 00429933
                              • GetSystemMetrics.USER32(00000006), ref: 0042994D
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Metrics$ObjectSelectSystemText$CreateFontIndirectRelease
                              • String ID:
                              • API String ID: 1583807278-0
                              • Opcode ID: 493c3e02d1035430593376a4cfe0bac28c29019347665ee68c3eba71a2dbb902
                              • Instruction ID: 0ef879b540a67ceb128a5e1141d84f2d1524799c58b88ee5a2ee57f477153a9f
                              • Opcode Fuzzy Hash: 493c3e02d1035430593376a4cfe0bac28c29019347665ee68c3eba71a2dbb902
                              • Instruction Fuzzy Hash: 8401A19170971127F310667A9CC2B6F6688DB54368F44053EFA86963E3D96C8C81876E
                              APIs
                              • GetDC.USER32(00000000), ref: 0041E277
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041E281
                              • ReleaseDC.USER32(00000000,00000000), ref: 0041E28E
                              • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041E29D
                              • GetStockObject.GDI32(00000007), ref: 0041E2AB
                              • GetStockObject.GDI32(00000005), ref: 0041E2B7
                              • GetStockObject.GDI32(0000000D), ref: 0041E2C3
                              • LoadIconA.USER32(00000000,00007F00), ref: 0041E2D4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ObjectStock$CapsDeviceIconLoadRelease
                              • String ID:
                              • API String ID: 225703358-0
                              • Opcode ID: db53187b583683c3da25eb47fc51b38c63e1255722fbf2352793706f85574c6b
                              • Instruction ID: 718266ba1944efb5b46721f14e799226cd24d8dfc19287898d5783b558d94fa9
                              • Opcode Fuzzy Hash: db53187b583683c3da25eb47fc51b38c63e1255722fbf2352793706f85574c6b
                              • Instruction Fuzzy Hash: 1111FB70A453015AE340BFA69D52BAA3691D724709F00813BF608EF3D2DB7D5C809BAD
                              APIs
                              • LoadCursorA.USER32(00000000,00007F02), ref: 00463F38
                              • SetCursor.USER32(00000000,00000000,00007F02,00000000,00463FCD), ref: 00463F3E
                              • SetCursor.USER32(?,00463FB5,00007F02,00000000,00463FCD), ref: 00463FA8
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Cursor$Load
                              • String ID: $ $Internal error: Item already expanding
                              • API String ID: 1675784387-1948079669
                              • Opcode ID: 2e72c9ebfc19e7403a65945d55937a119cc11725f60109d9f94943b84faf3f65
                              • Instruction ID: aa82ab3995de3935e6727d947cb2bd0e3876d59c6d9623ce98a17a39b04bf081
                              • Opcode Fuzzy Hash: 2e72c9ebfc19e7403a65945d55937a119cc11725f60109d9f94943b84faf3f65
                              • Instruction Fuzzy Hash: 67B1E230A00244DFDB14DF65C549B9EBBF1AF45304F1584AAE8459B392E778EE84CB0A
                              APIs
                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0045457F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: PrivateProfileStringWrite
                              • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                              • API String ID: 390214022-3304407042
                              • Opcode ID: 4a2274e56af3fbfcb9aacc656bff9e3b9647cb3a559fec57fce4c80b10c2dbcd
                              • Instruction ID: e87d0749b1697b84d3b9cc82c23e20e51564d8fa8ce324392089b518a873d649
                              • Opcode Fuzzy Hash: 4a2274e56af3fbfcb9aacc656bff9e3b9647cb3a559fec57fce4c80b10c2dbcd
                              • Instruction Fuzzy Hash: B8913334E001499BDB01EFA5D882BDEB7B5EF49309F508467E900BB292D77C9E49CB58
                              APIs
                              • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00477EF1
                              • SetWindowLongW.USER32(00000000,000000FC,Function_00077E4C), ref: 00477F18
                              • GetACP.KERNEL32(00000000,00478130,?,00000000,0047815A), ref: 00477F55
                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00477F9B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ClassInfoLongMessageSendWindow
                              • String ID: COMBOBOX$Inno Setup: Language
                              • API String ID: 3391662889-4234151509
                              • Opcode ID: deb51ddf8cca9870b91e1d9d0dcad9b4f5c78b57c6cc0b96f0beb683c572e979
                              • Instruction ID: 81c94a85f2d0ae2d33cbd4ee74d6221623364a49e9b2571c8ba4411711431487
                              • Opcode Fuzzy Hash: deb51ddf8cca9870b91e1d9d0dcad9b4f5c78b57c6cc0b96f0beb683c572e979
                              • Instruction Fuzzy Hash: 65813C34A00205DFD710EF69C989AAAB7F0FB49304F55C1BAE848D7362DB38AD45CB59
                              APIs
                              • FindNextFileA.KERNEL32(000000FF,?,00000000,0047EAF4,?,?,?,?,00000000,0047EC49,?,?,?,00000000,?,0047ED58), ref: 0047EAD0
                              • FindClose.KERNEL32(000000FF,0047EAFB,0047EAF4,?,?,?,?,00000000,0047EC49,?,?,?,00000000,?,0047ED58,00000000), ref: 0047EAEE
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Find$CloseFileNext
                              • String ID: TG$TG
                              • API String ID: 2066263336-2531790037
                              • Opcode ID: e11fe1f409109a0bb18fd9fab999c4355e57a24987c5da876cabd545c71bdb31
                              • Instruction ID: 49c023a3d40347f396a503d53546bb693b8cfca30f5629bd36de7deb8458e88f
                              • Opcode Fuzzy Hash: e11fe1f409109a0bb18fd9fab999c4355e57a24987c5da876cabd545c71bdb31
                              • Instruction Fuzzy Hash: F5812C7490024D9FDF11DF96C841ADFBBB9EF4D304F1081EAE508A7291D6399A46CF54
                              APIs
                              • GetSystemDefaultLCID.KERNEL32(00000000,00408DB8,?,?,?,?,00000000,00000000,00000000,?,00409DBF,00000000,00409DD2), ref: 00408B8A
                                • Part of subcall function 004089B8: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049D4C4,00000001,?,00408A83,?,00000000,00408B62), ref: 004089D6
                                • Part of subcall function 00408A04: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,00408C06,?,?,?,00000000,00408DB8), ref: 00408A17
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: InfoLocale$DefaultSystem
                              • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                              • API String ID: 1044490935-665933166
                              • Opcode ID: c69c3147cd56940e9f4fd8337a0fbc887525be67d32930313bc35b703755f031
                              • Instruction ID: a8d7ab9d838d1b353a0e5ff474912d8a0235132b07344be0acb9e4c83fee81e1
                              • Opcode Fuzzy Hash: c69c3147cd56940e9f4fd8337a0fbc887525be67d32930313bc35b703755f031
                              • Instruction Fuzzy Hash: D8513D34B001486BDB01FBA5DA41A9F77A9DB98308F50947FB181BB7C6CE3CDA068759
                              APIs
                              • GetVersion.KERNEL32(00000000,00411D49), ref: 00411BDC
                              • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 00411C9A
                                • Part of subcall function 00411EFC: CreatePopupMenu.USER32 ref: 00411F16
                              • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 00411D26
                                • Part of subcall function 00411EFC: CreateMenu.USER32 ref: 00411F20
                              • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 00411D0D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Menu$Insert$Create$ItemPopupVersion
                              • String ID: ,$?
                              • API String ID: 2359071979-2308483597
                              • Opcode ID: c987c748b65508a950cf3f2169e5bd87e5634fb74b346734da7ef3b4f05fb7f7
                              • Instruction ID: 125356fab78159fbe3d4b3b77ff780d7a0eb3536e5c02055c9c5492709250fea
                              • Opcode Fuzzy Hash: c987c748b65508a950cf3f2169e5bd87e5634fb74b346734da7ef3b4f05fb7f7
                              • Instruction Fuzzy Hash: 7D512674A001049BDB10EF6AED815EE7BF9EF08304B1141BAFA04E73A2E738D941CB58
                              APIs
                              • GetObjectA.GDI32(?,00000018,?), ref: 0041C378
                              • GetObjectA.GDI32(?,00000018,?), ref: 0041C387
                              • GetBitmapBits.GDI32(?,?,?), ref: 0041C3D8
                              • GetBitmapBits.GDI32(?,?,?), ref: 0041C3E6
                              • DeleteObject.GDI32(?), ref: 0041C3EF
                              • DeleteObject.GDI32(?), ref: 0041C3F8
                              • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041C415
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Object$BitmapBitsDelete$CreateIcon
                              • String ID:
                              • API String ID: 1030595962-0
                              • Opcode ID: 8204310b78e8d6a6cf9899529667619705c527fa466c5b93b01e90bd2c764378
                              • Instruction ID: 7028de2688ff158aa25c0b8276400e232655bb6670dd4605646626e5bfc1af4e
                              • Opcode Fuzzy Hash: 8204310b78e8d6a6cf9899529667619705c527fa466c5b93b01e90bd2c764378
                              • Instruction Fuzzy Hash: F651F671E002199FCB50DFE9C8819EEB7F9EB48314B218066F914E7295D638AD81CB68
                              APIs
                              • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041D34E
                              • GetDeviceCaps.GDI32(00000000,00000026), ref: 0041D36D
                              • SelectPalette.GDI32(?,?,00000001), ref: 0041D3D3
                              • RealizePalette.GDI32(?), ref: 0041D3E2
                              • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041D44C
                              • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D48A
                              • SelectPalette.GDI32(?,?,00000001), ref: 0041D4AF
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: PaletteStretch$Select$BitsCapsDeviceModeRealize
                              • String ID:
                              • API String ID: 2222416421-0
                              • Opcode ID: 11edf0dba9517228aa32d7039567d0e1bdcd43b434536bf7bada936ddc7c4efc
                              • Instruction ID: 60201597840efc574cdf5035eb35bbfd27a544e021146ecd029e3556dfc27432
                              • Opcode Fuzzy Hash: 11edf0dba9517228aa32d7039567d0e1bdcd43b434536bf7bada936ddc7c4efc
                              • Instruction Fuzzy Hash: 305121B0A00604AFD714DFA9C985F9AB7F9EF08304F14859AB944D7392C778ED80CB58
                              APIs
                              • SendMessageA.USER32(00000000,?,?), ref: 00457B2A
                                • Part of subcall function 004246CC: GetWindowTextA.USER32(?,?,00000100), ref: 004246EC
                                • Part of subcall function 0041F2F4: GetCurrentThreadId.KERNEL32 ref: 0041F343
                                • Part of subcall function 0041F2F4: EnumThreadWindows.USER32(00000000,0041F2A4,00000000), ref: 0041F349
                                • Part of subcall function 00424714: SetWindowTextA.USER32(?,00000000), ref: 0042472C
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00457B91
                              • TranslateMessage.USER32(?), ref: 00457BAF
                              • DispatchMessageA.USER32(?), ref: 00457BB8
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Message$TextThreadWindow$CurrentDispatchEnumSendTranslateWindows
                              • String ID: [Paused]
                              • API String ID: 1007367021-4230553315
                              • Opcode ID: 98084dd36b6af8f16272a20be3aacf42a012ac0efe2a720a42a28a5909de81af
                              • Instruction ID: d952aa0340fda6d06c899081e645d661bac1146de2c671e539639067201b9655
                              • Opcode Fuzzy Hash: 98084dd36b6af8f16272a20be3aacf42a012ac0efe2a720a42a28a5909de81af
                              • Instruction Fuzzy Hash: BB3196309082445EDB11DFB9E845FDE7BF8DB49318F5180B7E814E7292D67CA909CB29
                              APIs
                              • GetCursor.USER32(00000000,0046C21F), ref: 0046C19C
                              • LoadCursorA.USER32(00000000,00007F02), ref: 0046C1AA
                              • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046C21F), ref: 0046C1B0
                              • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046C21F), ref: 0046C1BA
                              • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046C21F), ref: 0046C1C0
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Cursor$LoadSleep
                              • String ID: CheckPassword
                              • API String ID: 4023313301-1302249611
                              • Opcode ID: c2fe5332046b00ec619954058f05e209d56247e563ca7958298a020a06cd3411
                              • Instruction ID: ee4704442a97aa51a819b3d11b93b6eea7a80086b594a8aac8f18d25b90f0006
                              • Opcode Fuzzy Hash: c2fe5332046b00ec619954058f05e209d56247e563ca7958298a020a06cd3411
                              • Instruction Fuzzy Hash: 063175346402449FD711EF69C8C9F9E7BE4AF49304F5580BAB9449B3E2E7789E40CB49
                              APIs
                                • Part of subcall function 00478DDC: GetWindowThreadProcessId.USER32(00000000), ref: 00478DE4
                                • Part of subcall function 00478DDC: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00478EDB,0049E0AC,00000000), ref: 00478DF7
                                • Part of subcall function 00478DDC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00478DFD
                              • SendMessageA.USER32(00000000,0000004A,00000000,0047926E), ref: 00478EE9
                              • GetTickCount.KERNEL32 ref: 00478F2E
                              • GetTickCount.KERNEL32 ref: 00478F38
                              • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00478F8D
                              Strings
                              • CallSpawnServer: Unexpected response: $%x, xrefs: 00478F1E
                              • CallSpawnServer: Unexpected status: %d, xrefs: 00478F76
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                              • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                              • API String ID: 613034392-3771334282
                              • Opcode ID: c46d90ec627eec355b04474858c9833e0dc615cc8fb62d212e36d073c5026e7c
                              • Instruction ID: 2b74b3330966d0da2430542d23b63ad4dc4eec681a1128910255243e8f8c0985
                              • Opcode Fuzzy Hash: c46d90ec627eec355b04474858c9833e0dc615cc8fb62d212e36d073c5026e7c
                              • Instruction Fuzzy Hash: E0319374F502149ADB10EBB9884A7EE76A19F48304F50843EF148EB382DA7C4D0187A9
                              APIs
                              • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 0045A03B
                              Strings
                              • Fusion.dll, xrefs: 00459FDB
                              • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 0045A046
                              • CreateAssemblyCache, xrefs: 0045A032
                              • .NET Framework CreateAssemblyCache function failed, xrefs: 0045A05E
                              • Failed to load .NET Framework DLL "%s", xrefs: 0045A020
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc
                              • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                              • API String ID: 190572456-3990135632
                              • Opcode ID: 9d9456cadcc6d1d315cbfafabf714a56aeba3fe1243bbf9102a6a40f5fef5107
                              • Instruction ID: ac224aa19d502af52a8aeeb8631c7515eb40ef1487658bef2565bb8923ebe5d4
                              • Opcode Fuzzy Hash: 9d9456cadcc6d1d315cbfafabf714a56aeba3fe1243bbf9102a6a40f5fef5107
                              • Instruction Fuzzy Hash: 7931A971E006059FDB10EFA5C88169EB7B4AF44715F50867BE814E7382D7389E18C79A
                              APIs
                                • Part of subcall function 0041C498: GetObjectA.GDI32(?,00000018), ref: 0041C4A5
                              • GetFocus.USER32 ref: 0041C5B8
                              • GetDC.USER32(?), ref: 0041C5C4
                              • SelectPalette.GDI32(?,?,00000000), ref: 0041C5E5
                              • RealizePalette.GDI32(?), ref: 0041C5F1
                              • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C608
                              • SelectPalette.GDI32(?,00000000,00000000), ref: 0041C630
                              • ReleaseDC.USER32(?,?), ref: 0041C63D
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Palette$Select$BitsFocusObjectRealizeRelease
                              • String ID:
                              • API String ID: 3303097818-0
                              • Opcode ID: 13ad04b8ebeec00c1d7dbe87a4843d5f0ce23703817d7fa7e30356844582fb0f
                              • Instruction ID: 5608d60df95c2c9a4937b8f20fdaccdf81dd4bf5f719291f5ec9f8ce647d196e
                              • Opcode Fuzzy Hash: 13ad04b8ebeec00c1d7dbe87a4843d5f0ce23703817d7fa7e30356844582fb0f
                              • Instruction Fuzzy Hash: 00116DB1A00619BBDF10DBA9CC85FAFB7FCEF48700F14446AB614E7281D67899008B28
                              APIs
                              • GetSystemMetrics.USER32(0000000E), ref: 004190C0
                              • GetSystemMetrics.USER32(0000000D), ref: 004190C8
                              • 6FB62980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,?), ref: 004190CE
                                • Part of subcall function 00410C48: 6FB5C400.COMCTL32(?,000000FF,00000000,004190FC,00000000,00419158,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,?), ref: 00410C4C
                              • 6FBCCB00.COMCTL32(?,00000000,00000000,00000000,00000000,00419158,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,?), ref: 0041911E
                              • 6FBCC740.COMCTL32(00000000,?,?,00000000,00000000,00000000,00000000,00419158,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00419129
                              • 6FBCCB00.COMCTL32(?,00000001,?,?,00000000,?,?,00000000,00000000,00000000,00000000,00419158,?,00000000,0000000D,00000000), ref: 0041913C
                              • 6FB60860.COMCTL32(?,0041915F,?,00000000,?,?,00000000,00000000,00000000,00000000,00419158,?,00000000,0000000D,00000000,0000000E), ref: 00419152
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: MetricsSystem$B60860B62980C400C740
                              • String ID:
                              • API String ID: 2995079530-0
                              • Opcode ID: 3537cdd0f738fbfcd60e26d14cefecc9ad32e9dd8feb771d9bbef366dd2eac9a
                              • Instruction ID: 9903b46d79d4c0b31f098cc3390b5efedd2ad94e5cf824da9eef417fc70482b9
                              • Opcode Fuzzy Hash: 3537cdd0f738fbfcd60e26d14cefecc9ad32e9dd8feb771d9bbef366dd2eac9a
                              • Instruction Fuzzy Hash: 0611B971B44204BBEB14EFA5CC87F9E73B9EB09704F504166B604EB2C1E5B99D848B58
                              APIs
                                • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                              • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00485110), ref: 004850F5
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseOpen
                              • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                              • API String ID: 47109696-2530820420
                              • Opcode ID: 184b19cebd6d8334b1e93ba3aa01aba398a8e66ee23a853c067fda7279a9c5b5
                              • Instruction ID: 02a49102d00d8724c0d73e8972acf5231ddb46999e19ea23a0f5791770e41de6
                              • Opcode Fuzzy Hash: 184b19cebd6d8334b1e93ba3aa01aba398a8e66ee23a853c067fda7279a9c5b5
                              • Instruction Fuzzy Hash: FE11B230A04644ABDB00F766DC56B5F7BA8DB42744F508877A800DB782D73D9E41975D
                              APIs
                                • Part of subcall function 0044CD18: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0044CD30
                              • LoadLibraryA.KERNEL32(00000000,00000000,0044CE0A,?,?,?,?,00000000,00000000), ref: 0044CD92
                              • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044CDA3
                              • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044CDB3
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc$DirectoryLibraryLoadSystem
                              • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                              • API String ID: 2141747552-1050967733
                              • Opcode ID: ffe80d66edf329cef2b7eeb74166804ed389ba2e745c026748ea17e8f4cabc36
                              • Instruction ID: 55534d0cd89e21a5042de7d2cb1dd0110792ae2e246426a933e63f936c6ed6e6
                              • Opcode Fuzzy Hash: ffe80d66edf329cef2b7eeb74166804ed389ba2e745c026748ea17e8f4cabc36
                              • Instruction Fuzzy Hash: 361151B0A01704AFF710EFA1DCC2B5A7BA8E758719F64047BE400666A1DBBD9D448A1C
                              APIs
                              • GetDC.USER32(00000000), ref: 00496E01
                                • Part of subcall function 0041A638: CreateFontIndirectA.GDI32(?), ref: 0041A6F7
                              • SelectObject.GDI32(00000000,00000000), ref: 00496E23
                              • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,004973A1), ref: 00496E37
                              • GetTextMetricsA.GDI32(00000000,?), ref: 00496E59
                              • ReleaseDC.USER32(00000000,00000000), ref: 00496E76
                              Strings
                              • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00496E2E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Text$CreateExtentFontIndirectMetricsObjectPointReleaseSelect
                              • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                              • API String ID: 2948443157-222967699
                              • Opcode ID: aae36943e4c039aea34424998f68ade3a8833365680bc7432fe66356b3d4646c
                              • Instruction ID: 569e85929f3d385eaff6f9e1b1d1d5c6dd8a65a34f46b30b3a8bef4bdf425d44
                              • Opcode Fuzzy Hash: aae36943e4c039aea34424998f68ade3a8833365680bc7432fe66356b3d4646c
                              • Instruction Fuzzy Hash: 36018476A04608AFDB05DBE9CC41F5FB7ECDB49704F11047ABA04E7281D678AE008B68
                              APIs
                              • SelectObject.GDI32(00000000,?), ref: 0041B8C0
                              • SelectObject.GDI32(?,00000000), ref: 0041B8CF
                              • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B8FB
                              • SelectObject.GDI32(00000000,00000000), ref: 0041B909
                              • SelectObject.GDI32(?,00000000), ref: 0041B917
                              • DeleteDC.GDI32(00000000), ref: 0041B920
                              • DeleteDC.GDI32(?), ref: 0041B929
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ObjectSelect$Delete$Stretch
                              • String ID:
                              • API String ID: 1458357782-0
                              • Opcode ID: c5d1e2e3ff328356a4e4238c7f450765dbf7839f38aeea7c0d55facf19ccd353
                              • Instruction ID: b8528283d587f8f5f7158778d976388ea9280e6d202ec49eeb693ac58173ed71
                              • Opcode Fuzzy Hash: c5d1e2e3ff328356a4e4238c7f450765dbf7839f38aeea7c0d55facf19ccd353
                              • Instruction Fuzzy Hash: 5A118EB2F04619ABDB10D6DDC885FEFB7BCEB08314F044415B614FB241C678AD418B54
                              APIs
                              • GetCursorPos.USER32 ref: 004237FF
                              • WindowFromPoint.USER32(?,?), ref: 0042380C
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0042381A
                              • GetCurrentThreadId.KERNEL32 ref: 00423821
                              • SendMessageA.USER32(00000000,00000084,?,?), ref: 0042383A
                              • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423851
                              • SetCursor.USER32(00000000), ref: 00423863
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                              • String ID:
                              • API String ID: 1770779139-0
                              • Opcode ID: fba33d789b5f9dac747d9de6da7c9d6faa9ef010ba63e634e26d5bfbf65e3e3b
                              • Instruction ID: d55a13ab3e3fc67d9c1f0c697d1027359b93869cc9afd0973a071b09e334c979
                              • Opcode Fuzzy Hash: fba33d789b5f9dac747d9de6da7c9d6faa9ef010ba63e634e26d5bfbf65e3e3b
                              • Instruction Fuzzy Hash: 9901D42230521036D6207B7A5C86E2F22E8CBC5B65F51443FB609BF282D93D8C01976D
                              APIs
                              • GetModuleHandleA.KERNEL32(user32.dll), ref: 00496C24
                              • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00496C31
                              • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00496C3E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule
                              • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                              • API String ID: 667068680-2254406584
                              • Opcode ID: a15c728cd8d599267d60a144e17c2b77475c085beb782b7d7897845305a9bbaf
                              • Instruction ID: 0100053a3692f287516410ec157e21cb1b88c24c6f2ed11ec452f60a58bd69cd
                              • Opcode Fuzzy Hash: a15c728cd8d599267d60a144e17c2b77475c085beb782b7d7897845305a9bbaf
                              • Instruction Fuzzy Hash: 5AF0F692701B1526DA1025764C81B7B698CCBC27A0F060037BD85A7382E9AD9C0552AD
                              APIs
                              • GetProcAddress.KERNEL32(00000000,ISCryptGetVersion), ref: 0045D98D
                              • GetProcAddress.KERNEL32(00000000,ArcFourInit), ref: 0045D99D
                              • GetProcAddress.KERNEL32(00000000,ArcFourCrypt), ref: 0045D9AD
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc
                              • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                              • API String ID: 190572456-508647305
                              • Opcode ID: 42b372105176c7b3ae22dc402b1945839026cfe0be44895b4df4f1b0478ef8df
                              • Instruction ID: 0705cba7109997b41c54f5ec5154c4026f190107a5f336fc7dc4235633f43cad
                              • Opcode Fuzzy Hash: 42b372105176c7b3ae22dc402b1945839026cfe0be44895b4df4f1b0478ef8df
                              • Instruction Fuzzy Hash: E9F030F1901620EBF314EF77AC457273695EBA4302F14843BA445E11B2D7BA085AEA2C
                              APIs
                              • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045DE8D
                              • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045DE9D
                              • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045DEAD
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc
                              • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                              • API String ID: 190572456-212574377
                              • Opcode ID: 23227c11640e968cece00dcc8d99c1daeac6667b5c25bc9180a105fe17196e12
                              • Instruction ID: ffc1661d06bbefe96a91e36acebf6432405697aaa326f86a6f465272ccde7cfc
                              • Opcode Fuzzy Hash: 23227c11640e968cece00dcc8d99c1daeac6667b5c25bc9180a105fe17196e12
                              • Instruction Fuzzy Hash: 84F01DB1D00A18DED724DF37AC4A72736D5EF74316F08843BA9465A2A2D7B80858DF1D
                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32.dll,?,0049A50C), ref: 00479E6E
                              • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00479E7B
                              • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00479E8B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule
                              • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                              • API String ID: 667068680-222143506
                              • Opcode ID: e485ad2fa94f161872b4193887792cc46d5bcb190675b0327a10f44422fb05aa
                              • Instruction ID: 2eb801612c02c2f681ec2550ef92dd2b82403b3208254216f30f7223daafca7c
                              • Opcode Fuzzy Hash: e485ad2fa94f161872b4193887792cc46d5bcb190675b0327a10f44422fb05aa
                              • Instruction Fuzzy Hash: BFC0C9E1680710A9D600F7725C82DBB2548D510B25310883FB499651D2E7BD0C144A2C
                              APIs
                              • GetFocus.USER32 ref: 0041BB95
                              • GetDC.USER32(?), ref: 0041BBA1
                              • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BBD6
                              • RealizePalette.GDI32(00000000), ref: 0041BBE2
                              • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BC10
                              • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BC44
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Palette$Select$BitmapCreateFocusRealize
                              • String ID:
                              • API String ID: 3275473261-0
                              • Opcode ID: 2f364fcd98ee6a1d62b7c654a57492f5fb96a9e1e42606f87797115b42be741f
                              • Instruction ID: d5c29bb792210f064481fc70285f12689ccfb8d13ad776c980584781b3891df8
                              • Opcode Fuzzy Hash: 2f364fcd98ee6a1d62b7c654a57492f5fb96a9e1e42606f87797115b42be741f
                              • Instruction Fuzzy Hash: E4511E74A002099FCF11DFA9C895AEEBBB5FF49704F10406AF500A7790D779AD81CBA9
                              APIs
                              • GetFocus.USER32 ref: 0041BE67
                              • GetDC.USER32(?), ref: 0041BE73
                              • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BEAD
                              • RealizePalette.GDI32(00000000), ref: 0041BEB9
                              • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BEDD
                              • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BF11
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Palette$Select$BitmapCreateFocusRealize
                              • String ID:
                              • API String ID: 3275473261-0
                              • Opcode ID: 6a42abb991037a6bf202db87d3771568c300b6986fb43c24206afdf92edcb334
                              • Instruction ID: 6bf5c6e251c24ad455d3524f1730cbba616f151bd8f8db37d5e0169c444cf9bf
                              • Opcode Fuzzy Hash: 6a42abb991037a6bf202db87d3771568c300b6986fb43c24206afdf92edcb334
                              • Instruction Fuzzy Hash: FD511875A002089FCB11DFA9C891AAEBBF5FF49700F11846AF504EB390D7789D40CBA8
                              APIs
                              • GetFocus.USER32 ref: 0041B9CE
                              • GetDC.USER32(?), ref: 0041B9DA
                              • GetDeviceCaps.GDI32(?,00000068), ref: 0041B9F6
                              • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041BA13
                              • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041BA2A
                              • ReleaseDC.USER32(?,?), ref: 0041BA76
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: EntriesPaletteSystem$CapsDeviceFocusRelease
                              • String ID:
                              • API String ID: 2502006586-0
                              • Opcode ID: aaad342ca44b07dec6af6486a8a42c1cb8d3efc41e270446eeb3d15c1de1c0ff
                              • Instruction ID: 59801f7e5fcc4ac8ef53bb63f5e7b2fd9dc64a74171921ba3453a8653c00992f
                              • Opcode Fuzzy Hash: aaad342ca44b07dec6af6486a8a42c1cb8d3efc41e270446eeb3d15c1de1c0ff
                              • Instruction Fuzzy Hash: A941C371A042189FCB10DFB9C885A9FBBB4EF49740F1484AAF940EB351D2389D11CBA5
                              APIs
                              • SetLastError.KERNEL32(00000057,00000000,0045D914,?,?,?,?,00000000), ref: 0045D8B3
                              • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D980,?,00000000,0045D914,?,?,?,?,00000000), ref: 0045D8F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                              • API String ID: 1452528299-1580325520
                              • Opcode ID: bceaa7c9d38e855be30fb0ce12922fb4a40a0d74626b7c5ce76b3f9998da2675
                              • Instruction ID: 7ee2480e64cf5dcc37247868779a06df4fe5ff89f2b42202383772de8024ccfa
                              • Opcode Fuzzy Hash: bceaa7c9d38e855be30fb0ce12922fb4a40a0d74626b7c5ce76b3f9998da2675
                              • Instruction Fuzzy Hash: 4811BB75A04204AFE731EBE1C941B9E76ADDF44306F604077AD0496383D67C5F0A952D
                              APIs
                              • GetSystemMetrics.USER32(0000000B), ref: 0041C225
                              • GetSystemMetrics.USER32(0000000C), ref: 0041C22F
                              • GetDC.USER32(00000000), ref: 0041C239
                              • GetDeviceCaps.GDI32(00000000,0000000E), ref: 0041C260
                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0041C26D
                              • ReleaseDC.USER32(00000000,00000000), ref: 0041C2A6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CapsDeviceMetricsSystem$Release
                              • String ID:
                              • API String ID: 447804332-0
                              • Opcode ID: 3e92d3a5d6c5ecb792e0ebd5600fae34c9b68402c42568e6e1a494463c386ac3
                              • Instruction ID: bd62dbbe377736d475eb9c8390e540ebf9edbe2df99a0055a8dbd9c6863756d8
                              • Opcode Fuzzy Hash: 3e92d3a5d6c5ecb792e0ebd5600fae34c9b68402c42568e6e1a494463c386ac3
                              • Instruction Fuzzy Hash: CA214A74E44608AFEB00EFE9C942BEEB7B4EB48700F10806AF514B7381D6785940CB69
                              APIs
                                • Part of subcall function 0045D848: SetLastError.KERNEL32(00000057,00000000,0045D914,?,?,?,?,00000000), ref: 0045D8B3
                              • GetLastError.KERNEL32(00000000,00000000,00000000,00474844,?,?,0049E1E4,00000000), ref: 004747FD
                              • GetLastError.KERNEL32(00000000,00000000,00000000,00474844,?,?,0049E1E4,00000000), ref: 00474813
                              Strings
                              • Could not set permissions on the registry key because it currently does not exist., xrefs: 00474807
                              • Setting permissions on registry key: %s\%s, xrefs: 004747C2
                              • I, xrefs: 00474785
                              • Failed to set permissions on registry key (%d)., xrefs: 00474824
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s$I
                              • API String ID: 1452528299-1959139981
                              • Opcode ID: 40002a2b523bad2bc16d082c9118fd55218ee378fda0ce6c738a3dac2472acc1
                              • Instruction ID: 89f83d431bb9d789a293ecef52b9ab2aae7d8ed3921fa29d9781309811a141fd
                              • Opcode Fuzzy Hash: 40002a2b523bad2bc16d082c9118fd55218ee378fda0ce6c738a3dac2472acc1
                              • Instruction Fuzzy Hash: 15217774A042485FDB00EBA9C8416FEBBE8DB89314F51817BE414E7392DB785D058BAA
                              APIs
                              • SetWindowLongA.USER32(?,000000FC,?), ref: 00413AB4
                              • GetWindowLongA.USER32(?,000000F0), ref: 00413ABF
                              • GetWindowLongA.USER32(?,000000F4), ref: 00413AD1
                              • SetWindowLongA.USER32(?,000000F4,?), ref: 00413AE4
                              • SetPropA.USER32(?,00000000,00000000), ref: 00413AFB
                              • SetPropA.USER32(?,00000000,00000000), ref: 00413B12
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: LongWindow$Prop
                              • String ID:
                              • API String ID: 3887896539-0
                              • Opcode ID: a72ee32d6cac1f66b8d23ea34dc7313db56b2b1373a44c7e0100784739caab29
                              • Instruction ID: a594f7604add2a8bfce9427623ad02c9736cb33a5a72341fbb506abd62de3718
                              • Opcode Fuzzy Hash: a72ee32d6cac1f66b8d23ea34dc7313db56b2b1373a44c7e0100784739caab29
                              • Instruction Fuzzy Hash: 0811CC75500244BFDF00DF99ED88E9A3BE8EB09364F104276B914DB2E1D739D990CB94
                              APIs
                              • GetWindowLongA.USER32(?,000000EC), ref: 0047FA6A
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046DA09), ref: 0047FA90
                              • GetWindowLongA.USER32(?,000000EC), ref: 0047FAA0
                              • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047FAC1
                              • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047FAD5
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047FAF1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$Long$Show
                              • String ID:
                              • API String ID: 3609083571-0
                              • Opcode ID: abe530f147a2c3f98821beb69050e02df951cc1f08551c366297f014f152c27b
                              • Instruction ID: ffd9c37a1d4b3a018da72acb707aca8a1d598a80d0625303fdebb2ead6bb840a
                              • Opcode Fuzzy Hash: abe530f147a2c3f98821beb69050e02df951cc1f08551c366297f014f152c27b
                              • Instruction Fuzzy Hash: D301E9B6A54210ABD600DB78CD41F6637E8AB0C310F0A4776FA5DDF3E3C679D8048A08
                              APIs
                                • Part of subcall function 0041AB30: CreateBrushIndirect.GDI32 ref: 0041AB9B
                              • UnrealizeObject.GDI32(00000000), ref: 0041B6CC
                              • SelectObject.GDI32(?,00000000), ref: 0041B6DE
                              • SetBkColor.GDI32(?,00000000), ref: 0041B701
                              • SetBkMode.GDI32(?,00000002), ref: 0041B70C
                              • SetBkColor.GDI32(?,00000000), ref: 0041B727
                              • SetBkMode.GDI32(?,00000001), ref: 0041B732
                                • Part of subcall function 0041A4A8: GetSysColor.USER32(?), ref: 0041A4B2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                              • String ID:
                              • API String ID: 3527656728-0
                              • Opcode ID: 591f5e0a38fc1ca3dbe863e806ec08e439b2c286ec032ca355b2d19c4403f824
                              • Instruction ID: 4060aa1d5abe481981ad85160ceff6bfe730d60da31349b060da60163fdb8f1a
                              • Opcode Fuzzy Hash: 591f5e0a38fc1ca3dbe863e806ec08e439b2c286ec032ca355b2d19c4403f824
                              • Instruction Fuzzy Hash: AAF0CD75601100ABDE04FFBADACAE4B77989F043097048057B908DF197CA7CE8A08B3A
                              APIs
                              • FindNextFileA.KERNEL32(000000FF,00000000,00000000,0047327D,I,?,?,I,00000000,0047346D,?,00000000,?,00000000,?,00473639), ref: 00473259
                              • FindClose.KERNEL32(000000FF,00473284,0047327D,I,?,?,I,00000000,0047346D,?,00000000,?,00000000,?,00473639,?), ref: 00473277
                              • FindNextFileA.KERNEL32(000000FF,00000000,00000000,0047339F,I,?,?,I,00000000,0047346D,?,00000000,?,00000000,?,00473639), ref: 0047337B
                              • FindClose.KERNEL32(000000FF,004733A6,0047339F,I,?,?,I,00000000,0047346D,?,00000000,?,00000000,?,00473639,?), ref: 00473399
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Find$CloseFileNext
                              • String ID: I
                              • API String ID: 2066263336-1966777607
                              • Opcode ID: a31a6a5648234e5cb0923a032fe52309569a1865c7db3c93c70807436b28b198
                              • Instruction ID: 1af051264105f0c3ac5173717805306f181c97d1b343904b0a5707565e1f6f82
                              • Opcode Fuzzy Hash: a31a6a5648234e5cb0923a032fe52309569a1865c7db3c93c70807436b28b198
                              • Instruction Fuzzy Hash: F2C13C7490425DAFCF11DFA5C881ADEBBB9FF49304F5081AAE808A3351D7399A46CF54
                              APIs
                                • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                              • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045600B,?,00000000,0045604B), ref: 00455F51
                              Strings
                              • WININIT.INI, xrefs: 00455F80
                              • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455ED4
                              • PendingFileRenameOperations, xrefs: 00455EF0
                              • PendingFileRenameOperations2, xrefs: 00455F20
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseOpen
                              • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                              • API String ID: 47109696-2199428270
                              • Opcode ID: 679b7e238b747a900a1d78574552d21c233e10934bd7a42400cae956030b9349
                              • Instruction ID: cd3286cbb97796e9ecd700c4ab963dac99c65abdd87cbf21601b40f17af9d083
                              • Opcode Fuzzy Hash: 679b7e238b747a900a1d78574552d21c233e10934bd7a42400cae956030b9349
                              • Instruction Fuzzy Hash: 1551B930E001089FDB11EF61DC51ADEB7B9EF44705F5085BBE804A72D2DB39AE45CA58
                              APIs
                                • Part of subcall function 00424714: SetWindowTextA.USER32(?,00000000), ref: 0042472C
                              • ShowWindow.USER32(?,00000005,00000000,004998A9,?,?,00000000), ref: 0049967A
                                • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                • Part of subcall function 004076F8: SetCurrentDirectoryA.KERNEL32(00000000,?,004996A2,00000000,00499875,?,?,00000005,00000000,004998A9,?,?,00000000), ref: 00407703
                                • Part of subcall function 0042D89C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D92A,?,?,?,00000001,?,0045681A,00000000,00456882), ref: 0042D8D1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                              • String ID: .dat$.msg$IMsg$Uninstall
                              • API String ID: 3312786188-1660910688
                              • Opcode ID: 8960146029bae1e099bb11d562e02c400649e9705784a1803d45dcdeac2d7493
                              • Instruction ID: 4da38b6a349b60b5a60df07f01633cb26419001f7db46277bbb3aa66fc0d4d29
                              • Opcode Fuzzy Hash: 8960146029bae1e099bb11d562e02c400649e9705784a1803d45dcdeac2d7493
                              • Instruction Fuzzy Hash: A1313074A10114AFCB01FFAACC5295E7B75FB49318B51887AF800A7352EB39AD04CB59
                              APIs
                              • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EF2A
                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EF30
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EF59
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressByteCharHandleModuleMultiProcWide
                              • String ID: ShutdownBlockReasonCreate$user32.dll
                              • API String ID: 828529508-2866557904
                              • Opcode ID: 4909e3a44c9574a33af1a6d6175f83ff597f9852c03ec5bbf872ce4ad15676b8
                              • Instruction ID: 50bd107db23699165094570332042a9a2090c4fb9dd7a9a9ac1c8e9692f1be1d
                              • Opcode Fuzzy Hash: 4909e3a44c9574a33af1a6d6175f83ff597f9852c03ec5bbf872ce4ad15676b8
                              • Instruction Fuzzy Hash: D7F0F0E134062237E620B27FAC86F7F55CC8F94729F150036B608EA2C2EA7C9905426F
                              APIs
                              • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00458824
                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00458845
                              • CloseHandle.KERNEL32(?,00458878), ref: 0045886B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                              • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                              • API String ID: 2573145106-3235461205
                              • Opcode ID: b59af786c083e6c34fb912d8588e02e36760330094b26c60bb33ca54220cd61b
                              • Instruction ID: 4c05e8df3edacc9d455a33c3a45c96e3e51f685ffe720196e50d624f784124f1
                              • Opcode Fuzzy Hash: b59af786c083e6c34fb912d8588e02e36760330094b26c60bb33ca54220cd61b
                              • Instruction Fuzzy Hash: 3E01A274A00204AFDB10FBA98C52A1E73A8EB45715FA0057AFD10F73D2DE39AD048A28
                              APIs
                              • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042E2A0
                              • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042E43B,00000000,0042E453,?,?,?,?,00000006,?,00000000,00499145), ref: 0042E2BB
                              • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E2C1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressDeleteHandleModuleProc
                              • String ID: RegDeleteKeyExA$advapi32.dll
                              • API String ID: 588496660-1846899949
                              • Opcode ID: ca0444e3bc953f0923e60f390370d63413f52414311339a67af6d41f50ed8dcb
                              • Instruction ID: a3ecee3a08e4bdafa542c89306e26d0a5ab5c090d3d5ae483566a3001d088d92
                              • Opcode Fuzzy Hash: ca0444e3bc953f0923e60f390370d63413f52414311339a67af6d41f50ed8dcb
                              • Instruction Fuzzy Hash: B8E065B0740234EAD7142A66BC4AFA7260CEB54726F940877F10A661D187BC1C40D66C
                              APIs
                              • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,0049B934,004579ED,00457D90,00457944,00000000,00000B06,00000000,00000000,00000000,00000002,00000000,00482671), ref: 0042EE85
                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EE8B
                              • InterlockedExchange.KERNEL32(0049D66C,00000001), ref: 0042EE9C
                                • Part of subcall function 0042EDFC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EEC0,00000004,0049B934,004579ED,00457D90,00457944,00000000,00000B06,00000000,00000000,00000000,00000002,00000000), ref: 0042EE12
                                • Part of subcall function 0042EDFC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EE18
                                • Part of subcall function 0042EDFC: InterlockedExchange.KERNEL32(0049D664,00000001), ref: 0042EE29
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressExchangeHandleInterlockedModuleProc
                              • String ID: ChangeWindowMessageFilterEx$user32.dll
                              • API String ID: 3478007392-2676053874
                              • Opcode ID: a3d955b5560f8b4c6289ef72ce3cb66c17517e36b964d74717be9c5fdcb5fa2d
                              • Instruction ID: d923442659e3b0e51499426f76f6993fec2ee5a704375d7ef0c30b5e995126c2
                              • Opcode Fuzzy Hash: a3d955b5560f8b4c6289ef72ce3cb66c17517e36b964d74717be9c5fdcb5fa2d
                              • Instruction Fuzzy Hash: 1AE06DF1B40724AAEF107B766C86B9B2668EB50769F55003BF104A61E1C7FD0C408A6C
                              APIs
                              • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EEC0,00000004,0049B934,004579ED,00457D90,00457944,00000000,00000B06,00000000,00000000,00000000,00000002,00000000), ref: 0042EE12
                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EE18
                              • InterlockedExchange.KERNEL32(0049D664,00000001), ref: 0042EE29
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressExchangeHandleInterlockedModuleProc
                              • String ID: ChangeWindowMessageFilter$user32.dll
                              • API String ID: 3478007392-2498399450
                              • Opcode ID: 4de3487d94fd114c3b2bb058bfcb274bcbe27e7359df3e53473647ae16ccabd6
                              • Instruction ID: 37ab6c1781d9ace597be808b0f82a5ae7151ca86b9dce60fc565c366ef428a29
                              • Opcode Fuzzy Hash: 4de3487d94fd114c3b2bb058bfcb274bcbe27e7359df3e53473647ae16ccabd6
                              • Instruction Fuzzy Hash: 76E0ECB1B41320AAEA1137726C8AF5726559B2471DF950437F108671E2C6FC1C84C91D
                              APIs
                              • GetWindowThreadProcessId.USER32(00000000), ref: 00478DE4
                              • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00478EDB,0049E0AC,00000000), ref: 00478DF7
                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00478DFD
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProcProcessThreadWindow
                              • String ID: AllowSetForegroundWindow$user32.dll
                              • API String ID: 1782028327-3855017861
                              • Opcode ID: 039e6950e57f331d16d5f4eb2fccd4f1736c1480a787f4a3666a96763cbb7aae
                              • Instruction ID: c95bb4f0dd120990503e7052118a19d741abdcedadff55ee9c16c600a1fe714f
                              • Opcode Fuzzy Hash: 039e6950e57f331d16d5f4eb2fccd4f1736c1480a787f4a3666a96763cbb7aae
                              • Instruction Fuzzy Hash: EFD09EB168060165E910B3B69D4AE9B235C89847647248C3FB458E2586DF7CD894457D
                              APIs
                              • BeginPaint.USER32(00000000,?), ref: 004170A2
                              • SaveDC.GDI32(?), ref: 004170D3
                              • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00417195), ref: 00417134
                              • RestoreDC.GDI32(?,?), ref: 0041715B
                              • EndPaint.USER32(00000000,?,0041719C,00000000,00417195), ref: 0041718F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Paint$BeginClipExcludeRectRestoreSave
                              • String ID:
                              • API String ID: 3808407030-0
                              • Opcode ID: d3cb791d7785fb4fc35c1181fb0c895e71633609ec102f90fedaf0bd5e116ec9
                              • Instruction ID: 2d0e89e5730252ba578d2efb55dda1d595b63161fefa896777b830b1b9f6ffa1
                              • Opcode Fuzzy Hash: d3cb791d7785fb4fc35c1181fb0c895e71633609ec102f90fedaf0bd5e116ec9
                              • Instruction Fuzzy Hash: 9B412170A08204AFDB04DFA5C985FAA77F9FF48314F1544AEE4059B362C7789D85CB18
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: eea1a8f7c9869be2cd73ede4559f3beb1d50bc075a71ac7122178a7397227914
                              • Instruction ID: f067b59d413d1c4671d71e094a7f62e666ee1dcd53ee7561759f320ec3b01eff
                              • Opcode Fuzzy Hash: eea1a8f7c9869be2cd73ede4559f3beb1d50bc075a71ac7122178a7397227914
                              • Instruction Fuzzy Hash: 6F314F70605740AFC720EF69D984BABB7E8AF89314F04891EF9D5C7751D638EC808B59
                              APIs
                              • GetSystemMetrics.USER32(0000000B), ref: 0041C01A
                              • GetSystemMetrics.USER32(0000000C), ref: 0041C024
                              • GetDC.USER32(00000000), ref: 0041C062
                              • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041C0A9
                              • DeleteObject.GDI32(00000000), ref: 0041C0EA
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: MetricsSystem$BitmapCreateDeleteObject
                              • String ID:
                              • API String ID: 1095203571-0
                              • Opcode ID: e9779dfffb4f21f61e506df0ae377518d2b748fc237c0f7807fdb933fd26a7eb
                              • Instruction ID: f919feb2cfdf9cb53746996a9db251afb7e4286801c3fccb61a5d2ca1bdc7bf1
                              • Opcode Fuzzy Hash: e9779dfffb4f21f61e506df0ae377518d2b748fc237c0f7807fdb933fd26a7eb
                              • Instruction Fuzzy Hash: A3313E74A40205EFDB04DFA5C981AAEB7F5EB48704F11856AF510AB381D7789E80DB98
                              APIs
                              • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429C58
                              • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429C87
                              • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429CA3
                              • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 00429CCE
                              • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 00429CEC
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 6f2f314a4364933bab3318e288dd70a8d34a507adfc9435400f142d56b41fc4f
                              • Instruction ID: 0478e77fbb77d274a7bfb783d11adee83c5a4069cdde94f0426c34ba09fc350e
                              • Opcode Fuzzy Hash: 6f2f314a4364933bab3318e288dd70a8d34a507adfc9435400f142d56b41fc4f
                              • Instruction Fuzzy Hash: 222190707107147AE710AFA7DC82F4B76EC9B40704F90443E7906AB2D2DAB8ED41861D
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                              • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                              • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$AllocString
                              • String ID:
                              • API String ID: 262959230-0
                              • Opcode ID: 67daf853af92f19bd36af3157ccd0aae30d6e3cf77030be0de76c974993ddc75
                              • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                              • Opcode Fuzzy Hash: 67daf853af92f19bd36af3157ccd0aae30d6e3cf77030be0de76c974993ddc75
                              • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                              APIs
                              • SelectPalette.GDI32(00000000,00000000,00000000), ref: 00414869
                              • RealizePalette.GDI32(00000000), ref: 00414871
                              • SelectPalette.GDI32(00000000,00000000,00000001), ref: 00414885
                              • RealizePalette.GDI32(00000000), ref: 0041488B
                              • ReleaseDC.USER32(00000000,00000000), ref: 00414896
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Palette$RealizeSelect$Release
                              • String ID:
                              • API String ID: 2261976640-0
                              • Opcode ID: fa3b9403a46652b92fdf4541f93f936de0ad42420f7af6617674ce52f43e61da
                              • Instruction ID: aeb03e62d8ddadf83c94429ec28f403801e3a8d1cb621d3e7bfc21001d019430
                              • Opcode Fuzzy Hash: fa3b9403a46652b92fdf4541f93f936de0ad42420f7af6617674ce52f43e61da
                              • Instruction Fuzzy Hash: 3201DF7520C3806AD600B63D8C85A9F6BEC9FCA314F15946EF484DB3C2CA7AC8018761
                              Strings
                              • NextButtonClick, xrefs: 0046C90C
                              • PrepareToInstall failed: %s, xrefs: 0046CB2E
                              • Need to restart Windows? %s, xrefs: 0046CB55
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                              • API String ID: 0-2329492092
                              • Opcode ID: 7995bdfdbdd3e32e782b8c0e5ba75bf3895e757cd3822a1da008895215e1baaf
                              • Instruction ID: 93777efb9077a0228fe374709ad1741880755db4a3f7640889f56f3bdeecc4c5
                              • Opcode Fuzzy Hash: 7995bdfdbdd3e32e782b8c0e5ba75bf3895e757cd3822a1da008895215e1baaf
                              • Instruction Fuzzy Hash: 9CD17F34A00108DFCB10EFA9C585AED7BF5EF49304F6444BAE444AB352E738AE45DB5A
                              APIs
                              • SetActiveWindow.USER32(?,?,00000000,004847C1), ref: 00484594
                              • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00484632
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ActiveChangeNotifyWindow
                              • String ID: $Need to restart Windows? %s
                              • API String ID: 1160245247-4200181552
                              • Opcode ID: 01432450a53447772db983c2a16f0375cc0bb0169f9e3e9a68e40412bc744ea7
                              • Instruction ID: cbf7044c9224e5df34f4324165486d78489046a6efa1a602e4c0c9b5677eb74d
                              • Opcode Fuzzy Hash: 01432450a53447772db983c2a16f0375cc0bb0169f9e3e9a68e40412bc744ea7
                              • Instruction Fuzzy Hash: C591A334A042459FDB10FB66D885B9D77E0AF5A308F1444BBE800973A2D77CAD45CB5E
                              APIs
                                • Part of subcall function 0042CC54: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042CC78
                              • GetLastError.KERNEL32(00000000,00470B35,?,?,0049E1E4,00000000), ref: 00470A12
                              • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00470A8C
                              • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00470AB1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ChangeNotify$ErrorFullLastNamePath
                              • String ID: Creating directory: %s
                              • API String ID: 2451617938-483064649
                              • Opcode ID: 142c4ae56cb069a727c0f936144b10c711126b3f859f6c1206bb5652110a1900
                              • Instruction ID: 27f0dcb835b35bf1686b0556d16ec1317b7bae4cbab61287d01ee882f408922b
                              • Opcode Fuzzy Hash: 142c4ae56cb069a727c0f936144b10c711126b3f859f6c1206bb5652110a1900
                              • Instruction Fuzzy Hash: 0251FE74E01248ABDB01DFA5C982BDEB7F5AF48308F50856AE844B7382D7785F04CB59
                              APIs
                              • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00407453
                              • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 004074CD
                              • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 00407525
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Enum$NameOpenResourceUniversal
                              • String ID: Z
                              • API String ID: 3604996873-1505515367
                              • Opcode ID: ef725f5677505cc1ece444b72ce86a205eac34b3eeee73834d2775d04d947be5
                              • Instruction ID: 2310e9831ee7c99a0a8649866770d0a98cc310fb2cf5807583ec8a4e9daa3455
                              • Opcode Fuzzy Hash: ef725f5677505cc1ece444b72ce86a205eac34b3eeee73834d2775d04d947be5
                              • Instruction Fuzzy Hash: 41519070E04208AFDB11DF99C845A9EBBB9EB49314F1448BAE400B72D1D778AE418B5A
                              APIs
                              • SetRectEmpty.USER32(?), ref: 0044D626
                              • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D651
                              • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D6D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: DrawText$EmptyRect
                              • String ID:
                              • API String ID: 182455014-2867612384
                              • Opcode ID: 118ce66f65fc30a3616beabd50b84bb536d9a0cd1ba8fe4db387a67cc8cfb132
                              • Instruction ID: 5f00bac91b28cdab45bfb944687f04cfacea2c0ae70fe3b1c590f7ffbabf3d5b
                              • Opcode Fuzzy Hash: 118ce66f65fc30a3616beabd50b84bb536d9a0cd1ba8fe4db387a67cc8cfb132
                              • Instruction Fuzzy Hash: 7C517271E00248AFDB11DFA9C885BDEBBF8AF49304F15847AE805EB252D7389944CB64
                              APIs
                              • GetDC.USER32(00000000), ref: 0042F42A
                                • Part of subcall function 0041A638: CreateFontIndirectA.GDI32(?), ref: 0041A6F7
                              • SelectObject.GDI32(?,00000000), ref: 0042F44D
                              • ReleaseDC.USER32(00000000,?), ref: 0042F52C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CreateFontIndirectObjectReleaseSelect
                              • String ID: ...\
                              • API String ID: 3133960002-983595016
                              • Opcode ID: d1b66580af5f8b118005d8afe4c27e7b3c53fe3fbe43e40283f5066ed8c29eea
                              • Instruction ID: 21909acc4746510f695b318a8719c62c66087a48e53e42bcbae852ee139bb065
                              • Opcode Fuzzy Hash: d1b66580af5f8b118005d8afe4c27e7b3c53fe3fbe43e40283f5066ed8c29eea
                              • Instruction Fuzzy Hash: E1314270B00229ABDB11EF9AD851BAEB7F9EB48308F90447BF410A7291C7785E45CA59
                              APIs
                              • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 004555EA
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,004556B0), ref: 00455654
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressByteCharMultiProcWide
                              • String ID: SfcIsFileProtected$sfc.dll
                              • API String ID: 2508298434-591603554
                              • Opcode ID: 250a850b541f85dbc24e948d1e5368daa5a96329426638f56c6792f2477b35ea
                              • Instruction ID: f46810b5b314b431af4f43299c3fabe32507941823b9175d405aae5aeba4d308
                              • Opcode Fuzzy Hash: 250a850b541f85dbc24e948d1e5368daa5a96329426638f56c6792f2477b35ea
                              • Instruction Fuzzy Hash: 9141A470A00618AFEB20DF55DC95BAD77B8AB04319F5080B7E90CA7292D7789F48CE1D
                              APIs
                              • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00498709,_iu,?,00000000,0045415E), ref: 00454113
                              • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00498709,_iu,?,00000000,0045415E), ref: 00454123
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseCreateFileHandle
                              • String ID: .tmp$_iu
                              • API String ID: 3498533004-10593223
                              • Opcode ID: 1e958ac9ca82f2540afc274f5c3ae46c394e0d0502f96882d1574f7e3d60b294
                              • Instruction ID: 59545500d2eeb09234598e35ee9a1648d273934097dc79d2b475452d37d3be57
                              • Opcode Fuzzy Hash: 1e958ac9ca82f2540afc274f5c3ae46c394e0d0502f96882d1574f7e3d60b294
                              • Instruction Fuzzy Hash: 8431C570E00209ABCF11EB95C942BEEBBB5AF54309F20452AF900BB3D2D7385F459759
                              APIs
                              • GetClassInfoA.USER32(00400000,?,?), ref: 004168CF
                              • UnregisterClassA.USER32(?,00400000), ref: 004168FB
                              • RegisterClassA.USER32(?), ref: 0041691E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Class$InfoRegisterUnregister
                              • String ID: @
                              • API String ID: 3749476976-2766056989
                              • Opcode ID: 53826ed8cc08f36af38aca4d869988c5d0e43ce7ef9905a0ccb02d39044ed56c
                              • Instruction ID: c7ae62685634f2feb307fa6559a912500e41153472d9d2bb59c10c8b55fc2cbc
                              • Opcode Fuzzy Hash: 53826ed8cc08f36af38aca4d869988c5d0e43ce7ef9905a0ccb02d39044ed56c
                              • Instruction Fuzzy Hash: C6318E706043008BDB10EF68C885B9B77E9AB89308F00457FF985DB392DB39DD458B5A
                              APIs
                              • GetFileAttributesA.KERNEL32(00000000,0049A448,00000000,00499BEE,?,?,00000000,0049D62C), ref: 00499B68
                              • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,0049A448,00000000,00499BEE,?,?,00000000,0049D62C), ref: 00499B91
                              • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00499BAA
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: File$Attributes$Move
                              • String ID: isRS-%.3u.tmp
                              • API String ID: 3839737484-3657609586
                              • Opcode ID: 88eac6fa2fd00287dbaa55a3b9bd3a1b65409462b653a3bc96acdfff81af7d31
                              • Instruction ID: 0b841a000e743cb9e8da0cfb8565bc532e10ded45a2cf007f5af54a585f9ef1c
                              • Opcode Fuzzy Hash: 88eac6fa2fd00287dbaa55a3b9bd3a1b65409462b653a3bc96acdfff81af7d31
                              • Instruction Fuzzy Hash: 54212171D14119ABCF00EBA9D881AAFBBB8BB58314F11457EA814B72D1D63C6E018A59
                              APIs
                                • Part of subcall function 0042CC54: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042CC78
                                • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                              • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 004573EC
                              • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00457419
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Type$AllocByteCharFullLoadMulusermePathRegisterStringWide
                              • String ID: LoadTypeLib$RegisterTypeLib
                              • API String ID: 1312246647-2435364021
                              • Opcode ID: 18df84fe9d86e2862f6386675fb05e4dd3e507c86707e069f339337bab75705e
                              • Instruction ID: 195147ed2e8b8ae7ced7006412bb8845aee82bd7b9f018cfdf51d436bcb33606
                              • Opcode Fuzzy Hash: 18df84fe9d86e2862f6386675fb05e4dd3e507c86707e069f339337bab75705e
                              • Instruction Fuzzy Hash: C911D630B04204BFDB01DFA6DC51A4EBBADEB4A305F108076FD04D3652DA389E04C618
                              APIs
                              • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 0045796A
                              • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 00457A07
                              Strings
                              • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00457996
                              • Failed to create DebugClientWnd, xrefs: 004579D0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                              • API String ID: 3850602802-3720027226
                              • Opcode ID: 925f9ffdcd425408a01fa4f98f39528b3d7bbeff17d45d483e1d3833f7d96f07
                              • Instruction ID: b12cfe17c44d9b7297a0742d7ace06ebf4c30bfebd2037bde928bbf0dce3c7c1
                              • Opcode Fuzzy Hash: 925f9ffdcd425408a01fa4f98f39528b3d7bbeff17d45d483e1d3833f7d96f07
                              • Instruction Fuzzy Hash: 1311C4B16082509BE310AB299C81B5F77949B54319F04443BF9849F383D3B99C18C7AE
                              APIs
                              • LoadLibraryA.KERNEL32(00000000,00000000,00450469,?,?,?,?,00000000,00000000), ref: 004503F8
                              • LoadLibraryA.KERNEL32(00000000,00000000,00450469,?,?,?,?,00000000,00000000), ref: 0045043E
                                • Part of subcall function 00450360: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00450378
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: LibraryLoad$DirectorySystem
                              • String ID: RICHED20.DLL$RICHED32.DLL
                              • API String ID: 2630572097-740611112
                              • Opcode ID: 5e1bf6021b3481a23a3e3d17d6b39bdb08e5b40a8b952fdaeccbb9226eb12265
                              • Instruction ID: 45d93e0d121fe09c7a50066aca23a685df4873c559958f5edeb39e7b45036801
                              • Opcode Fuzzy Hash: 5e1bf6021b3481a23a3e3d17d6b39bdb08e5b40a8b952fdaeccbb9226eb12265
                              • Instruction Fuzzy Hash: EB216374900108EFDB10FF61E846B5D77F8EB55319F50447BE500A6162D7785A49CF5C
                              APIs
                                • Part of subcall function 00424714: SetWindowTextA.USER32(?,00000000), ref: 0042472C
                              • GetFocus.USER32 ref: 0047999F
                              • GetKeyState.USER32(0000007A), ref: 004799B1
                              • WaitMessage.USER32(?,00000000,004799D8,?,00000000,004799FF,?,?,00000001,00000000,?,?,0048174F,00000000,00482671), ref: 004799BB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FocusMessageStateTextWaitWindow
                              • String ID: Wnd=$%x
                              • API String ID: 1381870634-2927251529
                              • Opcode ID: c7714a687ecd515da0b3d99d6b7bbb34f6b1e8ac2199ab9b74b109a4a99a3c73
                              • Instruction ID: 0ce6ec70c77c992717eb959f135b56f98f7128e6f958ad4e09c8363bf76ba6b5
                              • Opcode Fuzzy Hash: c7714a687ecd515da0b3d99d6b7bbb34f6b1e8ac2199ab9b74b109a4a99a3c73
                              • Instruction Fuzzy Hash: 0511A3B0604244AFDB00FF69D842ADEB7B8EB49704B51C5BBF508E7381D738AD00CA69
                              APIs
                              • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046F430
                              • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046F43F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Time$File$LocalSystem
                              • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                              • API String ID: 1748579591-1013271723
                              • Opcode ID: b3309c05ae6708dc9511693656f5da53199351be95235e45feba58672e8eaade
                              • Instruction ID: b1f3f51ab816b97a6d4fd488e4796d5760ecc8acc51059d8482d4647201c4143
                              • Opcode Fuzzy Hash: b3309c05ae6708dc9511693656f5da53199351be95235e45feba58672e8eaade
                              • Instruction Fuzzy Hash: F111F5A040C3919AD340DF2AC44072BBAE4AB99708F44896FF9C8D6381E779C948DB67
                              APIs
                              • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 004546EB
                                • Part of subcall function 004073A0: DeleteFileA.KERNEL32(00000000,0049D62C,00499FD9,00000000,0049A02E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 004073AB
                              • MoveFileA.KERNEL32(00000000,00000000), ref: 00454710
                                • Part of subcall function 00453C04: GetLastError.KERNEL32(00000000,00454799,00000005,00000000,004547CE,?,?,00000000,0049D62C,00000004,00000000,00000000,00000000,?,00499C8D,00000000), ref: 00453C07
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: File$AttributesDeleteErrorLastMove
                              • String ID: DeleteFile$MoveFile
                              • API String ID: 3024442154-139070271
                              • Opcode ID: af00f34ed831d62b5344ce60fd570c4cdc70e55e4aa6ab9d38df2d08c8719917
                              • Instruction ID: 274a2e09890dd6abd1f20e60e4879b25532b4b8e44e7f96c1dbb1ac345d4d7c6
                              • Opcode Fuzzy Hash: af00f34ed831d62b5344ce60fd570c4cdc70e55e4aa6ab9d38df2d08c8719917
                              • Instruction Fuzzy Hash: 53F08B746141445BE701FBA5D94265FA7ECEB8431EF50403BB800BB6C3DB3C9D08492D
                              APIs
                                • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                              • RegCloseKey.ADVAPI32(?,00456217,?,00000001,00000000), ref: 0045620A
                              Strings
                              • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 004561B8
                              • PendingFileRenameOperations, xrefs: 004561DC
                              • PendingFileRenameOperations2, xrefs: 004561EB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseOpen
                              • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                              • API String ID: 47109696-2115312317
                              • Opcode ID: cb4d608d90d086dddd01c71022c1131e03e9143acd707505d6602a412a17223b
                              • Instruction ID: 13f9a8dc2762523c9d5034016e8e0e4cf56d15ba7b570f5b98feacd54ef34b89
                              • Opcode Fuzzy Hash: cb4d608d90d086dddd01c71022c1131e03e9143acd707505d6602a412a17223b
                              • Instruction Fuzzy Hash: F2F06271348204ABD714E6E69C13B5B739CD784B15FE284A6F80487982EA79AD14962C
                              APIs
                                • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                              • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00484FF1
                              • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00485014
                              Strings
                              • CSDVersion, xrefs: 00484FE8
                              • System\CurrentControlSet\Control\Windows, xrefs: 00484FBE
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                              • API String ID: 3677997916-1910633163
                              • Opcode ID: 4b665f957098d454cc4f87012a57c885ca2e41c4723a9aa776dd986535a9d71b
                              • Instruction ID: 3d9820a6fde95d05ac542d305ffe0a0e534a7c1f4e1b62a11fb8fb702f882c01
                              • Opcode Fuzzy Hash: 4b665f957098d454cc4f87012a57c885ca2e41c4723a9aa776dd986535a9d71b
                              • Instruction Fuzzy Hash: E7F04975A40608E6DF10FAD18C55BDF73BCAB05704F604967E510E7281E7399A049BAE
                              APIs
                                • Part of subcall function 0044BB28: LoadLibraryA.KERNEL32(00000000,00000000,0044BF0B,?,?,?,?,00000000,00000000,?,0044FD4D,0049A4DA), ref: 0044BB8A
                                • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044BBA2
                                • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044BBB4
                                • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044BBC6
                                • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044BBD8
                                • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044BBEA
                                • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044BBFC
                                • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044BC0E
                                • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044BC20
                                • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044BC32
                                • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044BC44
                                • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044BC56
                                • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044BC68
                                • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044BC7A
                                • Part of subcall function 004651E8: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004651FB
                              • LoadLibraryA.KERNEL32(00000000,SHPathPrepareForWriteA,00000000,0046528A,?,?,?,?,00000000,00000000,?,0049A502), ref: 0046525F
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00465265
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressProc$LibraryLoad$DirectorySystem
                              • String ID: SHPathPrepareForWriteA$shell32.dll
                              • API String ID: 1442766254-2683653824
                              • Opcode ID: 10236025bafb7d6f0aa3addd02fc095e47ad8509b9aaccb06964bd85ddd17aa9
                              • Instruction ID: 415eb7409d81aa8454bb2dd4c72fa8b3e514a75415032da6adba06dceafb32ff
                              • Opcode Fuzzy Hash: 10236025bafb7d6f0aa3addd02fc095e47ad8509b9aaccb06964bd85ddd17aa9
                              • Instruction Fuzzy Hash: F5F04470640A08BFD700FB62DC53F5E7BACEB45718FA044B7B400B6591EA7C9E04892D
                              APIs
                                • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                              • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459C9D,00000000,00459E55,?,00000000,00000000,00000000), ref: 00459BAD
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseOpen
                              • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                              • API String ID: 47109696-2631785700
                              • Opcode ID: 3437d7d9c7e44ebaf3ffa80765e4cd1ae07bdecd6187d079bae80e56862ae9fa
                              • Instruction ID: 9ff5366a1843594bb80037a440052cb9e88b760eaf161db27522a6c9f4c26c6f
                              • Opcode Fuzzy Hash: 3437d7d9c7e44ebaf3ffa80765e4cd1ae07bdecd6187d079bae80e56862ae9fa
                              • Instruction Fuzzy Hash: 2AF0AF31300121EBEB10EB17AC41B5E6789DB91316F18443BFA81C7253F6BCDC46862E
                              APIs
                              • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,VtG,?,0049E1E4,?,0046FF73,?,00000000,00470532,?,_is1), ref: 0046FC7F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Value
                              • String ID: Inno Setup: Setup Version$VtG$I
                              • API String ID: 3702945584-29442299
                              • Opcode ID: 9cfc1267c42f3b8636753967eeba7108215bdc4daa84a66296ead8935528fa31
                              • Instruction ID: 298cf4f1533d54ab550fd3d15e19e6a926ba71f9f01c0afe6301adb1283b93e4
                              • Opcode Fuzzy Hash: 9cfc1267c42f3b8636753967eeba7108215bdc4daa84a66296ead8935528fa31
                              • Instruction Fuzzy Hash: E7E06D713013043BD710AA2BAC85F5BAADCDF987A5F00403AB948DB392D578ED0542A8
                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,004542C2,00000000,00454365,?,?,00000000,00000000,00000000,00000000,00000000,?,00454755,00000000), ref: 0042DD5A
                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042DD60
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: GetSystemWow64DirectoryA$kernel32.dll
                              • API String ID: 1646373207-4063490227
                              • Opcode ID: 3cc0000837a877f001cb3f739844429a2e52c12d92d282452e6f6e81f811750a
                              • Instruction ID: 2c7f72bc3db4c40d16b1b765d912767d34fa58fe4c646cc18e222b4ed7f6fe44
                              • Opcode Fuzzy Hash: 3cc0000837a877f001cb3f739844429a2e52c12d92d282452e6f6e81f811750a
                              • Instruction Fuzzy Hash: 0FE02660B60F1113D70071BA5C8379B208D4B84718F90043F3984F52C6DDBDD9490A6E
                              APIs
                              • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EF20), ref: 0042EFB2
                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EFB8
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: ShutdownBlockReasonDestroy$user32.dll
                              • API String ID: 1646373207-260599015
                              • Opcode ID: 17ffa76a40c206e2b50517d12cb18fe3ec79ffaeacc524793963cec9a7ba4fd6
                              • Instruction ID: 02ec898c6c75b1ba26151a3eebd585b8454ae7040b346800783755fde70e6890
                              • Opcode Fuzzy Hash: 17ffa76a40c206e2b50517d12cb18fe3ec79ffaeacc524793963cec9a7ba4fd6
                              • Instruction Fuzzy Hash: 01D0A993302B3332AA1071FB3DC19BB02CC8D202AA3670033F600E2280EA8CCC4012AC
                              APIs
                              • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,0049A4DA), ref: 0044FD57
                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044FD5D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: NotifyWinEvent$user32.dll
                              • API String ID: 1646373207-597752486
                              • Opcode ID: 2274661943a66c5dc8613e9b1b7ddea2e397b8425983515d1bf7fbb50e31bf31
                              • Instruction ID: af032255d430417ffea63134fe83afc5c4b4dbba1536058c56e775f9f11b8dd5
                              • Opcode Fuzzy Hash: 2274661943a66c5dc8613e9b1b7ddea2e397b8425983515d1bf7fbb50e31bf31
                              • Instruction Fuzzy Hash: B2E012E0E417449AFB00BBB96D467193AD0EF6471DF10007FB540A6291C77C44489B1D
                              APIs
                              • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,0049A530,00000001,00000000,0049A554), ref: 0049A25A
                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0049A260
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: DisableProcessWindowsGhosting$user32.dll
                              • API String ID: 1646373207-834958232
                              • Opcode ID: 91cbd31055528a59df4ea05e83c9b1bcc8a0530ddf8f664031b5b98c9f3009da
                              • Instruction ID: dac1c8ebddd32ae9bf6a035aad1c8d1f3cf840f271d0053423bdda14aa0d062e
                              • Opcode Fuzzy Hash: 91cbd31055528a59df4ea05e83c9b1bcc8a0530ddf8f664031b5b98c9f3009da
                              • Instruction Fuzzy Hash: 09B09281686A01509C4033F20C06A1B0E08484171871800B73400F12C6CE6E842404FF
                              APIs
                              • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,00481201), ref: 004810AE
                              • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,00481201), ref: 004810BB
                              • FindNextFileA.KERNEL32(000000FF,?,00000000,004811D4,?,?,?,?,00000000,00481201), ref: 004811B0
                              • FindClose.KERNEL32(000000FF,004811DB,004811D4,?,?,?,?,00000000,00481201), ref: 004811CE
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Find$CloseFileNext
                              • String ID:
                              • API String ID: 2066263336-0
                              • Opcode ID: 1306abb92dd669325521cb5f074d3ba8a60c582de1b22fb1d47fbf41f988a0f3
                              • Instruction ID: 32ce0b593b226a8a495a7b16ec3f8c392e3281c2b0d16565a73bd1b48714ff7d
                              • Opcode Fuzzy Hash: 1306abb92dd669325521cb5f074d3ba8a60c582de1b22fb1d47fbf41f988a0f3
                              • Instruction Fuzzy Hash: 95515E75A006489FCB10EF65CC45ADEB7BCEB89315F1045ABA808E7351D6389F86CF58
                              APIs
                              • GetMenu.USER32(00000000), ref: 004217B1
                              • SetMenu.USER32(00000000,00000000), ref: 004217CE
                              • SetMenu.USER32(00000000,00000000), ref: 00421803
                              • SetMenu.USER32(00000000,00000000), ref: 0042181F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Menu
                              • String ID:
                              • API String ID: 3711407533-0
                              • Opcode ID: a1d2f4484655de1d3fd0847b2328f430e3f40ab88dcc203f2c43afec94015a70
                              • Instruction ID: 73b485f7b17ee0b128820b03b0310e3fef403fa1ec291b42cca88d6787b8c394
                              • Opcode Fuzzy Hash: a1d2f4484655de1d3fd0847b2328f430e3f40ab88dcc203f2c43afec94015a70
                              • Instruction Fuzzy Hash: 44419E3070426407DB21BF3AA98579B66D55FA0308F4811BFE8458F3A3CA7CCC4A82AD
                              APIs
                                • Part of subcall function 0042F2BC: GetTickCount.KERNEL32 ref: 0042F2C2
                                • Part of subcall function 0042F0D8: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042F10D
                              • GetLastError.KERNEL32(00000000,004768B9,?,?,0049E1E4,00000000), ref: 004767A2
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CountErrorFileLastMoveTick
                              • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                              • API String ID: 2406187244-2685451598
                              • Opcode ID: b295b087cbccb7c0b0a2fd57bc67c0996bda5e81bfe7167737e760368e0a1d32
                              • Instruction ID: 03a236e7dc5f504d91790a0ce298dd5dba96fa6117a2cc3ee4ad00c9fc2b7c38
                              • Opcode Fuzzy Hash: b295b087cbccb7c0b0a2fd57bc67c0996bda5e81bfe7167737e760368e0a1d32
                              • Instruction Fuzzy Hash: 53418474A006098BCB00EFA5D882ADE77B9EF48314F52853BE414B7391D7389E05CBAD
                              APIs
                              • GetDesktopWindow.USER32 ref: 00414196
                              • GetDesktopWindow.USER32 ref: 0041424E
                                • Part of subcall function 00419310: 6FBCC6F0.COMCTL32(00000000,?,0041427E,?,?,?,?,00413F43,00000000,00413F56), ref: 0041932C
                                • Part of subcall function 00419310: ShowCursor.USER32(00000001,00000000,?,0041427E,?,?,?,?,00413F43,00000000,00413F56), ref: 00419349
                              • SetCursor.USER32(00000000,?,?,?,?,00413F43,00000000,00413F56), ref: 0041428C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CursorDesktopWindow$Show
                              • String ID:
                              • API String ID: 2074268717-0
                              • Opcode ID: cfce6284985b2a2f885b46e24aab87199b3bad27be3208afe6f8a3dae0a7e5f2
                              • Instruction ID: 6a264f145c0982e92da272f414c83554030b66ece25ea6070dcdf00fca6814f6
                              • Opcode Fuzzy Hash: cfce6284985b2a2f885b46e24aab87199b3bad27be3208afe6f8a3dae0a7e5f2
                              • Instruction Fuzzy Hash: 30414170A10151AFC710EF6DDD89B5677E5ABA9318B05807BE409CB366C738DC81CB1D
                              APIs
                              • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408EC5
                              • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408F34
                              • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408FCF
                              • MessageBoxA.USER32(00000000,?,?,00002010), ref: 0040900E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: LoadString$FileMessageModuleName
                              • String ID:
                              • API String ID: 704749118-0
                              • Opcode ID: 6a14109298dd6aa5b23f5014bc90c14a5f309fa4690e2bc273b58c6e1dd153b9
                              • Instruction ID: d606a76aa49eec759d07c5becdfef17a6c6b9766ea912d15a143196380f0994c
                              • Opcode Fuzzy Hash: 6a14109298dd6aa5b23f5014bc90c14a5f309fa4690e2bc273b58c6e1dd153b9
                              • Instruction Fuzzy Hash: C73162706083815AD330EB65C945BDBB7D99F8A304F00483FB6C8D72D2DB799904876B
                              APIs
                              • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044EEE5
                                • Part of subcall function 0044D528: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044D55A
                              • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044EF69
                                • Part of subcall function 0042C004: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042C018
                              • IsRectEmpty.USER32(?), ref: 0044EF2B
                              • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044EF4E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                              • String ID:
                              • API String ID: 855768636-0
                              • Opcode ID: 6e26a94a7199d382ea3abf285ca1d810cec0835dc4ac21152864a4c17455089d
                              • Instruction ID: 5be5a2c99a49a2f339bd726f9f517b743d06364a043e5a66e7e3b57b404dc1d6
                              • Opcode Fuzzy Hash: 6e26a94a7199d382ea3abf285ca1d810cec0835dc4ac21152864a4c17455089d
                              • Instruction Fuzzy Hash: 5B118C3170031027E610BA7E8C82B5F66C99B88748F01483FB60AEB387DDB8DC09835E
                              APIs
                              • OffsetRect.USER32(?,?,00000000), ref: 00497270
                              • OffsetRect.USER32(?,00000000,?), ref: 0049728B
                              • OffsetRect.USER32(?,?,00000000), ref: 004972A5
                              • OffsetRect.USER32(?,00000000,?), ref: 004972C0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: OffsetRect
                              • String ID:
                              • API String ID: 177026234-0
                              • Opcode ID: 1a73e688525ba1e930e3dbf3898af9d30e9465d405d6debb224a7eeb0afca85c
                              • Instruction ID: e718e50738441f611e1ccbf74e0cde98489d487b8bfa6672397ae6e260ffa509
                              • Opcode Fuzzy Hash: 1a73e688525ba1e930e3dbf3898af9d30e9465d405d6debb224a7eeb0afca85c
                              • Instruction Fuzzy Hash: BE214FB67142016BCB00DF69CD85E5BB7EEEBD4340F14CA2AF544C728AD634E9448796
                              APIs
                              • GetCursorPos.USER32 ref: 004176B0
                              • SetCursor.USER32(00000000), ref: 004176F3
                              • GetLastActivePopup.USER32(?), ref: 0041771D
                              • GetForegroundWindow.USER32(?), ref: 00417724
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Cursor$ActiveForegroundLastPopupWindow
                              • String ID:
                              • API String ID: 1959210111-0
                              • Opcode ID: 14110dda0b90429387dd3a163e0d8510df73624919390f4fd5eb2ebddd82d255
                              • Instruction ID: dbcb3e4d6cdf237ebd373b45723c7518e1d79ef9827cdcdbbe1e0fb97faef126
                              • Opcode Fuzzy Hash: 14110dda0b90429387dd3a163e0d8510df73624919390f4fd5eb2ebddd82d255
                              • Instruction Fuzzy Hash: 8121CF303086018BC710EF29D980ADB73B1AB44768F52447BE8688B392D73DEC81CA8D
                              APIs
                              • SendMessageA.USER32(?,?,?,?), ref: 00416FD4
                              • SetTextColor.GDI32(?,00000000), ref: 00416FEE
                              • SetBkColor.GDI32(?,00000000), ref: 00417008
                              • CallWindowProcA.USER32(?,?,?,?,?), ref: 00417030
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Color$CallMessageProcSendTextWindow
                              • String ID:
                              • API String ID: 601730667-0
                              • Opcode ID: 4ce7c4006bfc0e61fcdce8fe115ad4c73528d98afabcd796622ae120d2b9eda4
                              • Instruction ID: 97657bf4431c68cea31458eff6611b8cbcc4ca9acdd3171e17da9912607f4e93
                              • Opcode Fuzzy Hash: 4ce7c4006bfc0e61fcdce8fe115ad4c73528d98afabcd796622ae120d2b9eda4
                              • Instruction Fuzzy Hash: CE114CB1604600AFD710EE6ECD84E87B7ECDF48310B14882AB55ADB612C62CE8818B69
                              APIs
                              • MulDiv.KERNEL32(8B500000,00000008,?), ref: 00496ED9
                              • MulDiv.KERNEL32(50142444,00000008,?), ref: 00496EED
                              • MulDiv.KERNEL32(F6E65FE8,00000008,?), ref: 00496F01
                              • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 00496F1F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 865696dda9c04e972e54b31ac7a717d8d8d580924cf1526e353e6871edb84c7d
                              • Instruction ID: e3308cc84e827548128d2b2e4dd5895a6eb2c6c5d9673f95432de963ba277a10
                              • Opcode Fuzzy Hash: 865696dda9c04e972e54b31ac7a717d8d8d580924cf1526e353e6871edb84c7d
                              • Instruction Fuzzy Hash: CB113372604204AFCF40DFA9D8C4D9B7BECEF4D324B15516AF918DB24AD634ED408BA4
                              APIs
                              • GetClassInfoA.USER32(00400000,0041F8C0,?), ref: 0041F8F1
                              • UnregisterClassA.USER32(0041F8C0,00400000), ref: 0041F91A
                              • RegisterClassA.USER32(0049B598), ref: 0041F924
                              • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F95F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Class$InfoLongRegisterUnregisterWindow
                              • String ID:
                              • API String ID: 4025006896-0
                              • Opcode ID: ae6de89eb0d2e6a3729d1e0b10ea6149efd73b68be0a0487beae6f0a454497aa
                              • Instruction ID: 2f8fb42507e3cd1bc96778dfed7eead12d65e2047fb8f4462c71738803dd6c65
                              • Opcode Fuzzy Hash: ae6de89eb0d2e6a3729d1e0b10ea6149efd73b68be0a0487beae6f0a454497aa
                              • Instruction Fuzzy Hash: B7012DB16141047BCB10FBA8ED81E9A379CD719318B11423BB505E72A1D739D8168BAC
                              APIs
                              • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D477
                              • LoadResource.KERNEL32(00400000,72756F73,0040AC18,00400000,00000001,00000000,?,0040D3D4,00000000,?,00000000,?,?,0047DE64,0000000A,00000000), ref: 0040D491
                              • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040AC18,00400000,00000001,00000000,?,0040D3D4,00000000,?,00000000,?,?,0047DE64), ref: 0040D4AB
                              • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040AC18,00400000,00000001,00000000,?,0040D3D4,00000000,?,00000000,?), ref: 0040D4B5
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Resource$FindLoadLockSizeof
                              • String ID:
                              • API String ID: 3473537107-0
                              • Opcode ID: 5ead9b113cfd5614d36e08cf149f6ccc86a415bd6e4f69995d9dff1ce3cc408d
                              • Instruction ID: 736189130eb46f944708fe8ab0dcf7c2da2e7d83e7efdb8d5663637d3260b2f8
                              • Opcode Fuzzy Hash: 5ead9b113cfd5614d36e08cf149f6ccc86a415bd6e4f69995d9dff1ce3cc408d
                              • Instruction Fuzzy Hash: FCF04FB3A005046F8B04EE9DA881D5B76DCDE88364310013AFD08EB282DA38DD018B78
                              APIs
                                • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                              • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045BFAA,?,?,?,?,?,00000000,0045BFD1), ref: 00456574
                              • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045BFAA,?,?,?,?,?,00000000), ref: 0045657D
                              • RemoveFontResourceA.GDI32(00000000), ref: 0045658A
                              • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 0045659E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                              • String ID:
                              • API String ID: 4283692357-0
                              • Opcode ID: 4caac74e08e20da0d2c06c48f8ee0446ebda1c210aac02dd0b08997c90b4ebd3
                              • Instruction ID: 60fc6220e6421739c6cddc48edde2e304ed69df2a150d613f8e8855ad9854c81
                              • Opcode Fuzzy Hash: 4caac74e08e20da0d2c06c48f8ee0446ebda1c210aac02dd0b08997c90b4ebd3
                              • Instruction Fuzzy Hash: 27F054B174531076EA10B6B6AC47F5B22CC8F54749F54483A7604EB2C3D57CDD04966D
                              APIs
                              • GetLastError.KERNEL32(00000000,00000000), ref: 00470CA1
                              Strings
                              • Failed to set NTFS compression state (%d)., xrefs: 00470CB2
                              • Setting NTFS compression on directory: %s, xrefs: 00470C6F
                              • Unsetting NTFS compression on directory: %s, xrefs: 00470C87
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                              • API String ID: 1452528299-1392080489
                              • Opcode ID: 6adb48c12a6d143138f10185ab69c53d0360da0583768978ff12b3266c1200ad
                              • Instruction ID: 2f8c6a7a6e35e8588bbb9e762321129d74c961a1f58895d436786832a4f1a68a
                              • Opcode Fuzzy Hash: 6adb48c12a6d143138f10185ab69c53d0360da0583768978ff12b3266c1200ad
                              • Instruction Fuzzy Hash: 04018B30D09248AACB15D7ED94812DDFBE89F0D305F54C1EFA459E7342DF790A08879A
                              APIs
                              • GetLastError.KERNEL32(?,00000000), ref: 0047144D
                              Strings
                              • Failed to set NTFS compression state (%d)., xrefs: 0047145E
                              • Setting NTFS compression on file: %s, xrefs: 0047141B
                              • Unsetting NTFS compression on file: %s, xrefs: 00471433
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                              • API String ID: 1452528299-3038984924
                              • Opcode ID: ab6543f0e7bef128f58b552de59364dcc0235075ba4368e15f33245e46e5f5df
                              • Instruction ID: a30ff693f52cd42e459b797e94763e7277481e0955e0c4e592f957c66b82d28b
                              • Opcode Fuzzy Hash: ab6543f0e7bef128f58b552de59364dcc0235075ba4368e15f33245e46e5f5df
                              • Instruction Fuzzy Hash: 41016730D0424866CB1497AD64422DDBBE89F4D315F94C1EFA458E7352DE790A0887AA
                              APIs
                              • GetCurrentProcess.KERNEL32(00000008,?,?,00000001,00000000,00000002,00000000,00482671,?,?,?,?,?,0049A5C3,00000000,0049A5EB), ref: 00479455
                              • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,00000001,00000000,00000002,00000000,00482671,?,?,?,?,?,0049A5C3,00000000), ref: 0047945B
                              • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,00000001,00000000,00000002,00000000,00482671), ref: 0047947D
                              • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,00000001,00000000,00000002,00000000,00482671), ref: 0047948E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                              • String ID:
                              • API String ID: 215268677-0
                              • Opcode ID: 6d49464bdbc91184ad7f6ac62fff289a707b850c7d11bd8742fde9f2fb834cc3
                              • Instruction ID: 6505384fcc0360b3c734b71afb4e1a1a4ab6f9baee95e57f14d901b11eacad59
                              • Opcode Fuzzy Hash: 6d49464bdbc91184ad7f6ac62fff289a707b850c7d11bd8742fde9f2fb834cc3
                              • Instruction Fuzzy Hash: 90F030716447006BD600EAB58D82E9B73DCEB44354F04883EBE98CB2C1D678DC08AB76
                              APIs
                              • GetLastActivePopup.USER32(?), ref: 0042469C
                              • IsWindowVisible.USER32(?), ref: 004246AD
                              • IsWindowEnabled.USER32(?), ref: 004246B7
                              • SetForegroundWindow.USER32(?), ref: 004246C1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                              • String ID:
                              • API String ID: 2280970139-0
                              • Opcode ID: 6de0995d0e447abcc63ecfbcb3df3be24c1d568dc5660fd48fcf8973f81aa8b9
                              • Instruction ID: 92c4e0b2622c21c1aafdf32b5a5e60d634be871c9bac48645995030a32fad986
                              • Opcode Fuzzy Hash: 6de0995d0e447abcc63ecfbcb3df3be24c1d568dc5660fd48fcf8973f81aa8b9
                              • Instruction Fuzzy Hash: BBE01261B0293157AA31FA7AA885A9F118CDD47BC43460277BC41F7297DB2CDC1045FD
                              APIs
                              • GlobalHandle.KERNEL32 ref: 0040627F
                              • GlobalUnlock.KERNEL32(00000000), ref: 00406286
                              • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 0040628B
                              • GlobalLock.KERNEL32(00000000), ref: 00406291
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Global$AllocHandleLockUnlock
                              • String ID:
                              • API String ID: 2167344118-0
                              • Opcode ID: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                              • Instruction ID: 024a49765fc045a09389489d8ed5919b86daafa6bea6a005e9f609907830066e
                              • Opcode Fuzzy Hash: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                              • Instruction Fuzzy Hash: 64B009C6925A46B8EC0473B24C4BD3F041CE88472C3809A6E7554BA0839C7C9C002E3A
                              APIs
                              • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047CE0D,?,00000000,00000000,00000001,00000000,0047B7C1,?,00000000), ref: 0047B785
                              Strings
                              • Failed to parse "reg" constant, xrefs: 0047B78C
                              • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047B5F9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Close
                              • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                              • API String ID: 3535843008-1938159461
                              • Opcode ID: f3efe0bf92a2f40a4dc3dc2e799273e463fc0dbb7f1219b13f72ddd9139161f6
                              • Instruction ID: f1421b174eee6fc7f54e6f8e7a43c19df08b7389384ab18ee26f4796af10067b
                              • Opcode Fuzzy Hash: f3efe0bf92a2f40a4dc3dc2e799273e463fc0dbb7f1219b13f72ddd9139161f6
                              • Instruction Fuzzy Hash: 89815175E00208AFCB10DFA5D481BDEBBF9EF48354F50816AE454A7391DB38AE05CB99
                              APIs
                                • Part of subcall function 00451070: SetEndOfFile.KERNEL32(?,?,0045CB3E,00000000,0045CCC9,?,00000000,00000002,00000002), ref: 00451077
                              • FlushFileBuffers.KERNEL32(?), ref: 0045CC95
                              Strings
                              • NumRecs range exceeded, xrefs: 0045CB92
                              • EndOffset range exceeded, xrefs: 0045CBC9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: File$BuffersFlush
                              • String ID: EndOffset range exceeded$NumRecs range exceeded
                              • API String ID: 3593489403-659731555
                              • Opcode ID: 98d39f62b2baeb0f0dec741049dfb73ffaf15e0d689818ff3631373a68726cff
                              • Instruction ID: 609741d3f79eabe780872f94ce4b5bf90fe53003262008b9b2f446b63576a9fa
                              • Opcode Fuzzy Hash: 98d39f62b2baeb0f0dec741049dfb73ffaf15e0d689818ff3631373a68726cff
                              • Instruction Fuzzy Hash: 6E615234A002588FDB25DF25D881BDAB7B5EF49305F0084DAED899B352D6B4AEC8CF54
                              APIs
                              • GetForegroundWindow.USER32(00000000,00484B02,?,00000000,00484B43,?,?,?,?,00000000,00000000,00000000,?,0046CA59), ref: 004849B1
                              • SetActiveWindow.USER32(?,00000000,00484B02,?,00000000,00484B43,?,?,?,?,00000000,00000000,00000000,?,0046CA59), ref: 004849C3
                              Strings
                              • Will not restart Windows automatically., xrefs: 00484AE2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window$ActiveForeground
                              • String ID: Will not restart Windows automatically.
                              • API String ID: 307657957-4169339592
                              • Opcode ID: 611cf57aec86bfea3a2af854023c09e37a5beb60966471ff9b2a299e19d7bf06
                              • Instruction ID: e3ffbfa0a86cb08642d5b37a1a1eca219a4b332c0ee086946791bcc458de558f
                              • Opcode Fuzzy Hash: 611cf57aec86bfea3a2af854023c09e37a5beb60966471ff9b2a299e19d7bf06
                              • Instruction Fuzzy Hash: 64415930644245EFD714FFA6EC05B6E7BE4D795308F1948B7E8405B392E2BC9800971E
                              APIs
                              • LocalFileTimeToFileTime.KERNEL32(?,?,?,00000000,00000000,00477727,?,00000000,00477738,?,00000000,00477781), ref: 004776F8
                              • SetFileTime.KERNEL32(?,00000000,00000000,?,?,?,?,00000000,00000000,00477727,?,00000000,00477738,?,00000000,00477781), ref: 0047770C
                              Strings
                              • Extracting temporary file: , xrefs: 00477634
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FileTime$Local
                              • String ID: Extracting temporary file:
                              • API String ID: 791338737-4171118009
                              • Opcode ID: eb98cc0d1cdcf9865969dbb50bdf079376187bc28a35bda05ac22d4fc5ce8059
                              • Instruction ID: 13e9f88ccb8282ea38195536ff5c63a907cbb836f3d7a61bc1ee4cb3f854d839
                              • Opcode Fuzzy Hash: eb98cc0d1cdcf9865969dbb50bdf079376187bc28a35bda05ac22d4fc5ce8059
                              • Instruction Fuzzy Hash: 4041B774A04649AFCB01DF65CC91AEFBBB8EB09304F51847AF910A7391D678A901CB98
                              Strings
                              • Failed to proceed to next wizard page; aborting., xrefs: 0046D9E4
                              • Failed to proceed to next wizard page; showing wizard., xrefs: 0046D9F8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                              • API String ID: 0-1974262853
                              • Opcode ID: ea26bf9637c1ba0bfb2d6f1d7c002821e5ffe9644d54683e76b46f4e62d921a4
                              • Instruction ID: 84e2974eb34e4f2dda2b8c8cb2eefec3d4715c8d151fead2dfc4afe0ae77ca03
                              • Opcode Fuzzy Hash: ea26bf9637c1ba0bfb2d6f1d7c002821e5ffe9644d54683e76b46f4e62d921a4
                              • Instruction Fuzzy Hash: 4D319E70F04204EFD711EB69D989BA977F5EB05304F6500BBE408AB3A2D7786E44CB1A
                              APIs
                                • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                              • RegCloseKey.ADVAPI32(?,0047A1C6,?,?,00000001,00000000,00000000,0047A1E1), ref: 0047A1AF
                              Strings
                              • %s\%s_is1, xrefs: 0047A158
                              • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0047A13A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseOpen
                              • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                              • API String ID: 47109696-1598650737
                              • Opcode ID: 6f6a57914aa4067f96efd10dca847e3b9be0d2eccfabac7fb81a31423b256b48
                              • Instruction ID: 0d63d1a050f55a8da938840af3d9f6bfa62d29ba12cdbe4796c61ae60ad15f2e
                              • Opcode Fuzzy Hash: 6f6a57914aa4067f96efd10dca847e3b9be0d2eccfabac7fb81a31423b256b48
                              • Instruction Fuzzy Hash: 8E216474B042449FEB01DFA9CC516EEBBF8EB89704F90847AE404E7381D7789E158B59
                              APIs
                              • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004508A1
                              • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004508D2
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ExecuteMessageSendShell
                              • String ID: open
                              • API String ID: 812272486-2758837156
                              • Opcode ID: adc24c5d3b5368d32e78575de7f2422fd367a658f9279fd22d1d28f183eb37d2
                              • Instruction ID: f57ce05e9eba324e121f638db0535f08eb0d68243c76b72727f5d658c61a4d86
                              • Opcode Fuzzy Hash: adc24c5d3b5368d32e78575de7f2422fd367a658f9279fd22d1d28f183eb37d2
                              • Instruction Fuzzy Hash: 4C216075E00604BFDB00EFA9C981E9EB7F8EB44705F10817AB904F7292D7789A45CB88
                              APIs
                              • ShellExecuteEx.SHELL32(0000003C), ref: 00455A94
                              • GetLastError.KERNEL32(0000003C,00000000,00455ADD,?,?,?), ref: 00455AA5
                                • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: DirectoryErrorExecuteLastShellSystem
                              • String ID: <
                              • API String ID: 893404051-4251816714
                              • Opcode ID: 43feb11e9db7b730235ecc85ca7dd059247b9c3467fc029a3a8c252ac057d8c1
                              • Instruction ID: 1dd1e4a4b05f96b02f6cdc30b2026c57645841094811f513de853399c4f5318c
                              • Opcode Fuzzy Hash: 43feb11e9db7b730235ecc85ca7dd059247b9c3467fc029a3a8c252ac057d8c1
                              • Instruction Fuzzy Hash: 482151B0A00649AFDB00DF65D8926AE7BE8EF08345F50413BF844E7281E7789E49CB58
                              APIs
                              • RtlEnterCriticalSection.KERNEL32(0049D420,00000000,)), ref: 004025C7
                              • RtlLeaveCriticalSection.KERNEL32(0049D420,0040263D), ref: 00402630
                                • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049D420,00000000,00401A82,?,?,0040222E,02202B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049D420,0049D420,00000000,00401A82,?,?,0040222E,02202B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049D420,00000000,00401A82,?,?,0040222E,02202B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049D420,00401A89,00000000,00401A82,?,?,0040222E,02202B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                              • String ID: )
                              • API String ID: 2227675388-1084416617
                              • Opcode ID: b1c34bbcfa7d0433af8c48dff581505e6c7889bd18d36f496ad8d1521465f649
                              • Instruction ID: 570f99ef1d3d95e4b4d80a2adc1962b98f522b57bc72750d6ce688ebb538822c
                              • Opcode Fuzzy Hash: b1c34bbcfa7d0433af8c48dff581505e6c7889bd18d36f496ad8d1521465f649
                              • Instruction Fuzzy Hash: CE110131B042046FEB25AF799F1A62AAAD4D79575CB64087FF404F32D2D9BD9C02826C
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00498451
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Window
                              • String ID: /INITPROCWND=$%x $@
                              • API String ID: 2353593579-4169826103
                              • Opcode ID: 3a83e6e038dbafd0e3ea01eb6dd6426255c1a8b46f58718dc6178500fe069b44
                              • Instruction ID: a9318bdce5e824465d4436be78f64917a5ae5ef5b8220d929174e0d313b11457
                              • Opcode Fuzzy Hash: 3a83e6e038dbafd0e3ea01eb6dd6426255c1a8b46f58718dc6178500fe069b44
                              • Instruction Fuzzy Hash: EF119370A082059FDB01DBA9D851BAEBBE8EF49314F11847BE504E7292EA3C99058B58
                              APIs
                                • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                              • SysFreeString.OLEAUT32(?), ref: 00447966
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: String$AllocByteCharFreeMultiWide
                              • String ID: NIL Interface Exception$Unknown Method
                              • API String ID: 3952431833-1023667238
                              • Opcode ID: ea7a85b9692c4460c5906b58765fb64bf6ee6b5f46e4d7caecedcff591b2af5e
                              • Instruction ID: 10ddd43a001eab7360299ad3f405319ab988bcee1c7d5b08318f9ee426dd8228
                              • Opcode Fuzzy Hash: ea7a85b9692c4460c5906b58765fb64bf6ee6b5f46e4d7caecedcff591b2af5e
                              • Instruction Fuzzy Hash: 9211E9716042089FEB10EFA58D51A6FBBBDEB09304F91403AF500F7281C7789D01C769
                              APIs
                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00497D50,?,00497D44,00000000,00497D2B), ref: 00497CF6
                              • CloseHandle.KERNEL32(00497D90,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00497D50,?,00497D44,00000000), ref: 00497D0D
                                • Part of subcall function 00497BE0: GetLastError.KERNEL32(00000000,00497C78,?,?,?,?), ref: 00497C04
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseCreateErrorHandleLastProcess
                              • String ID: D
                              • API String ID: 3798668922-2746444292
                              • Opcode ID: a880bfa9a77c93c91fa9ab75ae7060b7f78cb32e3cfe05dc5138aae6885ad4e0
                              • Instruction ID: a89f5070db7a5e6d261d16ca7c1b7ea99db6432e353ebe52f8e4aa70fd7af1a9
                              • Opcode Fuzzy Hash: a880bfa9a77c93c91fa9ab75ae7060b7f78cb32e3cfe05dc5138aae6885ad4e0
                              • Instruction Fuzzy Hash: 1001A1B0608248AFDB00DBA5DC42FAF7BACDF09704F60013BF504E72C1E6785E008668
                              APIs
                              • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042E1C8
                              • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042E208
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Value$EnumQuery
                              • String ID: Inno Setup: No Icons
                              • API String ID: 1576479698-2016326496
                              • Opcode ID: 5fa1588eb3983bc8147b11ac52db8119f930d32b550c0df0fd023eaaf2352da0
                              • Instruction ID: e7333c3f072e055346127a6a42ec618886ffe365ff3054ef7f5207155727e60c
                              • Opcode Fuzzy Hash: 5fa1588eb3983bc8147b11ac52db8119f930d32b550c0df0fd023eaaf2352da0
                              • Instruction Fuzzy Hash: 3C01DB32745371A9F73145137D41B7B65CC8B42B60F64057BF941FA2C1DA68AC0592BE
                              APIs
                                • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                • Part of subcall function 0042E7E4: SetErrorMode.KERNEL32(00008000), ref: 0042E7EE
                                • Part of subcall function 0042E7E4: LoadLibraryA.KERNEL32(00000000,00000000,0042E838,?,00000000,0042E856,?,00008000), ref: 0042E81D
                              • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042F1E4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AddressDirectoryErrorLibraryLoadModeProcSystem
                              • String ID: SHAutoComplete$shlwapi.dll
                              • API String ID: 2552568031-1506664499
                              • Opcode ID: fb07ec50570effe9fb27e1689c136128c3aaffa3ed3d7639c4a8456e04d5f888
                              • Instruction ID: f8fd25663858203a515409cfb2833324ac242db414aae85ffba9c986139a78a3
                              • Opcode Fuzzy Hash: fb07ec50570effe9fb27e1689c136128c3aaffa3ed3d7639c4a8456e04d5f888
                              • Instruction Fuzzy Hash: 9701D274B00718EBE711DB65EC42B5E7BFCDB99704FE000B7B404A2291DAB99E48C62C
                              APIs
                              • SetFileAttributesA.KERNEL32(00000000,?,00000000,0045362D,?,?,-00000001,?), ref: 00453607
                              • GetLastError.KERNEL32(00000000,?,00000000,0045362D,?,?,-00000001,?), ref: 0045360F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AttributesErrorFileLast
                              • String ID: @8H
                              • API String ID: 1799206407-3762495883
                              • Opcode ID: e51d2d5a64d0818d1847fbb95d225efede478a4be5bb01e29063d0704820aebd
                              • Instruction ID: 2a718f5fbeded0ca4f0ca1a684ecb9b724474f3cd93569f9f0dcaab09f3de9c7
                              • Opcode Fuzzy Hash: e51d2d5a64d0818d1847fbb95d225efede478a4be5bb01e29063d0704820aebd
                              • Instruction Fuzzy Hash: 49F0F971A04204BBCB10DF7AAC4249EF7ECDB49362711457BFC14D3342E6784E088598
                              APIs
                                • Part of subcall function 0047E3D0: FreeLibrary.KERNEL32(00000000,00482E1B), ref: 0047E3E6
                                • Part of subcall function 0047E0A8: GetTickCount.KERNEL32 ref: 0047E0F2
                                • Part of subcall function 00457A90: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 00457AAF
                              • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,0049A243), ref: 00499941
                              • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,0049A243), ref: 00499947
                              Strings
                              • Detected restart. Removing temporary directory., xrefs: 004998FB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                              • String ID: Detected restart. Removing temporary directory.
                              • API String ID: 1717587489-3199836293
                              • Opcode ID: cf4eeb9d2890f889123e5d43942b6b9d65dcdfa64d28096ccc0edee5f77a06bc
                              • Instruction ID: 3ff60914118e938cb0b4ccf38de38d34f2fcffefe5e82e60aedbfe03ba6cc694
                              • Opcode Fuzzy Hash: cf4eeb9d2890f889123e5d43942b6b9d65dcdfa64d28096ccc0edee5f77a06bc
                              • Instruction Fuzzy Hash: 7DE0E5B12086446EDE1277AB6C1796B3F8CD74A76CB11447FF80491652E82D4C108A3D
                              APIs
                              • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0047661B), ref: 00476409
                              • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0047661B), ref: 00476420
                                • Part of subcall function 00453C04: GetLastError.KERNEL32(00000000,00454799,00000005,00000000,004547CE,?,?,00000000,0049D62C,00000004,00000000,00000000,00000000,?,00499C8D,00000000), ref: 00453C07
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CloseCreateErrorFileHandleLast
                              • String ID: CreateFile
                              • API String ID: 2528220319-823142352
                              • Opcode ID: 49d63fbd6f5fa712f52ce53229c2f792f734722ce0c98ad86c4030682624aac4
                              • Instruction ID: 7bcc5fcb2fff494360280e2963ad1350d0a4ff74aab44489db68ce07f01780cc
                              • Opcode Fuzzy Hash: 49d63fbd6f5fa712f52ce53229c2f792f734722ce0c98ad86c4030682624aac4
                              • Instruction Fuzzy Hash: CDE06D302403447BEA20EB69DCC6F4A77D89B04738F108161FA48AF3E2C6B9EC408A5C
                              APIs
                              • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0047034A,?,?,00000000,00470532,?,_is1,?), ref: 0046FCDF
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Value
                              • String ID: NoModify$I
                              • API String ID: 3702945584-1047506205
                              • Opcode ID: 73fdcae3ba9d18a103afebde5dc2ca47e69f96c0885cedc9c810f6db9bfe17db
                              • Instruction ID: 74656710be1799963dacf24c43606be2f52e229709c8467fcc2139d849b5a3c3
                              • Opcode Fuzzy Hash: 73fdcae3ba9d18a103afebde5dc2ca47e69f96c0885cedc9c810f6db9bfe17db
                              • Instruction Fuzzy Hash: 1AE04FB0640308BFEB04DB55DD4AF6BB7ACDB48750F104059BA44DB381EA74FE008658
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1467518916.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.1467504590.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467565257.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467579753.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467593726.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.1467606769.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ErrorLastSleep
                              • String ID:
                              • API String ID: 1458359878-0
                              • Opcode ID: 7805a43f88a235992633b9d37c21eb6baea5f58c58a25dbaaf87ceedd4d3a719
                              • Instruction ID: 0e0098d5c51f6c3332c54b3c49cab550602dc5c9badc8da443834b62d3c24bba
                              • Opcode Fuzzy Hash: 7805a43f88a235992633b9d37c21eb6baea5f58c58a25dbaaf87ceedd4d3a719
                              • Instruction Fuzzy Hash: BCF02B32F00914E74F30A76AA88393F628CDA417A6720012BFC04DB303D53CDE0586A8