Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
msgtopstdemo.exe

Overview

General Information

Sample name:msgtopstdemo.exe
Analysis ID:1525130
MD5:fa7fccb539f58ea32e2a92a0a32af286
SHA1:1ba6a04fe2d9ebf47d97f2c6b295c33ad5803a3e
SHA256:ee8fc4c0c9cb55699ef0bf026d5af42e7bb82d535ac8d84c8480569040f27257
Infos:

Detection

Score:5
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • msgtopstdemo.exe (PID: 7288 cmdline: "C:\Users\user\Desktop\msgtopstdemo.exe" MD5: FA7FCCB539F58EA32E2A92A0A32AF286)
    • msgtopstdemo.tmp (PID: 7304 cmdline: "C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp" /SL5="$20450,2062666,288768,C:\Users\user\Desktop\msgtopstdemo.exe" MD5: 03B1E8078CAE9C05B81C8B8FE2A11840)
      • MsgToPst.exe (PID: 7752 cmdline: "C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exe" MD5: 5F741C35077C33000CF0638178E1F070)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: msgtopstdemo.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpWindow detected: License AgreementPlease read the following important information before continuing.Please read the following License Agreement. You must accept the terms of this agreement before continuing with the installation.SOFTWARE LICENSE AGREEMENT This Software License Agreement is a legal agreement between you (an individual) and the www.datavare.com software product identified above which includes computer software and may include associated media printed materials or electronic documentation ("SOFTWARE PRODUCT"). With the instalment copying or using the Datavare Software and Services LLP PRODUCT indicates that you are agree to the terms of this AGREEMENT. In case you are not agree to the Agreement terms and conditions it is better to not to install or run the "www.datavare.com" SOFTWARE PRODUCTS; you may however return it to the right place (the seller) for getting a full refund.www.datavare.com PRODUCT LICENSE:The SOFTWARE PRODUCT is fully protected by copyright laws and international copyright treaties as well as other intellectual property laws and treaties. It is for licensed not for selling.Termination. Without prejudice to any other rights www.datavare.com may terminate this AGREEMENT if you fail to comply with the terms and conditions of this AGREEMENT. In such event you must destroy all copies of the SOFTWARE PRODUCT and all of its component parts.CHECK OUT OTHER RIGHTS AND LIMITATIONSClients cannot Resale Software. You might not resell or otherwise transfer for value the SOFTWARE PRODUCT.LICENSE - It is a Trial license that signifies you are permitted to use this trial version of "Datavare Software and Services LLP". Once the usage is over you can able to apply for getting the registration key that will eliminate the trial limitation and allow you to use a copy of "Datavare Software and Services LLP" on one computer. In case you wish to apply for multiple licenses it is must to get request for multiple registration keys where one for each user. www.datavare.com might also offer you with one key with multiple licenses.OWNERSHIP - This Software is copyrighted and owned by www.datavare.com. Your license confers no ownership or title in the Software. You can make a copy of this software solely for the purpose of back up. But License shall not modify copy duplicate reproduce license or sub license the Software or transfer or convey the Software or any right in the Software to anyone else without the prior written consent of Developer.LIMITED WARRANTY- www.datavare.com confirms that any type of implied warranty is concerned for only thirty (30) days. Warranty for the Software will perform substantially according to the user documentation for thirty (30) days from the day of receipt. CUSTOMER REMEDIES - In case the program fails to meet with www.datavare.com limited warranty a consumer can ask to refund the purchasing amount but it should be within 30 days of the shopping. This limited warranty is void if failure of the Software has resulted from abu
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpWindow detected: License AgreementPlease read the following important information before continuing.Please read the following License Agreement. You must accept the terms of this agreement before continuing with the installation.SOFTWARE LICENSE AGREEMENT This Software License Agreement is a legal agreement between you (an individual) and the www.datavare.com software product identified above which includes computer software and may include associated media printed materials or electronic documentation ("SOFTWARE PRODUCT"). With the instalment copying or using the Datavare Software and Services LLP PRODUCT indicates that you are agree to the terms of this AGREEMENT. In case you are not agree to the Agreement terms and conditions it is better to not to install or run the "www.datavare.com" SOFTWARE PRODUCTS; you may however return it to the right place (the seller) for getting a full refund.www.datavare.com PRODUCT LICENSE:The SOFTWARE PRODUCT is fully protected by copyright laws and international copyright treaties as well as other intellectual property laws and treaties. It is for licensed not for selling.Termination. Without prejudice to any other rights www.datavare.com may terminate this AGREEMENT if you fail to comply with the terms and conditions of this AGREEMENT. In such event you must destroy all copies of the SOFTWARE PRODUCT and all of its component parts.CHECK OUT OTHER RIGHTS AND LIMITATIONSClients cannot Resale Software. You might not resell or otherwise transfer for value the SOFTWARE PRODUCT.LICENSE - It is a Trial license that signifies you are permitted to use this trial version of "Datavare Software and Services LLP". Once the usage is over you can able to apply for getting the registration key that will eliminate the trial limitation and allow you to use a copy of "Datavare Software and Services LLP" on one computer. In case you wish to apply for multiple licenses it is must to get request for multiple registration keys where one for each user. www.datavare.com might also offer you with one key with multiple licenses.OWNERSHIP - This Software is copyrighted and owned by www.datavare.com. Your license confers no ownership or title in the Software. You can make a copy of this software solely for the purpose of back up. But License shall not modify copy duplicate reproduce license or sub license the Software or transfer or convey the Software or any right in the Software to anyone else without the prior written consent of Developer.LIMITED WARRANTY- www.datavare.com confirms that any type of implied warranty is concerned for only thirty (30) days. Warranty for the Software will perform substantially according to the user documentation for thirty (30) days from the day of receipt. CUSTOMER REMEDIES - In case the program fails to meet with www.datavare.com limited warranty a consumer can ask to refund the purchasing amount but it should be within 30 days of the shopping. This limited warranty is void if failure of the Software has resulted from abu
Source: msgtopstdemo.exeStatic PE information: certificate valid
Source: msgtopstdemo.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: _c:\Users\test\Desktop\datavare products\DEMO-Datavare-MsgToPst\MsgToPst\MsgToPst\obj\x86\Debug\MsgToPst.pdb source: msgtopstdemo.tmp, 00000001.00000003.2027572801.0000000004948000.00000004.00001000.00020000.00000000.sdmp, MsgToPst.exe, 00000005.00000000.2026456010.000000000076A000.00000002.00000001.01000000.0000000A.sdmp, is-4FDGP.tmp.1.dr, is-01BK0.tmp.1.dr
Source: Binary string: d:\Bjornar\SVN\istool\isxdl\trunk\source\Release\isxdl.pdb source: msgtopstdemo.tmp, 00000001.00000003.2027572801.0000000004987000.00000004.00001000.00020000.00000000.sdmp, isxdl.dll.1.dr
Source: Binary string: c:\Users\test\Desktop\datavare products\DEMO-Datavare-MsgToPst\MsgToPst\MsgToPst\obj\x86\Debug\MsgToPst.pdb source: msgtopstdemo.tmp, 00000001.00000003.2027572801.0000000004948000.00000004.00001000.00020000.00000000.sdmp, MsgToPst.exe, 00000005.00000000.2026456010.000000000076A000.00000002.00000001.01000000.0000000A.sdmp, is-4FDGP.tmp.1.dr, is-01BK0.tmp.1.dr
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00476120 FindFirstFileA,FindNextFileA,FindClose,1_2_00476120
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004531A4 FindFirstFileA,GetLastError,1_2_004531A4
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004648D0 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004648D0
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00464D4C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464D4C
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00463344 FindFirstFileA,FindNextFileA,FindClose,1_2_00463344
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0049998C FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_0049998C
Source: msgtopstdemo.exeString found in binary or memory: http://certificates.godaddy.com/repository/0
Source: msgtopstdemo.exeString found in binary or memory: http://certificates.godaddy.com/repository/gdig2.crt0
Source: msgtopstdemo.exeString found in binary or memory: http://certificates.starfieldtech.com/repository/1604
Source: msgtopstdemo.exeString found in binary or memory: http://certs.godaddy.com/repository/1301
Source: msgtopstdemo.exeString found in binary or memory: http://crl.godaddy.com/gdig2s5-2.crl0
Source: msgtopstdemo.exeString found in binary or memory: http://crl.godaddy.com/gdroot-g2.crl0F
Source: msgtopstdemo.exeString found in binary or memory: http://crl.starfieldtech.com/repository/0
Source: msgtopstdemo.exeString found in binary or memory: http://crl.starfieldtech.com/repository/sfsroot.crl0P
Source: MsgToPst.exe, 00000005.00000002.2952651282.00000000012F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.ado
Source: msgtopstdemo.exeString found in binary or memory: http://ocsp.godaddy.com/0
Source: msgtopstdemo.exeString found in binary or memory: http://ocsp.godaddy.com/05
Source: msgtopstdemo.exeString found in binary or memory: http://ocsp.starfieldtech.com/0D
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: msgtopstdemo.tmp, 00000001.00000003.1701151209.000000000215C000.00000004.00001000.00020000.00000000.sdmp, msgtopstdemo.tmp, 00000001.00000003.1701048720.0000000003130000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.datavare.com/
Source: msgtopstdemo.tmp, 00000001.00000003.2029636409.0000000002168000.00000004.00001000.00020000.00000000.sdmp, msgtopstdemo.tmp, 00000001.00000003.1701151209.000000000215C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.datavare.com/B
Source: msgtopstdemo.tmp, 00000001.00000003.2027572801.0000000004948000.00000004.00001000.00020000.00000000.sdmp, MsgToPst.exe, 00000005.00000000.2026456010.000000000076A000.00000002.00000001.01000000.0000000A.sdmp, is-4FDGP.tmp.1.dr, is-01BK0.tmp.1.drString found in binary or memory: http://www.datavare.com/contact-us.html
Source: msgtopstdemo.tmp, 00000001.00000003.2027572801.0000000004948000.00000004.00001000.00020000.00000000.sdmp, MsgToPst.exe, 00000005.00000000.2026456010.000000000076A000.00000002.00000001.01000000.0000000A.sdmp, is-4FDGP.tmp.1.dr, is-01BK0.tmp.1.drString found in binary or memory: http://www.datavare.com/software/order/msg-to-pst-expert.html
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: msgtopstdemo.tmp, msgtopstdemo.tmp, 00000001.00000000.1700355107.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-0L47Q.tmp.1.dr, msgtopstdemo.tmp.0.drString found in binary or memory: http://www.innosetup.com/
Source: isxdl.dll.1.drString found in binary or memory: http://www.istool.org/
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: msgtopstdemo.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
Source: msgtopstdemo.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: msgtopstdemo.exe, 00000000.00000003.1699783757.0000000002370000.00000004.00001000.00020000.00000000.sdmp, msgtopstdemo.exe, 00000000.00000003.1699586406.0000000002470000.00000004.00001000.00020000.00000000.sdmp, msgtopstdemo.tmp, msgtopstdemo.tmp, 00000001.00000000.1700355107.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-0L47Q.tmp.1.dr, msgtopstdemo.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
Source: msgtopstdemo.exe, 00000000.00000003.1699783757.0000000002370000.00000004.00001000.00020000.00000000.sdmp, msgtopstdemo.exe, 00000000.00000003.1699586406.0000000002470000.00000004.00001000.00020000.00000000.sdmp, msgtopstdemo.tmp, 00000001.00000000.1700355107.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-0L47Q.tmp.1.dr, msgtopstdemo.tmp.0.drString found in binary or memory: http://www.remobjects.com/psU
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: msgtopstdemo.exeString found in binary or memory: https://certs.godaddy.com/repository/0
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00423FD4 NtdllDefWindowProc_A,1_2_00423FD4
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00412A28 NtdllDefWindowProc_A,1_2_00412A28
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0042F9C0 NtdllDefWindowProc_A,1_2_0042F9C0
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00479D08 NtdllDefWindowProc_A,1_2_00479D08
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00457D90 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_00457D90
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0042ED84: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042ED84
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: 0_2_004098E8 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_004098E8
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00455D80 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_00455D80
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: 0_2_004088880_2_00408888
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004680341_2_00468034
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004716881_2_00471688
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0048F6BC1_2_0048F6BC
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004357681_2_00435768
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004880301_2_00488030
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0046A0881_2_0046A088
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004521001_2_00452100
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0043E1F01_2_0043E1F0
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004307FC1_2_004307FC
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004449681_2_00444968
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00434A641_2_00434A64
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00444F101_2_00444F10
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00488F901_2_00488F90
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004313881_2_00431388
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004456081_2_00445608
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0045F8C01_2_0045F8C0
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0045B9701_2_0045B970
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00445A141_2_00445A14
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeCode function: 5_2_00DCDCF45_2_00DCDCF4
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: String function: 00446274 appears 45 times
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: String function: 0040596C appears 114 times
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: String function: 00453AAC appears 97 times
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: String function: 0043497C appears 32 times
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: String function: 00458718 appears 79 times
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: String function: 00403400 appears 62 times
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: String function: 0040905C appears 45 times
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: String function: 00407D44 appears 43 times
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: String function: 00446544 appears 58 times
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: String function: 0045850C appears 100 times
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: String function: 00403494 appears 84 times
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: String function: 0040357C appears 33 times
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: String function: 00406F14 appears 45 times
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: String function: 00403684 appears 229 times
Source: msgtopstdemo.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: msgtopstdemo.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: msgtopstdemo.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
Source: is-0L47Q.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-0L47Q.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: is-0L47Q.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
Source: msgtopstdemo.exe, 00000000.00000003.1699586406.000000000254A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs msgtopstdemo.exe
Source: msgtopstdemo.exe, 00000000.00000003.1699783757.0000000002446000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs msgtopstdemo.exe
Source: msgtopstdemo.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: clean5.winEXE@5/14@0/0
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: 0_2_004098E8 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_004098E8
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00455D80 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_00455D80
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004565A8 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceExA,GetDiskFreeSpaceA,1_2_004565A8
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00456DD4 CoCreateInstance,CoCreateInstance,SysFreeString,SysFreeString,1_2_00456DD4
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: 0_2_0040A0D4 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_0040A0D4
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpFile created: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo VersionJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeMutant created: NULL
Source: C:\Users\user\Desktop\msgtopstdemo.exeFile created: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpFile read: C:\Windows\win.iniJump to behavior
Source: C:\Users\user\Desktop\msgtopstdemo.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: msgtopstdemo.exeString found in binary or memory: need to be updated. /RESTARTAPPLICATIONS Instructs Setup to restart applications. /NORESTARTAPPLICATIONS Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file after having checked t
Source: msgtopstdemo.exeString found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\msgtopstdemo.exeFile read: C:\Users\user\Desktop\msgtopstdemo.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\msgtopstdemo.exe "C:\Users\user\Desktop\msgtopstdemo.exe"
Source: C:\Users\user\Desktop\msgtopstdemo.exeProcess created: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp "C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp" /SL5="$20450,2062666,288768,C:\Users\user\Desktop\msgtopstdemo.exe"
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpProcess created: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exe "C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exe"
Source: C:\Users\user\Desktop\msgtopstdemo.exeProcess created: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp "C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp" /SL5="$20450,2062666,288768,C:\Users\user\Desktop\msgtopstdemo.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpProcess created: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exe "C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exe"Jump to behavior
Source: C:\Users\user\Desktop\msgtopstdemo.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\msgtopstdemo.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: Datavare MSG to PST Converter - Demo Version.lnk.1.drLNK file: ..\..\..\..\..\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exe
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpWindow found: window name: TSelectLanguageFormJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpAutomated click: OK
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpAutomated click: I accept the agreement
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpAutomated click: I accept the agreement
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpAutomated click: I accept the agreement
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpAutomated click: I accept the agreement
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpAutomated click: Install
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpAutomated click: I accept the agreement
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpWindow detected: License AgreementPlease read the following important information before continuing.Please read the following License Agreement. You must accept the terms of this agreement before continuing with the installation.SOFTWARE LICENSE AGREEMENT This Software License Agreement is a legal agreement between you (an individual) and the www.datavare.com software product identified above which includes computer software and may include associated media printed materials or electronic documentation ("SOFTWARE PRODUCT"). With the instalment copying or using the Datavare Software and Services LLP PRODUCT indicates that you are agree to the terms of this AGREEMENT. In case you are not agree to the Agreement terms and conditions it is better to not to install or run the "www.datavare.com" SOFTWARE PRODUCTS; you may however return it to the right place (the seller) for getting a full refund.www.datavare.com PRODUCT LICENSE:The SOFTWARE PRODUCT is fully protected by copyright laws and international copyright treaties as well as other intellectual property laws and treaties. It is for licensed not for selling.Termination. Without prejudice to any other rights www.datavare.com may terminate this AGREEMENT if you fail to comply with the terms and conditions of this AGREEMENT. In such event you must destroy all copies of the SOFTWARE PRODUCT and all of its component parts.CHECK OUT OTHER RIGHTS AND LIMITATIONSClients cannot Resale Software. You might not resell or otherwise transfer for value the SOFTWARE PRODUCT.LICENSE - It is a Trial license that signifies you are permitted to use this trial version of "Datavare Software and Services LLP". Once the usage is over you can able to apply for getting the registration key that will eliminate the trial limitation and allow you to use a copy of "Datavare Software and Services LLP" on one computer. In case you wish to apply for multiple licenses it is must to get request for multiple registration keys where one for each user. www.datavare.com might also offer you with one key with multiple licenses.OWNERSHIP - This Software is copyrighted and owned by www.datavare.com. Your license confers no ownership or title in the Software. You can make a copy of this software solely for the purpose of back up. But License shall not modify copy duplicate reproduce license or sub license the Software or transfer or convey the Software or any right in the Software to anyone else without the prior written consent of Developer.LIMITED WARRANTY- www.datavare.com confirms that any type of implied warranty is concerned for only thirty (30) days. Warranty for the Software will perform substantially according to the user documentation for thirty (30) days from the day of receipt. CUSTOMER REMEDIES - In case the program fails to meet with www.datavare.com limited warranty a consumer can ask to refund the purchasing amount but it should be within 30 days of the shopping. This limited warranty is void if failure of the Software has resulted from abu
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpWindow detected: License AgreementPlease read the following important information before continuing.Please read the following License Agreement. You must accept the terms of this agreement before continuing with the installation.SOFTWARE LICENSE AGREEMENT This Software License Agreement is a legal agreement between you (an individual) and the www.datavare.com software product identified above which includes computer software and may include associated media printed materials or electronic documentation ("SOFTWARE PRODUCT"). With the instalment copying or using the Datavare Software and Services LLP PRODUCT indicates that you are agree to the terms of this AGREEMENT. In case you are not agree to the Agreement terms and conditions it is better to not to install or run the "www.datavare.com" SOFTWARE PRODUCTS; you may however return it to the right place (the seller) for getting a full refund.www.datavare.com PRODUCT LICENSE:The SOFTWARE PRODUCT is fully protected by copyright laws and international copyright treaties as well as other intellectual property laws and treaties. It is for licensed not for selling.Termination. Without prejudice to any other rights www.datavare.com may terminate this AGREEMENT if you fail to comply with the terms and conditions of this AGREEMENT. In such event you must destroy all copies of the SOFTWARE PRODUCT and all of its component parts.CHECK OUT OTHER RIGHTS AND LIMITATIONSClients cannot Resale Software. You might not resell or otherwise transfer for value the SOFTWARE PRODUCT.LICENSE - It is a Trial license that signifies you are permitted to use this trial version of "Datavare Software and Services LLP". Once the usage is over you can able to apply for getting the registration key that will eliminate the trial limitation and allow you to use a copy of "Datavare Software and Services LLP" on one computer. In case you wish to apply for multiple licenses it is must to get request for multiple registration keys where one for each user. www.datavare.com might also offer you with one key with multiple licenses.OWNERSHIP - This Software is copyrighted and owned by www.datavare.com. Your license confers no ownership or title in the Software. You can make a copy of this software solely for the purpose of back up. But License shall not modify copy duplicate reproduce license or sub license the Software or transfer or convey the Software or any right in the Software to anyone else without the prior written consent of Developer.LIMITED WARRANTY- www.datavare.com confirms that any type of implied warranty is concerned for only thirty (30) days. Warranty for the Software will perform substantially according to the user documentation for thirty (30) days from the day of receipt. CUSTOMER REMEDIES - In case the program fails to meet with www.datavare.com limited warranty a consumer can ask to refund the purchasing amount but it should be within 30 days of the shopping. This limited warranty is void if failure of the Software has resulted from abu
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: msgtopstdemo.exeStatic PE information: certificate valid
Source: msgtopstdemo.exeStatic file information: File size 2391528 > 1048576
Source: msgtopstdemo.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: _c:\Users\test\Desktop\datavare products\DEMO-Datavare-MsgToPst\MsgToPst\MsgToPst\obj\x86\Debug\MsgToPst.pdb source: msgtopstdemo.tmp, 00000001.00000003.2027572801.0000000004948000.00000004.00001000.00020000.00000000.sdmp, MsgToPst.exe, 00000005.00000000.2026456010.000000000076A000.00000002.00000001.01000000.0000000A.sdmp, is-4FDGP.tmp.1.dr, is-01BK0.tmp.1.dr
Source: Binary string: d:\Bjornar\SVN\istool\isxdl\trunk\source\Release\isxdl.pdb source: msgtopstdemo.tmp, 00000001.00000003.2027572801.0000000004987000.00000004.00001000.00020000.00000000.sdmp, isxdl.dll.1.dr
Source: Binary string: c:\Users\test\Desktop\datavare products\DEMO-Datavare-MsgToPst\MsgToPst\MsgToPst\obj\x86\Debug\MsgToPst.pdb source: msgtopstdemo.tmp, 00000001.00000003.2027572801.0000000004948000.00000004.00001000.00020000.00000000.sdmp, MsgToPst.exe, 00000005.00000000.2026456010.000000000076A000.00000002.00000001.01000000.0000000A.sdmp, is-4FDGP.tmp.1.dr, is-01BK0.tmp.1.dr
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004489CC LoadLibraryExA,LoadLibraryA,GetProcAddress,1_2_004489CC
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: 0_2_00406A18 push 00406A55h; ret 0_2_00406A4D
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: 0_2_004093B4 push 004093E7h; ret 0_2_004093DF
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: 0_2_00408580 push ecx; mov dword ptr [esp], eax0_2_00408585
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00409D9C push 00409DD9h; ret 1_2_00409DD1
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0041A078 push ecx; mov dword ptr [esp], ecx1_2_0041A07D
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00452100 push ecx; mov dword ptr [esp], eax1_2_00452105
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0040A273 push ds; ret 1_2_0040A29D
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004062C4 push ecx; mov dword ptr [esp], eax1_2_004062C5
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0040A29F push ds; ret 1_2_0040A2A0
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00460518 push ecx; mov dword ptr [esp], ecx1_2_0046051C
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00496594 push ecx; mov dword ptr [esp], ecx1_2_00496599
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004587B4 push 004587ECh; ret 1_2_004587E4
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00410930 push ecx; mov dword ptr [esp], edx1_2_00410935
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00486A94 push ecx; mov dword ptr [esp], ecx1_2_00486A99
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00478D50 push ecx; mov dword ptr [esp], edx1_2_00478D51
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00412D78 push 00412DDBh; ret 1_2_00412DD3
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0040D288 push ecx; mov dword ptr [esp], edx1_2_0040D28A
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0040F7E8 push ecx; mov dword ptr [esp], edx1_2_0040F7EA
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004438E0 push ecx; mov dword ptr [esp], ecx1_2_004438E4
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00459ACC push 00459B10h; ret 1_2_00459B08
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0049BD44 pushad ; retf 1_2_0049BD53
Source: C:\Users\user\Desktop\msgtopstdemo.exeFile created: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpFile created: C:\Users\user\AppData\Local\Temp\is-0CF57.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpFile created: C:\Users\user\AppData\Local\Temp\is-0CF57.tmp\isxdl.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpFile created: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\Aspose.Email.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpFile created: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpFile created: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\is-4FDGP.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpFile created: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\is-01BK0.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpFile created: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\is-4AED4.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpFile created: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\is-0L47Q.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpFile created: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Datavare MSG to PST Converter - Demo Version.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0042405C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_0042405C
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0042405C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_0042405C
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00422CAC SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_00422CAC
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0041811E IsIconic,SetWindowPos,1_2_0041811E
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00418120 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00418120
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004245E4 IsIconic,SetActiveWindow,1_2_004245E4
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0042462C IsIconic,SetActiveWindow,SetFocus,1_2_0042462C
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004187D4 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_004187D4
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00484D28 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_00484D28
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0042F71C IsIconic,GetWindowLongA,GetWindowLongA,GetActiveWindow,MessageBoxA,SetActiveWindow,GetActiveWindow,MessageBoxA,SetActiveWindow,1_2_0042F71C
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004179E8 IsIconic,GetCapture,1_2_004179E8
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0041F568 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F568
Source: C:\Users\user\Desktop\msgtopstdemo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeMemory allocated: DC0000 memory reserve | memory write watchJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeMemory allocated: 2B10000 memory reserve | memory write watchJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeMemory allocated: 4B10000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-0CF57.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-0CF57.tmp\isxdl.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpDropped PE file which has not been started: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\Aspose.Email.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpDropped PE file which has not been started: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpDropped PE file which has not been started: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\is-4AED4.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpDropped PE file which has not been started: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\is-0L47Q.tmpJump to dropped file
Source: C:\Users\user\Desktop\msgtopstdemo.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-6075
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00476120 FindFirstFileA,FindNextFileA,FindClose,1_2_00476120
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004531A4 FindFirstFileA,GetLastError,1_2_004531A4
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004648D0 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004648D0
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00464D4C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464D4C
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00463344 FindFirstFileA,FindNextFileA,FindClose,1_2_00463344
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0049998C FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_0049998C
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: 0_2_0040A018 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_0040A018
Source: msgtopstdemo.tmp, 00000001.00000002.2030670411.0000000000596000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_004489CC LoadLibraryExA,LoadLibraryA,GetProcAddress,1_2_004489CC
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0047974C ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_0047974C
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0042F254 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateMutexA,1_2_0042F254
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_0042E4EC AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E4EC
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: GetLocaleInfoA,0_2_0040565C
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: GetLocaleInfoA,0_2_004056A8
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: GetLocaleInfoA,1_2_004089B8
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: GetLocaleInfoA,1_2_00408A04
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\OFFSYMXL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00458DC4 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_00458DC4
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
Source: C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmpCode function: 1_2_00455D38 GetUserNameA,1_2_00455D38
Source: C:\Users\user\Desktop\msgtopstdemo.exeCode function: 0_2_00404654 GetModuleHandleA,GetVersion,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetProcessDEPPolicy,0_2_00404654
Source: C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
Registry Run Keys / Startup Folder
1
Exploitation for Privilege Escalation
2
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts2
Native API
1
DLL Side-Loading
1
Access Token Manipulation
1
Virtualization/Sandbox Evasion
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Process Injection
1
Disable or Modify Tools
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Registry Run Keys / Startup Folder
1
Access Token Manipulation
NTDS1
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
2
Process Injection
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Deobfuscate/Decode Files or Information
Cached Domain Credentials1
Account Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
Obfuscated Files or Information
DCSync3
System Owner/User Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc Filesystem2
File and Directory Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow26
System Information Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1525130 Sample: msgtopstdemo.exe Startdate: 03/10/2024 Architecture: WINDOWS Score: 5 6 msgtopstdemo.exe 2 2->6         started        file3 14 C:\Users\user\AppData\...\msgtopstdemo.tmp, PE32 6->14 dropped 9 msgtopstdemo.tmp 29 20 6->9         started        process4 file5 16 C:\Users\user\AppData\Local\...\isxdl.dll, PE32 9->16 dropped 18 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 9->18 dropped 20 C:\...\unins000.exe (copy), PE32 9->20 dropped 22 6 other files (none is malicious) 9->22 dropped 12 MsgToPst.exe 2 9->12         started        process6

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
msgtopstdemo.exe3%ReversingLabs
SourceDetectionScannerLabelLink
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\Aspose.Email.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exe (copy)0%ReversingLabs
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\is-01BK0.tmp0%ReversingLabs
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\is-0L47Q.tmp2%ReversingLabs
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\is-4AED4.tmp0%ReversingLabs
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\is-4FDGP.tmp0%ReversingLabs
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\unins000.exe (copy)2%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-0CF57.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-0CF57.tmp\isxdl.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp7%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.innosetup.com/0%URL Reputationsafe
http://www.fontbureau.com0%URL Reputationsafe
http://www.fontbureau.com/designersG0%URL Reputationsafe
http://www.fontbureau.com/designers/?0%URL Reputationsafe
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.fontbureau.com/designers?0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.fontbureau.com/designers0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
http://www.remobjects.com/psU0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.fontbureau.com/designers80%URL Reputationsafe
http://www.fonts.com0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.remobjects.com/ps0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.innosetup.com/msgtopstdemo.tmp, msgtopstdemo.tmp, 00000001.00000000.1700355107.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-0L47Q.tmp.1.dr, msgtopstdemo.tmp.0.drfalse
  • URL Reputation: safe
unknown
http://www.apache.org/licenses/LICENSE-2.0MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
    unknown
    http://www.fontbureau.comMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.fontbureau.com/designersGMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.fontbureau.com/designers/?MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.founder.com.cn/cn/bTheMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://certificates.godaddy.com/repository/0msgtopstdemo.exefalse
      unknown
      http://www.fontbureau.com/designers?MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUmsgtopstdemo.exefalse
        unknown
        http://certs.godaddy.com/repository/1301msgtopstdemo.exefalse
          unknown
          http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlinemsgtopstdemo.exefalse
            unknown
            http://www.tiro.comMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://crl.godaddy.com/gdig2s5-2.crl0msgtopstdemo.exefalse
              unknown
              http://www.datavare.com/msgtopstdemo.tmp, 00000001.00000003.1701151209.000000000215C000.00000004.00001000.00020000.00000000.sdmp, msgtopstdemo.tmp, 00000001.00000003.1701048720.0000000003130000.00000004.00001000.00020000.00000000.sdmpfalse
                unknown
                http://www.fontbureau.com/designersMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://certs.godaddy.com/repository/0msgtopstdemo.exefalse
                  unknown
                  http://www.goodfont.co.krMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://certificates.starfieldtech.com/repository/1604msgtopstdemo.exefalse
                    unknown
                    http://ocsp.starfieldtech.com/0Dmsgtopstdemo.exefalse
                      unknown
                      http://www.carterandcone.comlMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.godaddy.com/gdroot-g2.crl0Fmsgtopstdemo.exefalse
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/cTheMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-user.htmlMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://crl.starfieldtech.com/repository/0msgtopstdemo.exefalse
                          unknown
                          http://www.remobjects.com/psUmsgtopstdemo.exe, 00000000.00000003.1699783757.0000000002370000.00000004.00001000.00020000.00000000.sdmp, msgtopstdemo.exe, 00000000.00000003.1699586406.0000000002470000.00000004.00001000.00020000.00000000.sdmp, msgtopstdemo.tmp, 00000001.00000000.1700355107.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-0L47Q.tmp.1.dr, msgtopstdemo.tmp.0.drfalse
                          • URL Reputation: safe
                          unknown
                          http://ns.adoMsgToPst.exe, 00000005.00000002.2952651282.00000000012F0000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://www.jiyu-kobo.co.jp/MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8MsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.istool.org/isxdl.dll.1.drfalse
                              unknown
                              http://www.fonts.comMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sandoll.co.krMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://crl.starfieldtech.com/repository/sfsroot.crl0Pmsgtopstdemo.exefalse
                                unknown
                                http://www.remobjects.com/psmsgtopstdemo.exe, 00000000.00000003.1699783757.0000000002370000.00000004.00001000.00020000.00000000.sdmp, msgtopstdemo.exe, 00000000.00000003.1699586406.0000000002470000.00000004.00001000.00020000.00000000.sdmp, msgtopstdemo.tmp, msgtopstdemo.tmp, 00000001.00000000.1700355107.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-0L47Q.tmp.1.dr, msgtopstdemo.tmp.0.drfalse
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deDPleaseMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://certificates.godaddy.com/repository/gdig2.crt0msgtopstdemo.exefalse
                                  unknown
                                  http://www.datavare.com/Bmsgtopstdemo.tmp, 00000001.00000003.2029636409.0000000002168000.00000004.00001000.00020000.00000000.sdmp, msgtopstdemo.tmp, 00000001.00000003.1701151209.000000000215C000.00000004.00001000.00020000.00000000.sdmpfalse
                                    unknown
                                    http://www.sakkal.comMsgToPst.exe, 00000005.00000002.2954898074.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.datavare.com/contact-us.htmlmsgtopstdemo.tmp, 00000001.00000003.2027572801.0000000004948000.00000004.00001000.00020000.00000000.sdmp, MsgToPst.exe, 00000005.00000000.2026456010.000000000076A000.00000002.00000001.01000000.0000000A.sdmp, is-4FDGP.tmp.1.dr, is-01BK0.tmp.1.drfalse
                                      unknown
                                      No contacted IP infos
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1525130
                                      Start date and time:2024-10-03 18:21:14 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 6m 16s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:9
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:msgtopstdemo.exe
                                      Detection:CLEAN
                                      Classification:clean5.winEXE@5/14@0/0
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 94%
                                      • Number of executed functions: 193
                                      • Number of non-executed functions: 153
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • VT rate limit hit for: msgtopstdemo.exe
                                      No simulations
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):5050880
                                      Entropy (8bit):6.3876194256628755
                                      Encrypted:false
                                      SSDEEP:49152:YICZg+BaNccooZoE6qvw3RYUqTpWtGve8XrxJgo1dHLlx7:YVg+BSc3oZDqGUqTp3v
                                      MD5:C5F5518DD191ECFF9A02E2156A92557D
                                      SHA1:B3AF400B667AD046CE7A03F443905CACFC9BE45B
                                      SHA-256:DD1659341475958E1880AB344D84C019886ABBF402DAEDCC4104D88F6A01F6B5
                                      SHA-512:47C55D44A6F57805825BAB64FF27908F6255186D432A3B3452350D30CC961A604EA1BC009D46280E523B7941F8C0F603728644678DF22FCAB83E0830DEDFA90C
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....\.V...........!......M.........B'M.. ...@M...@.. ........................M.......N...@..................................&M.W....`M.$....................@M...................................................... ............... ..H............text...H.M.. ....M................. ..`.reloc.......@M.......M.............@..B.rsrc...$....`M.......M.............@..@................$'M.....H.........0..C...........O'.....x.0......................................0...........,..-.+.(./..+.(./..+.*..0..+..........-.&...-.&...-.&.(g....Y(h...+.&+.&+.&+.*..0.............-.&(....+.&+.*....0...........(i...u.....-.&.+..+.*...0....................-+&&&&&&...o. ......o. ....X.,.&.{....9....+.(....+..+....{....(j....,.&..-.&+9.+..+.....%.X.- &.{......{....Y.Z.?_c...X.-.&+.....+..+...2....Y.-.&.%{.....Y.-.&&.{.....>|...+.....+.}....+....o. .....o. .....o. ..*......=.6.~]
                                      Process:C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):1019
                                      Entropy (8bit):5.48634308035643
                                      Encrypted:false
                                      SSDEEP:24:3Yp/OWbdNmigXnCi7xzx+p51xWQD4vJvsvXr:3MrPEXnCip4p51xWL+Xr
                                      MD5:B2B97996B6AE49DB4D364D53225BDE0E
                                      SHA1:A04148AB5BAC7F74A08BF796BA321741292497AA
                                      SHA-256:CE71A6C5D871ADD5CC25DC96F485B3E7D5FC557B20881ACD77363B2E22968347
                                      SHA-512:A088277CD01AECDB247A18B9B70C1999A0E54D119419D10998C285EA1A66785F7974F861504EB6B518E78BAB4A5B052B3F0D2190BE7F3A8CE4C83F58DBFDACB4
                                      Malicious:false
                                      Reputation:low
                                      Preview:ba&32~(;,-710c|opn|~;0=1:709c|+*8sf|a`STb.7=;0-;`ST~~b.?*?`ST~~~~b.7=;0-;:.1`.18*?5;0bq.7=;0-;:.1`ST~~~~b.3?72.1`=10*?=*.-18*?5;0p=13bq.3?72.1`ST~~~~b.7=;0-;.'.;`.;(;21.;,~...bq.7=;0-;.'.;`ST~~~~b.7=;0-;.1*;`.737*;:~*1~o~:;(;21.;,r~+02737*;:~.6'-7=?2~21=?*710-bq.7=;0-;.1*;`ST~~~~b.,:;,..`oknlnfnfnlmjbq.,:;,..`ST~~~~b.-;,..`lgnlnlbq.-;,..`ST~~~~b...`.67-~7-~?~,;:7-*,7<+*?<2;~27=;0-;bq...`ST~~~~b.,1:+=*-`ST~~~~~~b.,1:+=*`.-.1-;p.3?72~81,~p...bq.,1:+=*`ST~~~~bq.,1:+=*-`ST~~~~b.:7*710.'.;`.0*;,.,7-;bq.:7*710.'.;`ST~~~~b.;,7?2.+3<;,`ok<<<llfs=hf;sj;m8sghomsji=kjjk=jkiibq.;,7?2.+3<;,`ST~~~~b.+<-=,7.*710.&.7,'`lnohnlnfbq.+<-=,7.*710.&.7,'`ST~~~~b.7=;0-;.;,-710`mpnbq.7=;0-;.;,-710`ST~~~~b.7=;0-;.0-*,+=*710-`6**.dqq)))p?-.1-;p=13q=1,.1,?*;q.+,=6?-;q27=;0-;s70-*,+=*710-p?-.&bq.7=;0-;.0-*,+=*710-`ST~~bq.?*?`ST~~b.790?*+,;`..=..-.,.=o$..q:..2f+.u..77u;,l2.,k..n,7..2...+u.7h......=).l9.l.56.$....5..i)7...?5..hmmf?.-...)n4.7.8..1....l..$lgg.f8$3q?/?1h..*.$.-)869(<.?17.g.(6$h..:??.l11.i'....6.9cbq.79
                                      Process:C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):1021952
                                      Entropy (8bit):2.9698644386804225
                                      Encrypted:false
                                      SSDEEP:12288:2j3HjlkA2Q52Wvf54rSHjlkA2Q52Wvf54ZhHjlkA2Q52Wvf5495BkHjlkA2Q52WO:2jQ7g5B
                                      MD5:5F741C35077C33000CF0638178E1F070
                                      SHA1:4C3CB86F34ED823FBFBEDF678DB36434817758ED
                                      SHA-256:547D072A543C0464542E146A95049A999E335E674C147D40878D87A6EA18E252
                                      SHA-512:266F70522DBB67522D104938981F3A35AAF7DC8681F456A032E9EA284E4252EE0D7A952750C1EE78BA9726193D28E5FA5DF2630C927B4373B45F7168F92F7486
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...*./Z................................. ... ....@.. ....................................@.................................l...O.... ..............................4................................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc..............................@..B........................H............>......%...XP..Y...........................................b..}.....(.......(......*&..(.....*..*..*..*.0..,.........,..{.......+.....-...{....o........(.....*.0............s....}.........(....s.......{....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....{....o......{....o......{....o......{....o......(......{.....o .....{........s!...o".....{....(#...o$.....{.....r...po%...t9...o&
                                      Process:C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):1021952
                                      Entropy (8bit):2.9698644386804225
                                      Encrypted:false
                                      SSDEEP:12288:2j3HjlkA2Q52Wvf54rSHjlkA2Q52Wvf54ZhHjlkA2Q52Wvf5495BkHjlkA2Q52WO:2jQ7g5B
                                      MD5:5F741C35077C33000CF0638178E1F070
                                      SHA1:4C3CB86F34ED823FBFBEDF678DB36434817758ED
                                      SHA-256:547D072A543C0464542E146A95049A999E335E674C147D40878D87A6EA18E252
                                      SHA-512:266F70522DBB67522D104938981F3A35AAF7DC8681F456A032E9EA284E4252EE0D7A952750C1EE78BA9726193D28E5FA5DF2630C927B4373B45F7168F92F7486
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...*./Z................................. ... ....@.. ....................................@.................................l...O.... ..............................4................................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc..............................@..B........................H............>......%...XP..Y...........................................b..}.....(.......(......*&..(.....*..*..*..*.0..,.........,..{.......+.....-...{....o........(.....*.0............s....}.........(....s.......{....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....{....o......{....o......{....o......{....o......(......{.....o .....{........s!...o".....{....(#...o$.....{.....r...po%...t9...o&
                                      Process:C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):956069
                                      Entropy (8bit):5.923382701372054
                                      Encrypted:false
                                      SSDEEP:24576:5McMoi3rPR37dzHRA6G7WbuSEmK50Lyx9M3:5MrPR37dzHRA6GCbB80O8
                                      MD5:52414630A8FA97F12AF0F6402915576D
                                      SHA1:22C9F8629B2A2202DA0C5633C7488C10F0CDFA97
                                      SHA-256:BF8B71C38FA5E2B550A886858C9D23E88C1D2E1B0E5D1DC084032CF640A6F308
                                      SHA-512:32A1661AFF26EFFD7386C0DA39B6753F93AD9631F4F3DD7FD82EEC0710A5B155217492BC9DF25BBE476EEF2A007B3E06EDF5E528E2F7D7542082CE9108AD885E
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 2%
                                      Reputation:low
                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..........................p............@......@...............................&...........................@...............................0......................................................CODE............................... ..`DATA.... ...........................@...BSS......................................idata...&.......(..................@....tls......... ...........................rdata.......0......................@..P.reloc..P....@......................@..P.rsrc...............................@..P.....................r..............@..P........................................................................................................................................
                                      Process:C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):5050880
                                      Entropy (8bit):6.3876194256628755
                                      Encrypted:false
                                      SSDEEP:49152:YICZg+BaNccooZoE6qvw3RYUqTpWtGve8XrxJgo1dHLlx7:YVg+BSc3oZDqGUqTp3v
                                      MD5:C5F5518DD191ECFF9A02E2156A92557D
                                      SHA1:B3AF400B667AD046CE7A03F443905CACFC9BE45B
                                      SHA-256:DD1659341475958E1880AB344D84C019886ABBF402DAEDCC4104D88F6A01F6B5
                                      SHA-512:47C55D44A6F57805825BAB64FF27908F6255186D432A3B3452350D30CC961A604EA1BC009D46280E523B7941F8C0F603728644678DF22FCAB83E0830DEDFA90C
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....\.V...........!......M.........B'M.. ...@M...@.. ........................M.......N...@..................................&M.W....`M.$....................@M...................................................... ............... ..H............text...H.M.. ....M................. ..`.reloc.......@M.......M.............@..B.rsrc...$....`M.......M.............@..@................$'M.....H.........0..C...........O'.....x.0......................................0...........,..-.+.(./..+.(./..+.*..0..+..........-.&...-.&...-.&.(g....Y(h...+.&+.&+.&+.*..0.............-.&(....+.&+.*....0...........(i...u.....-.&.+..+.*...0....................-+&&&&&&...o. ......o. ....X.,.&.{....9....+.(....+..+....{....(j....,.&..-.&+9.+..+.....%.X.- &.{......{....Y.Z.?_c...X.-.&+.....+..+...2....Y.-.&.%{.....Y.-.&&.{.....>|...+.....+.}....+....o. .....o. .....o. ..*......=.6.~]
                                      Process:C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):1021952
                                      Entropy (8bit):2.9698644386804225
                                      Encrypted:false
                                      SSDEEP:12288:2j3HjlkA2Q52Wvf54rSHjlkA2Q52Wvf54ZhHjlkA2Q52Wvf5495BkHjlkA2Q52WO:2jQ7g5B
                                      MD5:5F741C35077C33000CF0638178E1F070
                                      SHA1:4C3CB86F34ED823FBFBEDF678DB36434817758ED
                                      SHA-256:547D072A543C0464542E146A95049A999E335E674C147D40878D87A6EA18E252
                                      SHA-512:266F70522DBB67522D104938981F3A35AAF7DC8681F456A032E9EA284E4252EE0D7A952750C1EE78BA9726193D28E5FA5DF2630C927B4373B45F7168F92F7486
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...*./Z................................. ... ....@.. ....................................@.................................l...O.... ..............................4................................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc..............................@..B........................H............>......%...XP..Y...........................................b..}.....(.......(......*&..(.....*..*..*..*.0..,.........,..{.......+.....-...{....o........(.....*.0............s....}.........(....s.......{....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....{....o......{....o......{....o......{....o......(......{.....o .....{........s!...o".....{....(#...o$.....{.....r...po%...t9...o&
                                      Process:C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):1019
                                      Entropy (8bit):5.48634308035643
                                      Encrypted:false
                                      SSDEEP:24:3Yp/OWbdNmigXnCi7xzx+p51xWQD4vJvsvXr:3MrPEXnCip4p51xWL+Xr
                                      MD5:B2B97996B6AE49DB4D364D53225BDE0E
                                      SHA1:A04148AB5BAC7F74A08BF796BA321741292497AA
                                      SHA-256:CE71A6C5D871ADD5CC25DC96F485B3E7D5FC557B20881ACD77363B2E22968347
                                      SHA-512:A088277CD01AECDB247A18B9B70C1999A0E54D119419D10998C285EA1A66785F7974F861504EB6B518E78BAB4A5B052B3F0D2190BE7F3A8CE4C83F58DBFDACB4
                                      Malicious:false
                                      Reputation:low
                                      Preview:ba&32~(;,-710c|opn|~;0=1:709c|+*8sf|a`STb.7=;0-;`ST~~b.?*?`ST~~~~b.7=;0-;:.1`.18*?5;0bq.7=;0-;:.1`ST~~~~b.3?72.1`=10*?=*.-18*?5;0p=13bq.3?72.1`ST~~~~b.7=;0-;.'.;`.;(;21.;,~...bq.7=;0-;.'.;`ST~~~~b.7=;0-;.1*;`.737*;:~*1~o~:;(;21.;,r~+02737*;:~.6'-7=?2~21=?*710-bq.7=;0-;.1*;`ST~~~~b.,:;,..`oknlnfnfnlmjbq.,:;,..`ST~~~~b.-;,..`lgnlnlbq.-;,..`ST~~~~b...`.67-~7-~?~,;:7-*,7<+*?<2;~27=;0-;bq...`ST~~~~b.,1:+=*-`ST~~~~~~b.,1:+=*`.-.1-;p.3?72~81,~p...bq.,1:+=*`ST~~~~bq.,1:+=*-`ST~~~~b.:7*710.'.;`.0*;,.,7-;bq.:7*710.'.;`ST~~~~b.;,7?2.+3<;,`ok<<<llfs=hf;sj;m8sghomsji=kjjk=jkiibq.;,7?2.+3<;,`ST~~~~b.+<-=,7.*710.&.7,'`lnohnlnfbq.+<-=,7.*710.&.7,'`ST~~~~b.7=;0-;.;,-710`mpnbq.7=;0-;.;,-710`ST~~~~b.7=;0-;.0-*,+=*710-`6**.dqq)))p?-.1-;p=13q=1,.1,?*;q.+,=6?-;q27=;0-;s70-*,+=*710-p?-.&bq.7=;0-;.0-*,+=*710-`ST~~bq.?*?`ST~~b.790?*+,;`..=..-.,.=o$..q:..2f+.u..77u;,l2.,k..n,7..2...+u.7h......=).l9.l.56.$....5..i)7...?5..hmmf?.-...)n4.7.8..1....l..$lgg.f8$3q?/?1h..*.$.-)869(<.?17.g.(6$h..:??.l11.i'....6.9cbq.79
                                      Process:C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
                                      File Type:InnoSetup Log Datavare MSG to PST Converter - Demo Version {B704DD12-0FC2-4CCC-A183-86D06E9674A6}, version 0x30, 19133 bytes, 216554\user, "C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version"
                                      Category:dropped
                                      Size (bytes):19133
                                      Entropy (8bit):4.569440798598775
                                      Encrypted:false
                                      SSDEEP:384:F6j51FRESZE8DypfbzrL1rRkx129kTGfnrutQ:FP8MfrLzkx129lqtQ
                                      MD5:786D190AA981F1EDB691F798C8C91143
                                      SHA1:7CCC3EFF1402CA8766C46FAD9721D9BA6B4C62FC
                                      SHA-256:55AAC1D0D1E430338F0229CBEC211A0AEFC225ABC61B92FB133599CC2A5BA2CA
                                      SHA-512:7F863E61CB1392C907563AA06F55EDB248CDE1C4BA87A411520D2F764284D4C7D902753F03F4FE8FAC36DDF562F0D51F9FFCC5D8718D51A1799B3F25E099358C
                                      Malicious:false
                                      Preview:Inno Setup Uninstall Log (b)....................................{B704DD12-0FC2-4CCC-A183-86D06E9674A6}..........................................................................................Datavare MSG to PST Converter - Demo Version....................................................................................0........J..%...............................................................................................................".5............S......c....216554.userCC:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version.............#.... ......E....=IFPS........A....................................................................................................BOOLEAN....................................................TOUTPUTPROGRESSWIZARDPAGE....TOUTPUTPROGRESSWIZARDPAGE.......................!OPENARRAYOFSTRING..................................................................................!MAIN....-1..(...dll:files:isxdl.dll.isxdl_AddFile.........-...dll:fi
                                      Process:C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):956069
                                      Entropy (8bit):5.923382701372054
                                      Encrypted:false
                                      SSDEEP:24576:5McMoi3rPR37dzHRA6G7WbuSEmK50Lyx9M3:5MrPR37dzHRA6GCbB80O8
                                      MD5:52414630A8FA97F12AF0F6402915576D
                                      SHA1:22C9F8629B2A2202DA0C5633C7488C10F0CDFA97
                                      SHA-256:BF8B71C38FA5E2B550A886858C9D23E88C1D2E1B0E5D1DC084032CF640A6F308
                                      SHA-512:32A1661AFF26EFFD7386C0DA39B6753F93AD9631F4F3DD7FD82EEC0710A5B155217492BC9DF25BBE476EEF2A007B3E06EDF5E528E2F7D7542082CE9108AD885E
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 2%
                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..........................p............@......@...............................&...........................@...............................0......................................................CODE............................... ..`DATA.... ...........................@...BSS......................................idata...&.......(..................@....tls......... ...........................rdata.......0......................@..P.reloc..P....@......................@..P.rsrc...............................@..P.....................r..............@..P........................................................................................................................................
                                      Process:C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Oct 3 15:22:35 2024, mtime=Thu Oct 3 15:22:35 2024, atime=Tue Dec 12 18:28:02 2017, length=1021952, window=hide
                                      Category:dropped
                                      Size (bytes):1344
                                      Entropy (8bit):4.541777816414468
                                      Encrypted:false
                                      SSDEEP:24:8mONZAEJdOEJHAG5yNXWJEVuyA9xadS5yNNcVCdS5yNKUUF/qyFm:8mcVJdOwAGWG6m9xadSWOCdSWrfyF
                                      MD5:348597AC50A89FBACB8A494884A0E6C7
                                      SHA1:D834756538D599EBE9A3F7F060B973938D04996B
                                      SHA-256:EB4BC2B7231B77C2989DA096C4DD3221DB077D736DF737C505D9175463CEC996
                                      SHA-512:8891A2504CB99D149334B0D2ACECEB2CE3BCE708F96CC2B9FEE403FDBCA5CDB52FD10EB6CCE524E544FD67F9A1B2EAC827992E39C6071C124186CC6394B9EB89
                                      Malicious:false
                                      Preview:L..................F.... ....Z.t.......t......US.s...............................P.O. .:i.....+00.../C:\.....................1.....CY...PROGRA~2.........O.ICY.....................V......8k.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.......1.....CY...DATAVA~1.........CY.CY..............................D.a.t.a.v.a.r.e. .M.S.G. .t.o. .P.S.T. .C.o.n.v.e.r.t.e.r. .-. .D.e.m.o. .V.e.r.s.i.o.n.....f.2......K.. .MsgToPst.exe..J......CY.CY.....i.........................M.s.g.T.o.P.s.t...e.x.e.......................-.......~.............mU.....C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exe..\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.D.a.t.a.v.a.r.e. .M.S.G. .t.o. .P.S.T. .C.o.n.v.e.r.t.e.r. .-. .D.e.m.o. .V.e.r.s.i.o.n.\.M.s.g.T.o.P.s.t...e.x.e.C.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.D.a.t.a.v.a.r.e. .M.S.G. .t.o. .P.S.T. .C.o.n.v.e.r.t.e.r. .-. .D.e.m.o. .V.e.r.s.i.o.n.........*.
                                      Process:C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                      Category:dropped
                                      Size (bytes):6144
                                      Entropy (8bit):4.720366600008286
                                      Encrypted:false
                                      SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                      MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                      SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                      SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                      SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):124416
                                      Entropy (8bit):6.209017847933318
                                      Encrypted:false
                                      SSDEEP:1536:dohlISko4eZHOMazWpdYoEWSekaDnXUq5o5dInL:dkIM4ehDaqEpMXUq5o5dIL
                                      MD5:48AD1A1C893CE7BF456277A0A085ED01
                                      SHA1:803997EF17EEDF50969115C529A2BF8DE585DC91
                                      SHA-256:B0CC4697B2FD1B4163FDDCA2050FC62A9E7D221864F1BD11E739144C90B685B3
                                      SHA-512:7C9E7FE9F00C62CCCB5921CB55BA0DD96A0077AD52962473C1E79CDA1FD9AA101129637043955703121443E1F8B6B2860CD4DFDB71052B20A322E05DEED101A4
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................................;......;..........u...............................Rich....................PE..L....>.I...........!.....F...................`............................... .......)......................................|...d........-...........................b..................................@............`..4............................text....D.......F.................. ..`.rdata...<...`...>...J..............@..@.data...............................@....rsrc....-..........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\msgtopstdemo.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):944640
                                      Entropy (8bit):5.90600045027503
                                      Encrypted:false
                                      SSDEEP:24576:hMcMoi3rPR37dzHRA6G7WbuSEmK50Lyx9Ms:hMrPR37dzHRA6GCbB80OB
                                      MD5:03B1E8078CAE9C05B81C8B8FE2A11840
                                      SHA1:0780EAB7701BC74614159DC703DB72283F95C91B
                                      SHA-256:3AAE4693EA36C39A5330BF720877868D5868E7775D963FC6A64B3C69ADABEC35
                                      SHA-512:9E0D5B9F5E626ACD4747B58F4ABFB0A6221314C6ECC1B6FFA0788814D3BFB093B4256E05DA76D7B908284EBA189F76BEC54EC571693DA868575ED61A6C7C13D3
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 7%
                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..........................p............@......@...............................&...........................@...............................0......................................................CODE............................... ..`DATA.... ...........................@...BSS......................................idata...&.......(..................@....tls......... ...........................rdata.......0......................@..P.reloc..P....@......................@..P.rsrc...............................@..P.....................r..............@..P........................................................................................................................................
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):7.785776184585562
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 98.86%
                                      • Inno Setup installer (109748/4) 1.08%
                                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      File name:msgtopstdemo.exe
                                      File size:2'391'528 bytes
                                      MD5:fa7fccb539f58ea32e2a92a0a32af286
                                      SHA1:1ba6a04fe2d9ebf47d97f2c6b295c33ad5803a3e
                                      SHA256:ee8fc4c0c9cb55699ef0bf026d5af42e7bb82d535ac8d84c8480569040f27257
                                      SHA512:5d609ddfd936a66705a0c347d1c1c89a2fedf37a51104430c2fad5200bb9eddc919d2d076bc9d8f634fbc436ff0609da8f28e95ddf87a60813b54b9b67851377
                                      SSDEEP:49152:7475ldTxlFmUF4cjZzBDs6vDuC5q9yZ4w60/z0+AOl:E5DFnFLHskuC5Qyqw60/zl
                                      TLSH:1CB523979775537BC442D97022C0B3C2C53DBED8342E8DBF2C489628EB6B654593CAB2
                                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                      Icon Hash:7968cc8cc4e66060
                                      Entrypoint:0x40aa98
                                      Entrypoint Section:CODE
                                      Digitally signed:true
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:1
                                      OS Version Minor:0
                                      File Version Major:1
                                      File Version Minor:0
                                      Subsystem Version Major:1
                                      Subsystem Version Minor:0
                                      Import Hash:2fb819a19fe4dee5c03e8c6a79342f79
                                      Signature Valid:true
                                      Signature Issuer:CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
                                      Signature Validation Error:The operation completed successfully
                                      Error Number:0
                                      Not Before, Not After
                                      • 30/12/2016 17:13:00 24/12/2017 09:51:38
                                      Subject Chain
                                      • CN=DATAVARE SOFTWARE AND SERVICES LLP, O=DATAVARE SOFTWARE AND SERVICES LLP, L=New Delhi, S=Delhi, C=IN
                                      Version:3
                                      Thumbprint MD5:EA7307FD7B68D3802EE07F6DBEBEF440
                                      Thumbprint SHA-1:14E33129E5177106A28E90CBF15B2E3310B80D2E
                                      Thumbprint SHA-256:F7B7E942FD0EA2AFAC0734A45B023C321807B3AF621BC529EC5E361F46644375
                                      Serial:00A1ABBFC64605A0FE
                                      Instruction
                                      push ebp
                                      mov ebp, esp
                                      add esp, FFFFFFC4h
                                      push ebx
                                      push esi
                                      push edi
                                      xor eax, eax
                                      mov dword ptr [ebp-10h], eax
                                      mov dword ptr [ebp-24h], eax
                                      call 00007F12A9296523h
                                      call 00007F12A929772Ah
                                      call 00007F12A9297A91h
                                      call 00007F12A9297EACh
                                      call 00007F12A9299E4Bh
                                      call 00007F12A929C7E2h
                                      call 00007F12A929C949h
                                      xor eax, eax
                                      push ebp
                                      push 0040B169h
                                      push dword ptr fs:[eax]
                                      mov dword ptr fs:[eax], esp
                                      xor edx, edx
                                      push ebp
                                      push 0040B132h
                                      push dword ptr fs:[edx]
                                      mov dword ptr fs:[edx], esp
                                      mov eax, dword ptr [0040D014h]
                                      call 00007F12A929D41Bh
                                      call 00007F12A929D006h
                                      cmp byte ptr [0040C234h], 00000000h
                                      je 00007F12A929DEFEh
                                      call 00007F12A929D518h
                                      xor eax, eax
                                      call 00007F12A9297219h
                                      lea edx, dword ptr [ebp-10h]
                                      xor eax, eax
                                      call 00007F12A929A45Bh
                                      mov edx, dword ptr [ebp-10h]
                                      mov eax, 0040DE30h
                                      call 00007F12A92965BAh
                                      push 00000002h
                                      push 00000000h
                                      push 00000001h
                                      mov ecx, dword ptr [0040DE30h]
                                      mov dl, 01h
                                      mov eax, 00407808h
                                      call 00007F12A929AD16h
                                      mov dword ptr [0040DE34h], eax
                                      xor edx, edx
                                      push ebp
                                      push 0040B0EAh
                                      push dword ptr fs:[edx]
                                      mov dword ptr fs:[edx], esp
                                      call 00007F12A929D476h
                                      mov dword ptr [0040DE3Ch], eax
                                      mov eax, dword ptr [0040DE3Ch]
                                      cmp dword ptr [eax+0Ch], 00000000h
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xe0000x97c.idata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x3b0c8.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x2469000x14e8
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x0.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x100000x18.rdata
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      CODE0x10000xa1d00xa200b7ea439d9c6d5ec722056c9243fb3054False0.6025028935185185data6.643749028594943IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      DATA0xc0000x2500x4009b2268ed5360951559d8041925d025fbFalse0.3037109375data2.740124513017086IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      BSS0xd0000xe940x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .idata0xe0000x97c0xa00df5f31e62e05c787fd29eed7071bf556False0.41796875data4.486076246232586IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .tls0xf0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rdata0x100000x180x20014dfa4128117e7f94fe2f8d7dea374a0False0.05078125data0.190488766434666IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                      .reloc0x110000x91c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                      .rsrc0x120000x3b0c80x3b200c3dfc42115bda19f0c60b634bb04f1e4False0.0616906712473573data2.5080689992363787IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x122c40x39808Device independent bitmap graphic, 256 x 446 x 32, image size 228352EnglishUnited States0.05279202472742094
                                      RT_STRING0x4bacc0x2f2data0.35543766578249336
                                      RT_STRING0x4bdc00x30cdata0.3871794871794872
                                      RT_STRING0x4c0cc0x2cedata0.42618384401114207
                                      RT_STRING0x4c39c0x68data0.75
                                      RT_STRING0x4c4040xb4data0.6277777777777778
                                      RT_STRING0x4c4b80xaedata0.5344827586206896
                                      RT_RCDATA0x4c5680x2cdata1.2045454545454546
                                      RT_GROUP_ICON0x4c5940x14dataEnglishUnited States1.2
                                      RT_VERSION0x4c5a80x4f4dataEnglishUnited States0.2870662460567823
                                      RT_MANIFEST0x4ca9c0x62cXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4240506329113924
                                      DLLImport
                                      kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                      user32.dllMessageBoxA
                                      oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                      advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                      kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetVersion, GetUserDefaultLangID, GetSystemInfo, GetSystemDirectoryA, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                      user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                      comctl32.dllInitCommonControls
                                      advapi32.dllAdjustTokenPrivileges
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      No network behavior found

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:12:22:07
                                      Start date:03/10/2024
                                      Path:C:\Users\user\Desktop\msgtopstdemo.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\msgtopstdemo.exe"
                                      Imagebase:0x400000
                                      File size:2'391'528 bytes
                                      MD5 hash:FA7FCCB539F58EA32E2A92A0A32AF286
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:12:22:08
                                      Start date:03/10/2024
                                      Path:C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp" /SL5="$20450,2062666,288768,C:\Users\user\Desktop\msgtopstdemo.exe"
                                      Imagebase:0x400000
                                      File size:944'640 bytes
                                      MD5 hash:03B1E8078CAE9C05B81C8B8FE2A11840
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Antivirus matches:
                                      • Detection: 7%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:5
                                      Start time:12:22:40
                                      Start date:03/10/2024
                                      Path:C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exe"
                                      Imagebase:0x6b0000
                                      File size:1'021'952 bytes
                                      MD5 hash:5F741C35077C33000CF0638178E1F070
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:24.1%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:7.9%
                                        Total number of Nodes:1541
                                        Total number of Limit Nodes:24
                                        execution_graph 4982 407a40 SetFilePointer 4983 407a73 4982->4983 4984 407a63 GetLastError 4982->4984 4984->4983 4985 407a6c 4984->4985 4987 407908 GetLastError 4985->4987 4990 407868 4987->4990 4999 407700 FormatMessageA 4990->4999 4993 4078b0 5006 405ce0 4993->5006 4996 4078bf 5010 403198 4996->5010 5000 407726 4999->5000 5014 403278 5000->5014 5003 4055e4 5106 4055f8 5003->5106 5007 405ce7 5006->5007 5008 4031e8 18 API calls 5007->5008 5009 405cff 5008->5009 5009->4996 5011 4031b7 5010->5011 5012 40319e 5010->5012 5011->4983 5012->5011 5234 4025ac 5012->5234 5019 403254 5014->5019 5016 403288 5017 403198 4 API calls 5016->5017 5018 4032a0 5017->5018 5018->4993 5018->5003 5020 403274 5019->5020 5021 403258 5019->5021 5020->5016 5024 402594 5021->5024 5023 403261 5023->5016 5025 402598 5024->5025 5027 4025a2 5024->5027 5030 401fd4 5025->5030 5026 40259e 5026->5027 5041 403154 5026->5041 5027->5023 5027->5027 5031 401fe8 5030->5031 5032 401fed 5030->5032 5049 401918 RtlInitializeCriticalSection 5031->5049 5034 402012 RtlEnterCriticalSection 5032->5034 5035 40201c 5032->5035 5038 401ff1 5032->5038 5034->5035 5035->5038 5056 401ee0 5035->5056 5038->5026 5039 402147 5039->5026 5040 40213d RtlLeaveCriticalSection 5040->5039 5042 403164 5041->5042 5043 40318c TlsGetValue 5041->5043 5042->5027 5044 403196 5043->5044 5045 40316f 5043->5045 5044->5027 5101 40310c 5045->5101 5047 403174 TlsGetValue 5048 403184 5047->5048 5048->5027 5050 40193c RtlEnterCriticalSection 5049->5050 5051 401946 5049->5051 5050->5051 5052 401964 LocalAlloc 5051->5052 5053 40197e 5052->5053 5054 4019c3 RtlLeaveCriticalSection 5053->5054 5055 4019cd 5053->5055 5054->5055 5055->5032 5057 401ef0 5056->5057 5058 401f1c 5057->5058 5061 401f40 5057->5061 5062 401e58 5057->5062 5058->5061 5067 401d00 5058->5067 5061->5039 5061->5040 5071 4016d8 5062->5071 5065 401e75 5065->5057 5068 401d4e 5067->5068 5069 401d1e 5067->5069 5068->5069 5088 401c68 5068->5088 5069->5061 5072 4016f4 5071->5072 5073 401430 LocalAlloc VirtualAlloc VirtualFree 5072->5073 5074 4016fe 5072->5074 5076 40175b 5072->5076 5077 40132c LocalAlloc 5072->5077 5079 40174f 5072->5079 5073->5072 5075 4015c4 VirtualAlloc 5074->5075 5078 40170a 5075->5078 5076->5065 5081 401dcc 5076->5081 5077->5072 5078->5076 5080 40150c VirtualFree 5079->5080 5080->5076 5082 401d80 9 API calls 5081->5082 5083 401de0 5082->5083 5084 40132c LocalAlloc 5083->5084 5085 401df0 5084->5085 5086 401b44 9 API calls 5085->5086 5087 401df8 5085->5087 5086->5087 5087->5065 5089 401c7a 5088->5089 5090 401c9d 5089->5090 5091 401caf 5089->5091 5092 40188c LocalAlloc VirtualFree VirtualFree 5090->5092 5093 40188c LocalAlloc VirtualFree VirtualFree 5091->5093 5094 401cad 5092->5094 5093->5094 5095 401cc5 5094->5095 5096 401b44 9 API calls 5094->5096 5095->5069 5097 401cd4 5096->5097 5098 401cee 5097->5098 5099 401b98 9 API calls 5097->5099 5100 4013a0 LocalAlloc 5098->5100 5099->5098 5100->5095 5102 403120 LocalAlloc 5101->5102 5103 403116 5101->5103 5104 403132 5102->5104 5105 40313e TlsSetValue 5102->5105 5103->5102 5104->5047 5105->5104 5107 405615 5106->5107 5114 4052a8 5107->5114 5110 405641 5112 403278 18 API calls 5110->5112 5113 4055f3 5112->5113 5113->4993 5117 4052c3 5114->5117 5115 4052d5 5115->5110 5119 405034 5115->5119 5117->5115 5122 4053ca 5117->5122 5129 40529c 5117->5129 5226 405d90 5119->5226 5121 405045 5121->5110 5123 4053db 5122->5123 5126 405429 5122->5126 5125 4054af 5123->5125 5123->5126 5128 405447 5125->5128 5136 405288 5125->5136 5126->5128 5132 405244 5126->5132 5128->5117 5128->5128 5130 403198 4 API calls 5129->5130 5131 4052a6 5130->5131 5131->5117 5133 405252 5132->5133 5139 40504c 5133->5139 5135 405280 5135->5126 5165 4039a4 5136->5165 5142 405e00 5139->5142 5141 405065 5141->5135 5143 405e0e 5142->5143 5152 40512c LoadStringA 5143->5152 5146 4055e4 33 API calls 5147 405e46 5146->5147 5155 4031e8 5147->5155 5153 403278 18 API calls 5152->5153 5154 405159 5153->5154 5154->5146 5156 4031ec 5155->5156 5159 4031fc 5155->5159 5158 403254 18 API calls 5156->5158 5156->5159 5157 403228 5161 4031b8 5157->5161 5158->5159 5159->5157 5160 4025ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5159->5160 5160->5157 5163 4031be 5161->5163 5162 4031e3 5162->5141 5163->5162 5164 4025ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5163->5164 5164->5163 5166 4039ab 5165->5166 5171 4038b4 5166->5171 5168 4039cb 5169 403198 4 API calls 5168->5169 5170 4039d2 5169->5170 5170->5128 5172 4038d5 5171->5172 5173 4038c8 5171->5173 5174 403934 5172->5174 5175 4038db 5172->5175 5199 403780 5173->5199 5179 403993 5174->5179 5180 40393b 5174->5180 5177 4038e1 5175->5177 5178 4038ee 5175->5178 5206 403894 5177->5206 5185 403894 6 API calls 5178->5185 5186 4037f4 3 API calls 5179->5186 5181 403941 5180->5181 5182 40394b 5180->5182 5221 403864 5181->5221 5188 4037f4 3 API calls 5182->5188 5183 4038d0 5183->5168 5189 4038fc 5185->5189 5186->5183 5190 40395d 5188->5190 5211 4037f4 5189->5211 5192 403864 23 API calls 5190->5192 5194 403976 5192->5194 5193 403917 5217 40374c 5193->5217 5196 40374c VariantClear 5194->5196 5198 40398b 5196->5198 5197 40392c 5197->5168 5198->5168 5200 4037f0 5199->5200 5201 403744 5199->5201 5200->5183 5201->5199 5202 403793 VariantClear 5201->5202 5203 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5201->5203 5204 4037dc VariantCopyInd 5201->5204 5205 4037ab 5201->5205 5202->5201 5203->5201 5204->5200 5204->5201 5205->5183 5207 4036b8 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5206->5207 5208 4038a0 5207->5208 5209 40374c VariantClear 5208->5209 5210 4038a9 5209->5210 5210->5183 5212 403845 VariantChangeTypeEx 5211->5212 5213 40380a VariantChangeTypeEx 5211->5213 5216 403832 5212->5216 5214 403826 5213->5214 5215 40374c VariantClear 5214->5215 5215->5216 5216->5193 5218 403766 5217->5218 5219 403759 5217->5219 5218->5197 5219->5218 5220 403779 VariantClear 5219->5220 5220->5197 5222 40369c 22 API calls 5221->5222 5223 40387b 5222->5223 5224 40374c VariantClear 5223->5224 5225 403882 5224->5225 5225->5183 5227 405d9c 5226->5227 5228 40512c 19 API calls 5227->5228 5229 405dc2 5228->5229 5230 4031e8 18 API calls 5229->5230 5231 405dcd 5230->5231 5232 403198 4 API calls 5231->5232 5233 405de2 5232->5233 5233->5121 5235 4025ba 5234->5235 5237 4025b0 5234->5237 5235->5011 5236 402632 5236->5236 5237->5235 5237->5236 5238 403154 4 API calls 5237->5238 5238->5236 6683 40af42 6684 40af72 6683->6684 6685 40af7c CreateWindowExA SetWindowLongA 6684->6685 6686 4055e4 33 API calls 6685->6686 6687 40afff 6686->6687 6688 4032fc 18 API calls 6687->6688 6689 40b00d 6688->6689 6690 4032fc 18 API calls 6689->6690 6691 40b01a 6690->6691 6692 406fcc 19 API calls 6691->6692 6693 40b026 6692->6693 6694 4032fc 18 API calls 6693->6694 6695 40b02f 6694->6695 6696 409e8c 43 API calls 6695->6696 6697 40b041 6696->6697 6698 409d6c 19 API calls 6697->6698 6699 40b054 6697->6699 6698->6699 6700 40b08d 6699->6700 6702 409978 9 API calls 6699->6702 6701 40b0a6 6700->6701 6705 40b0a0 RemoveDirectoryA 6700->6705 6703 40b0ba 6701->6703 6704 40b0af DestroyWindow 6701->6704 6702->6700 6706 40b0e2 6703->6706 6707 40357c 4 API calls 6703->6707 6704->6703 6705->6701 6708 40b0d8 6707->6708 6709 4025ac 4 API calls 6708->6709 6709->6706 5358 407b44 WriteFile 5359 407b64 5358->5359 5360 407b6b 5358->5360 5361 407908 35 API calls 5359->5361 5362 407b7c 5360->5362 5363 407868 34 API calls 5360->5363 5361->5360 5363->5362 6710 402b48 RaiseException 6711 40294a 6712 402952 6711->6712 6713 403554 4 API calls 6712->6713 6714 402967 6712->6714 6713->6712 6715 403f4a 6716 403f53 6715->6716 6717 403f5c 6715->6717 6718 403f07 4 API calls 6716->6718 6718->6717 5239 408450 5240 408462 5239->5240 5242 408469 5239->5242 5250 40838c 5240->5250 5243 408491 5242->5243 5244 408493 5242->5244 5248 40849d 5242->5248 5264 4082a8 5243->5264 5261 4081f8 5244->5261 5245 4084ca 5247 4081f8 33 API calls 5247->5245 5248->5245 5248->5247 5251 4083a1 5250->5251 5252 4081f8 33 API calls 5251->5252 5253 4083b0 5251->5253 5252->5253 5254 4083ea 5253->5254 5255 4081f8 33 API calls 5253->5255 5256 4083fe 5254->5256 5257 4081f8 33 API calls 5254->5257 5255->5254 5260 40842a 5256->5260 5271 408334 5256->5271 5257->5256 5260->5242 5274 405d14 5261->5274 5263 40821a 5263->5248 5265 4055e4 33 API calls 5264->5265 5266 4082d3 5265->5266 5282 408260 5266->5282 5268 4082db 5269 403198 4 API calls 5268->5269 5270 4082f0 5269->5270 5270->5248 5272 408343 VirtualFree 5271->5272 5273 408355 VirtualAlloc 5271->5273 5272->5273 5273->5260 5275 405d20 5274->5275 5276 4055e4 33 API calls 5275->5276 5277 405d4d 5276->5277 5278 4031e8 18 API calls 5277->5278 5279 405d58 5278->5279 5280 403198 4 API calls 5279->5280 5281 405d6d 5280->5281 5281->5263 5283 405d14 33 API calls 5282->5283 5284 408282 5283->5284 5284->5268 6322 403a52 6323 403a74 6322->6323 6324 403a5a WriteFile 6322->6324 6324->6323 6325 403a78 GetLastError 6324->6325 6325->6323 6326 402654 6327 403154 4 API calls 6326->6327 6328 402614 6327->6328 6329 402632 6328->6329 6330 403154 4 API calls 6328->6330 6329->6329 6330->6329 5367 40af57 5397 409ae8 GetLastError 5367->5397 5370 40af72 5372 40af7c CreateWindowExA SetWindowLongA 5370->5372 5373 4055e4 33 API calls 5372->5373 5374 40afff 5373->5374 5410 4032fc 5374->5410 5376 40b00d 5377 4032fc 18 API calls 5376->5377 5378 40b01a 5377->5378 5424 406fcc GetCommandLineA 5378->5424 5381 4032fc 18 API calls 5382 40b02f 5381->5382 5431 409e8c 5382->5431 5386 40b054 5387 40b08d 5386->5387 5447 409978 5386->5447 5388 40b0a6 5387->5388 5392 40b0a0 RemoveDirectoryA 5387->5392 5390 40b0ba 5388->5390 5391 40b0af DestroyWindow 5388->5391 5393 40b0e2 5390->5393 5466 40357c 5390->5466 5391->5390 5392->5388 5395 40b0d8 5396 4025ac 4 API calls 5395->5396 5396->5393 5476 4050e4 5397->5476 5400 407700 19 API calls 5401 409b3f 5400->5401 5479 409224 5401->5479 5404 405ce0 18 API calls 5405 409b63 5404->5405 5406 4031b8 4 API calls 5405->5406 5407 409b82 5406->5407 5408 403198 4 API calls 5407->5408 5409 409b8a 5408->5409 5409->5370 5455 402f24 5409->5455 5411 403300 5410->5411 5412 40333f 5410->5412 5413 4031e8 5411->5413 5414 40330a 5411->5414 5412->5376 5420 403254 18 API calls 5413->5420 5421 4031fc 5413->5421 5415 403334 5414->5415 5416 40331d 5414->5416 5418 4034f0 18 API calls 5415->5418 5501 4034f0 5416->5501 5423 403322 5418->5423 5419 403228 5419->5376 5420->5421 5421->5419 5422 4025ac 4 API calls 5421->5422 5422->5419 5423->5376 5514 406f40 5424->5514 5427 4032c4 18 API calls 5428 406ffa 5427->5428 5429 403198 4 API calls 5428->5429 5430 40700f 5429->5430 5430->5381 5528 4033b4 5431->5528 5433 409ec7 5434 409ef9 CreateProcessA 5433->5434 5435 409f05 5434->5435 5436 409f0c CloseHandle 5434->5436 5437 409ae8 35 API calls 5435->5437 5438 409f15 5436->5438 5437->5436 5439 409e60 TranslateMessage DispatchMessageA PeekMessageA 5438->5439 5440 409f1a MsgWaitForMultipleObjects 5439->5440 5440->5438 5441 409f31 5440->5441 5442 409e60 TranslateMessage DispatchMessageA PeekMessageA 5441->5442 5443 409f36 GetExitCodeProcess CloseHandle 5442->5443 5444 409f56 5443->5444 5445 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5444->5445 5446 409f5e 5445->5446 5446->5386 5460 409d6c 5446->5460 5448 4099d2 5447->5448 5450 40998b 5447->5450 5448->5387 5449 409993 Sleep 5449->5450 5450->5448 5450->5449 5451 4099a3 Sleep 5450->5451 5453 4099ba GetLastError 5450->5453 5534 409438 5450->5534 5451->5450 5453->5448 5454 4099c4 GetLastError 5453->5454 5454->5448 5454->5450 5456 403154 4 API calls 5455->5456 5457 402f29 5456->5457 5551 402bcc 5457->5551 5459 402f51 5459->5459 5461 409d74 5460->5461 5465 409dae 5460->5465 5462 403420 18 API calls 5461->5462 5461->5465 5463 409da8 5462->5463 5554 4092fc 5463->5554 5465->5386 5467 403591 5466->5467 5468 4035aa 5466->5468 5467->5468 5473 4035d0 5467->5473 5474 4035b6 5467->5474 5469 4035b1 5468->5469 5470 4035b8 5468->5470 5471 403198 4 API calls 5469->5471 5472 4031b8 4 API calls 5470->5472 5471->5474 5472->5474 5475 40357c 4 API calls 5473->5475 5474->5395 5475->5474 5477 4055f8 33 API calls 5476->5477 5478 405102 5477->5478 5478->5400 5480 409244 5479->5480 5483 4090fc 5480->5483 5484 403198 4 API calls 5483->5484 5494 40912d 5484->5494 5485 409158 5486 4031b8 4 API calls 5485->5486 5488 4091e5 5486->5488 5487 409144 5495 4032c4 5487->5495 5488->5404 5491 403278 18 API calls 5491->5494 5492 4032fc 18 API calls 5492->5485 5493 4032fc 18 API calls 5493->5494 5494->5485 5494->5487 5494->5491 5494->5493 5496 403278 5495->5496 5497 403254 18 API calls 5496->5497 5498 403288 5497->5498 5499 403198 4 API calls 5498->5499 5500 4032a0 5499->5500 5500->5492 5502 4034fd 5501->5502 5509 40352d 5501->5509 5504 403526 5502->5504 5505 403509 5502->5505 5503 403198 4 API calls 5507 403517 5503->5507 5506 403254 18 API calls 5504->5506 5510 4025c4 5505->5510 5506->5509 5507->5423 5509->5503 5511 4025ca 5510->5511 5512 4025dc 5511->5512 5513 403154 4 API calls 5511->5513 5512->5507 5512->5512 5513->5512 5515 406f6c 5514->5515 5516 403278 18 API calls 5515->5516 5517 406f79 5516->5517 5524 403420 5517->5524 5519 406f81 5520 4031e8 18 API calls 5519->5520 5521 406f99 5520->5521 5522 403198 4 API calls 5521->5522 5523 406fbb 5522->5523 5523->5427 5525 403426 5524->5525 5527 403437 5524->5527 5526 403254 18 API calls 5525->5526 5525->5527 5526->5527 5527->5519 5529 4033bc 5528->5529 5530 403254 18 API calls 5529->5530 5531 4033cf 5530->5531 5532 4031e8 18 API calls 5531->5532 5533 4033f7 5532->5533 5542 4093ec 5534->5542 5536 40944e 5537 409452 5536->5537 5538 40946e DeleteFileA GetLastError 5536->5538 5537->5450 5539 40948c 5538->5539 5548 409428 5539->5548 5543 4093f6 5542->5543 5544 4093fa 5542->5544 5543->5536 5545 409403 Wow64DisableWow64FsRedirection 5544->5545 5546 40941c SetLastError 5544->5546 5547 409417 5545->5547 5546->5547 5547->5536 5549 409437 5548->5549 5550 40942d Wow64RevertWow64FsRedirection 5548->5550 5549->5450 5550->5549 5552 402bd5 RaiseException 5551->5552 5553 402be6 5551->5553 5552->5553 5553->5459 5555 40930a 5554->5555 5557 409322 5555->5557 5567 409294 5555->5567 5558 409294 18 API calls 5557->5558 5559 409346 5557->5559 5558->5559 5570 407d94 5559->5570 5562 409374 5564 409294 18 API calls 5562->5564 5565 403278 18 API calls 5562->5565 5566 4093a3 5562->5566 5563 409294 18 API calls 5563->5562 5564->5562 5565->5562 5566->5465 5568 405ce0 18 API calls 5567->5568 5569 4092a5 5568->5569 5569->5557 5573 407d40 5570->5573 5574 407d52 5573->5574 5575 407d63 5573->5575 5576 407d57 InterlockedExchange 5574->5576 5575->5562 5575->5563 5576->5575 6335 402e64 6336 402e69 6335->6336 6337 402e7a RtlUnwind 6336->6337 6338 402e5e 6336->6338 6339 402e9d 6337->6339 6348 407a76 GetFileSize 6349 407aa2 6348->6349 6350 407a92 GetLastError 6348->6350 6350->6349 6351 407a9b 6350->6351 6352 407908 35 API calls 6351->6352 6352->6349 6741 403f7d 6742 403fa2 6741->6742 6745 403f84 6741->6745 6744 403e8e 4 API calls 6742->6744 6742->6745 6743 403f8c 6744->6745 6745->6743 6746 402674 4 API calls 6745->6746 6747 403fca 6746->6747 6019 40ae7e 6020 40aea3 6019->6020 6021 407d94 InterlockedExchange 6020->6021 6022 40aecd 6021->6022 6023 40aedd 6022->6023 6024 409f88 18 API calls 6022->6024 6029 407b28 SetEndOfFile 6023->6029 6024->6023 6026 40aef9 6027 4025ac 4 API calls 6026->6027 6028 40af30 6027->6028 6030 407b38 6029->6030 6031 407b3f 6029->6031 6032 407908 35 API calls 6030->6032 6031->6026 6032->6031 6363 409e00 6364 409e0f 6363->6364 6365 409e22 6363->6365 6364->6365 6366 409e3e CallWindowProcA 6364->6366 6366->6365 5285 403d02 5290 403d12 5285->5290 5286 403ddf ExitProcess 5287 403db8 5301 403cc8 5287->5301 5290->5286 5290->5287 5291 403dea 5290->5291 5294 403da4 5290->5294 5295 403d8f MessageBoxA 5290->5295 5292 403cc8 4 API calls 5293 403dcc 5292->5293 5305 4019dc 5293->5305 5317 403fe4 5294->5317 5295->5287 5298 403dd1 5298->5286 5298->5291 5302 403cd6 5301->5302 5304 403ceb 5302->5304 5321 402674 5302->5321 5304->5292 5306 401abb 5305->5306 5307 4019ed 5305->5307 5306->5298 5308 401a04 RtlEnterCriticalSection 5307->5308 5309 401a0e LocalFree 5307->5309 5308->5309 5310 401a41 5309->5310 5311 401a2f VirtualFree 5310->5311 5312 401a49 5310->5312 5311->5310 5313 401a70 LocalFree 5312->5313 5314 401a87 5312->5314 5313->5313 5313->5314 5315 401aa9 RtlDeleteCriticalSection 5314->5315 5316 401a9f RtlLeaveCriticalSection 5314->5316 5315->5298 5316->5315 5318 403fe8 5317->5318 5324 403f07 5318->5324 5320 404006 5322 403154 4 API calls 5321->5322 5323 40267a 5322->5323 5323->5304 5327 403f09 5324->5327 5326 403f3c 5326->5320 5329 403154 4 API calls 5327->5329 5331 403e9c 5327->5331 5334 403f3d 5327->5334 5347 403e9c 5327->5347 5328 403ecf 5328->5320 5329->5327 5330 403ef2 5333 402674 4 API calls 5330->5333 5331->5326 5331->5330 5336 403ea9 5331->5336 5338 403e8e 5331->5338 5333->5328 5334->5320 5336->5328 5337 402674 4 API calls 5336->5337 5337->5328 5339 403e4c 5338->5339 5340 403e62 5339->5340 5341 403e7b 5339->5341 5345 403e67 5339->5345 5343 403cc8 4 API calls 5340->5343 5342 402674 4 API calls 5341->5342 5344 403e78 5342->5344 5343->5345 5344->5330 5344->5336 5345->5344 5346 402674 4 API calls 5345->5346 5346->5344 5349 403ed7 5347->5349 5353 403ea9 5347->5353 5348 403ef2 5352 402674 4 API calls 5348->5352 5349->5348 5351 403e8e 4 API calls 5349->5351 5350 403ecf 5350->5327 5354 403ee6 5351->5354 5352->5350 5353->5350 5355 402674 4 API calls 5353->5355 5354->5348 5354->5353 5355->5350 6367 404206 6368 4041cc 6367->6368 6371 40420a 6367->6371 6369 404282 6370 403154 4 API calls 6372 404323 6370->6372 6371->6369 6371->6370 6373 402c08 6374 402c82 6373->6374 6377 402c19 6373->6377 6375 402c56 RtlUnwind 6376 403154 4 API calls 6375->6376 6376->6374 6377->6374 6377->6375 6380 402b28 6377->6380 6381 402b31 RaiseException 6380->6381 6382 402b47 6380->6382 6381->6382 6382->6375 6752 40830c 6753 408334 VirtualFree 6752->6753 6754 408319 6753->6754 6391 403018 6392 403070 6391->6392 6393 403025 6391->6393 6394 40302a RtlUnwind 6393->6394 6395 40304e 6394->6395 6397 402f78 6395->6397 6398 402be8 6395->6398 6399 402bf1 RaiseException 6398->6399 6400 402c04 6398->6400 6399->6400 6400->6392 6401 409220 6402 409244 6401->6402 6403 4090fc 18 API calls 6402->6403 6404 40924d 6403->6404 6765 405f24 6766 405f34 6765->6766 6767 405f2c 6765->6767 6768 405f32 6767->6768 6769 405f3b 6767->6769 6772 405e9c 6768->6772 6770 405d90 19 API calls 6769->6770 6770->6766 6773 405ea4 6772->6773 6774 405ebe 6773->6774 6775 403154 4 API calls 6773->6775 6776 405ec3 6774->6776 6777 405eda 6774->6777 6775->6773 6778 405d90 19 API calls 6776->6778 6779 403154 4 API calls 6777->6779 6781 405ed6 6778->6781 6780 405edf 6779->6780 6782 405e00 33 API calls 6780->6782 6783 403154 4 API calls 6781->6783 6782->6781 6784 405f08 6783->6784 6785 403154 4 API calls 6784->6785 6786 405f16 6785->6786 6786->6766 6405 403a28 ReadFile 6406 403a46 6405->6406 6407 403a49 GetLastError 6405->6407 6408 40462b 6409 404638 SetErrorMode 6408->6409 6787 403932 6788 403924 6787->6788 6789 40374c VariantClear 6788->6789 6790 40392c 6789->6790 6791 40b137 6800 409b9c 6791->6800 6794 402f24 5 API calls 6795 40b141 6794->6795 6796 403198 4 API calls 6795->6796 6797 40b160 6796->6797 6798 403198 4 API calls 6797->6798 6799 40b168 6798->6799 6809 405afc 6800->6809 6802 409bb7 6803 409be5 6802->6803 6815 407688 6802->6815 6806 403198 4 API calls 6803->6806 6805 409bd5 6808 409bdd MessageBoxA 6805->6808 6807 409bfa 6806->6807 6807->6794 6807->6795 6808->6803 6810 403154 4 API calls 6809->6810 6811 405b01 6810->6811 6812 405b19 6811->6812 6813 403154 4 API calls 6811->6813 6812->6802 6814 405b0f 6813->6814 6814->6802 6816 405afc 4 API calls 6815->6816 6817 407697 6816->6817 6818 4076ab 6817->6818 6819 40769d 6817->6819 6822 4076c7 6818->6822 6823 4076bb 6818->6823 6820 40322c 4 API calls 6819->6820 6821 4076a9 6820->6821 6821->6805 6833 4032b8 6822->6833 6826 40764c 6823->6826 6827 40322c 4 API calls 6826->6827 6828 40765b 6827->6828 6829 407678 6828->6829 6830 406da0 CharPrevA 6828->6830 6829->6821 6831 407667 6830->6831 6831->6829 6832 4032fc 18 API calls 6831->6832 6832->6829 6834 403278 18 API calls 6833->6834 6835 4032c2 6834->6835 6835->6821 5364 4079c4 5365 4079d0 CloseHandle 5364->5365 5366 4079d9 5364->5366 5365->5366 6420 402ccc 6423 402cfe 6420->6423 6425 402cdd 6420->6425 6421 402d88 RtlUnwind 6422 403154 4 API calls 6421->6422 6422->6423 6424 402b28 RaiseException 6426 402d7f 6424->6426 6425->6421 6425->6423 6425->6424 6426->6421 6427 406acc IsDBCSLeadByte 6428 406ae4 6427->6428 6844 403fcd 6845 403f07 4 API calls 6844->6845 6846 403fd6 6845->6846 6847 403e9c 4 API calls 6846->6847 6848 403fe2 6847->6848 6033 40accf 6034 409f88 18 API calls 6033->6034 6035 40acd4 6034->6035 6036 402f24 5 API calls 6035->6036 6037 40acd9 6036->6037 6070 409ddc 6037->6070 6039 40ad31 6075 4026c4 GetSystemTime 6039->6075 6041 40acde 6041->6039 6111 409254 6041->6111 6042 40ad36 6076 4097d0 6042->6076 6046 40ad0d 6050 40ad15 MessageBoxA 6046->6050 6047 4031e8 18 API calls 6048 40ad4b 6047->6048 6094 406d78 6048->6094 6050->6039 6052 40ad22 6050->6052 6114 405cb4 6052->6114 6056 406a88 19 API calls 6057 40ad79 6056->6057 6058 403340 18 API calls 6057->6058 6059 40ad87 6058->6059 6060 4031e8 18 API calls 6059->6060 6061 40ad97 6060->6061 6062 40795c 37 API calls 6061->6062 6063 40add6 6062->6063 6064 402594 18 API calls 6063->6064 6065 40adf6 6064->6065 6066 407ea4 19 API calls 6065->6066 6067 40ae38 6066->6067 6068 408134 35 API calls 6067->6068 6069 40ae5f 6068->6069 6118 4099dc 6070->6118 6073 409d6c 19 API calls 6074 409dfc 6073->6074 6074->6041 6075->6042 6079 4097f0 6076->6079 6080 409815 CreateDirectoryA 6079->6080 6085 409254 18 API calls 6079->6085 6087 4050e4 33 API calls 6079->6087 6090 407700 19 API calls 6079->6090 6092 409224 18 API calls 6079->6092 6093 405ce0 18 API calls 6079->6093 6174 407170 6079->6174 6197 4096c4 6079->6197 6081 40988d 6080->6081 6082 40981f GetLastError 6080->6082 6083 40322c 4 API calls 6081->6083 6082->6079 6084 409897 6083->6084 6086 4031b8 4 API calls 6084->6086 6085->6079 6088 4098b1 6086->6088 6087->6079 6089 4031b8 4 API calls 6088->6089 6091 4098be 6089->6091 6090->6079 6091->6047 6092->6079 6093->6079 6304 406c70 6094->6304 6097 403454 18 API calls 6098 406d9a 6097->6098 6099 406b10 6098->6099 6309 406d34 6099->6309 6102 406b40 6104 403340 18 API calls 6102->6104 6103 406b4e 6105 403454 18 API calls 6103->6105 6106 406b4c 6104->6106 6107 406b61 6105->6107 6109 403198 4 API calls 6106->6109 6108 403340 18 API calls 6107->6108 6108->6106 6110 406b83 6109->6110 6110->6056 6112 409224 18 API calls 6111->6112 6113 409270 6112->6113 6113->6046 6115 405cb9 6114->6115 6116 405d90 19 API calls 6115->6116 6117 405ccb 6116->6117 6117->6117 6125 4099fb 6118->6125 6119 409a30 6122 409a3d GetUserDefaultLangID 6119->6122 6126 409a32 6119->6126 6120 409a34 6130 4074a0 GetModuleHandleA GetProcAddress 6120->6130 6122->6126 6124 409a0f 6124->6073 6125->6119 6125->6120 6125->6124 6126->6124 6127 409a6b GetACP 6126->6127 6128 409a8f 6126->6128 6127->6124 6127->6126 6128->6124 6129 409ab5 GetACP 6128->6129 6129->6124 6129->6128 6131 4074e3 6130->6131 6132 4074da 6130->6132 6133 407524 6131->6133 6134 4074ec 6131->6134 6142 403198 4 API calls 6132->6142 6136 4073e4 RegOpenKeyExA 6133->6136 6151 4073e4 6134->6151 6138 40753d 6136->6138 6137 407505 6139 40755a 6137->6139 6154 4073d8 6137->6154 6138->6139 6143 4073d8 20 API calls 6138->6143 6140 40322c 4 API calls 6139->6140 6144 407567 6140->6144 6146 40759c 6142->6146 6147 407551 RegCloseKey 6143->6147 6148 4032fc 18 API calls 6144->6148 6149 403198 4 API calls 6146->6149 6147->6139 6148->6132 6150 4075a4 6149->6150 6150->6126 6152 4073f5 RegOpenKeyExA 6151->6152 6153 4073ef 6151->6153 6152->6137 6153->6152 6157 40728c 6154->6157 6158 4072b2 RegQueryValueExA 6157->6158 6159 4072f7 6158->6159 6165 4072d5 6158->6165 6161 403198 4 API calls 6159->6161 6160 4072ef 6162 403198 4 API calls 6160->6162 6163 4073c3 RegCloseKey 6161->6163 6162->6159 6163->6139 6164 403278 18 API calls 6164->6165 6165->6159 6165->6160 6165->6164 6166 403420 18 API calls 6165->6166 6167 40732c RegQueryValueExA 6166->6167 6167->6158 6168 407348 6167->6168 6168->6159 6169 4034f0 18 API calls 6168->6169 6170 40738a 6169->6170 6171 40739c 6170->6171 6173 403420 18 API calls 6170->6173 6172 4031e8 18 API calls 6171->6172 6172->6159 6173->6171 6216 406ea8 6174->6216 6177 4071a2 6178 406ea8 19 API calls 6177->6178 6181 4071ee 6177->6181 6180 4071b2 6178->6180 6182 4071be 6180->6182 6184 406e84 21 API calls 6180->6184 6224 406cd8 6181->6224 6182->6181 6186 406ea8 19 API calls 6182->6186 6194 4071e3 6182->6194 6184->6182 6190 4071d7 6186->6190 6188 406a88 19 API calls 6189 407203 6188->6189 6191 40322c 4 API calls 6189->6191 6192 406e84 21 API calls 6190->6192 6190->6194 6193 40720d 6191->6193 6192->6194 6195 4031b8 4 API calls 6193->6195 6194->6181 6236 407118 GetWindowsDirectoryA 6194->6236 6196 407227 6195->6196 6196->6079 6198 4096e4 6197->6198 6199 406a88 19 API calls 6198->6199 6200 4096fd 6199->6200 6201 40322c 4 API calls 6200->6201 6202 409708 6201->6202 6203 406dc8 20 API calls 6202->6203 6205 4033b4 18 API calls 6202->6205 6206 409254 18 API calls 6202->6206 6208 405ce0 18 API calls 6202->6208 6209 409784 6202->6209 6277 409650 6202->6277 6285 4094b0 6202->6285 6203->6202 6205->6202 6206->6202 6208->6202 6210 40322c 4 API calls 6209->6210 6211 40978f 6210->6211 6212 4031b8 4 API calls 6211->6212 6213 4097a9 6212->6213 6214 403198 4 API calls 6213->6214 6215 4097b1 6214->6215 6215->6079 6217 4034f0 18 API calls 6216->6217 6219 406ebb 6217->6219 6218 406ed2 GetEnvironmentVariableA 6218->6219 6220 406ede 6218->6220 6219->6218 6223 406ee5 6219->6223 6239 407268 6219->6239 6221 403198 4 API calls 6220->6221 6221->6223 6223->6177 6233 406e84 6223->6233 6225 403414 6224->6225 6226 406cfb GetFullPathNameA 6225->6226 6227 406d07 6226->6227 6228 406d1e 6226->6228 6227->6228 6230 406d0f 6227->6230 6229 40322c 4 API calls 6228->6229 6231 406d1c 6229->6231 6232 403278 18 API calls 6230->6232 6231->6188 6232->6231 6243 406e2c 6233->6243 6237 405230 18 API calls 6236->6237 6238 407139 6237->6238 6238->6181 6240 407276 6239->6240 6241 4034f0 18 API calls 6240->6241 6242 407284 6241->6242 6242->6219 6250 406dc8 6243->6250 6245 406e4e 6246 406e56 GetFileAttributesA 6245->6246 6247 406e6b 6246->6247 6248 403198 4 API calls 6247->6248 6249 406e73 6248->6249 6249->6177 6260 406b94 6250->6260 6252 406e00 6255 406e16 6252->6255 6256 406e0b 6252->6256 6254 406dd9 6254->6252 6267 406dc0 CharPrevA 6254->6267 6268 403454 6255->6268 6258 40322c 4 API calls 6256->6258 6259 406e14 6258->6259 6259->6245 6263 406ba5 6260->6263 6261 406c09 6262 406ad0 IsDBCSLeadByte 6261->6262 6265 406c04 6261->6265 6262->6265 6263->6261 6264 406bc3 6263->6264 6264->6265 6275 406ad0 IsDBCSLeadByte 6264->6275 6265->6254 6267->6254 6269 403486 6268->6269 6270 403459 6268->6270 6271 403198 4 API calls 6269->6271 6270->6269 6272 40346d 6270->6272 6274 40347c 6271->6274 6273 403278 18 API calls 6272->6273 6273->6274 6274->6259 6276 406ae4 6275->6276 6276->6264 6278 403198 4 API calls 6277->6278 6280 409671 6278->6280 6282 40969e 6280->6282 6294 4032a8 6280->6294 6297 403494 6280->6297 6283 403198 4 API calls 6282->6283 6284 4096b3 6283->6284 6284->6202 6286 4093ec 2 API calls 6285->6286 6287 4094c6 6286->6287 6288 4094ca 6287->6288 6301 406e98 6287->6301 6288->6202 6291 4094fd 6292 409428 Wow64RevertWow64FsRedirection 6291->6292 6293 409505 6292->6293 6293->6202 6295 403278 18 API calls 6294->6295 6296 4032b5 6295->6296 6296->6280 6298 403498 6297->6298 6300 4034c3 6297->6300 6299 4034f0 18 API calls 6298->6299 6299->6300 6300->6280 6302 406e2c 21 API calls 6301->6302 6303 406ea2 GetLastError 6302->6303 6303->6291 6305 406b94 IsDBCSLeadByte 6304->6305 6307 406c85 6305->6307 6306 406ccf 6306->6097 6307->6306 6308 406ad0 IsDBCSLeadByte 6307->6308 6308->6307 6310 406d43 6309->6310 6311 406c70 IsDBCSLeadByte 6310->6311 6314 406d4e 6311->6314 6312 406b3a 6312->6102 6312->6103 6313 406ad0 IsDBCSLeadByte 6313->6314 6314->6312 6314->6313 6429 4024d0 6430 4024e4 6429->6430 6431 4024e9 6429->6431 6434 401918 4 API calls 6430->6434 6432 402518 6431->6432 6433 40250e RtlEnterCriticalSection 6431->6433 6436 4024ed 6431->6436 6444 402300 6432->6444 6433->6432 6434->6431 6437 402525 6440 402581 6437->6440 6441 402577 RtlLeaveCriticalSection 6437->6441 6439 401fd4 14 API calls 6442 402531 6439->6442 6441->6440 6442->6437 6454 40215c 6442->6454 6445 402314 6444->6445 6446 402335 6445->6446 6452 4023b8 6445->6452 6447 402344 6446->6447 6468 401b74 6446->6468 6447->6437 6447->6439 6451 402455 6451->6447 6453 401d00 9 API calls 6451->6453 6452->6447 6452->6451 6471 401d80 6452->6471 6475 401e84 6452->6475 6453->6447 6455 40217a 6454->6455 6456 402175 6454->6456 6458 4021ab RtlEnterCriticalSection 6455->6458 6460 4021b5 6455->6460 6462 40217e 6455->6462 6457 401918 4 API calls 6456->6457 6457->6455 6458->6460 6459 4021c1 6463 4022e3 RtlLeaveCriticalSection 6459->6463 6464 4022ed 6459->6464 6460->6459 6461 402244 6460->6461 6466 402270 6460->6466 6461->6462 6465 401d80 7 API calls 6461->6465 6462->6437 6463->6464 6464->6437 6465->6462 6466->6459 6467 401d00 7 API calls 6466->6467 6467->6459 6469 40215c 9 API calls 6468->6469 6470 401b95 6469->6470 6470->6447 6472 401d92 6471->6472 6473 401d89 6471->6473 6472->6452 6473->6472 6474 401b74 9 API calls 6473->6474 6474->6472 6480 401768 6475->6480 6477 401e99 6478 401dcc 9 API calls 6477->6478 6479 401ea6 6477->6479 6478->6479 6479->6452 6481 401787 6480->6481 6482 40183b 6481->6482 6483 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 6481->6483 6485 40132c LocalAlloc 6481->6485 6486 401821 6481->6486 6488 4017d6 6481->6488 6489 4017e7 6482->6489 6495 4015c4 6482->6495 6483->6481 6485->6481 6487 40150c VirtualFree 6486->6487 6487->6489 6491 40150c 6488->6491 6489->6477 6494 40153b 6491->6494 6492 401594 6492->6489 6493 401568 VirtualFree 6493->6494 6494->6492 6494->6493 6496 40160a 6495->6496 6497 401626 VirtualAlloc 6496->6497 6498 40163a 6496->6498 6497->6496 6497->6498 6498->6489 6499 4028d2 6500 4028da 6499->6500 6502 4028ef 6500->6502 6505 403554 6500->6505 6503 4025ac 4 API calls 6502->6503 6504 4028f4 6503->6504 6506 403566 6505->6506 6508 403578 6506->6508 6509 403604 6506->6509 6508->6500 6510 40357c 6509->6510 6511 4035aa 6510->6511 6516 4035d0 6510->6516 6517 4035b6 6510->6517 6512 4035b1 6511->6512 6513 4035b8 6511->6513 6514 403198 4 API calls 6512->6514 6515 4031b8 4 API calls 6513->6515 6514->6517 6515->6517 6518 40357c 4 API calls 6516->6518 6517->6506 6518->6517 6849 4019d3 6850 4019ba 6849->6850 6851 4019c3 RtlLeaveCriticalSection 6850->6851 6852 4019cd 6850->6852 6851->6852 5577 407ae8 SetFilePointer 5578 407b1f 5577->5578 5579 407b0f GetLastError 5577->5579 5579->5578 5580 407b18 5579->5580 5581 407908 35 API calls 5580->5581 5581->5578 6864 402be9 RaiseException 6865 402c04 6864->6865 6527 40b0ef 6528 40b061 6527->6528 6529 40b08d 6528->6529 6531 409978 9 API calls 6528->6531 6530 40b0a6 6529->6530 6534 40b0a0 RemoveDirectoryA 6529->6534 6532 40b0ba 6530->6532 6533 40b0af DestroyWindow 6530->6533 6531->6529 6535 40b0e2 6532->6535 6536 40357c 4 API calls 6532->6536 6533->6532 6534->6530 6537 40b0d8 6536->6537 6538 4025ac 4 API calls 6537->6538 6538->6535 6539 402af2 6540 402afe 6539->6540 6543 402ed0 6540->6543 6544 403154 4 API calls 6543->6544 6546 402ee0 6544->6546 6545 402b03 6546->6545 6548 402b0c 6546->6548 6549 402b25 6548->6549 6550 402b15 RaiseException 6548->6550 6549->6545 6550->6549 6870 405ff2 6872 405ff4 6870->6872 6871 406030 6875 405d90 19 API calls 6871->6875 6872->6871 6873 406047 6872->6873 6874 40602a 6872->6874 6879 40512c 19 API calls 6873->6879 6874->6871 6876 40609c 6874->6876 6878 406043 6875->6878 6877 405e00 33 API calls 6876->6877 6877->6878 6880 403198 4 API calls 6878->6880 6881 406070 6879->6881 6882 4060d6 6880->6882 6883 405e00 33 API calls 6881->6883 6883->6878 6898 402dfa 6899 402e26 6898->6899 6900 402e0d 6898->6900 6902 402ba4 6900->6902 6903 402bc9 6902->6903 6904 402bad 6902->6904 6903->6899 6905 402bb5 RaiseException 6904->6905 6905->6903 6563 40b0fd 6572 4098e8 6563->6572 6565 40b102 6566 40b128 6565->6566 6567 40b120 MessageBoxA 6565->6567 6568 403198 4 API calls 6566->6568 6567->6566 6569 40b160 6568->6569 6570 403198 4 API calls 6569->6570 6571 40b168 6570->6571 6573 4098f4 GetCurrentProcess OpenProcessToken 6572->6573 6574 40994f ExitWindowsEx 6572->6574 6575 409906 6573->6575 6576 40990a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6573->6576 6574->6575 6575->6565 6576->6574 6576->6575 6906 409dfe 6909 409e00 6906->6909 6907 409e22 6908 409e3e CallWindowProcA 6908->6907 6909->6907 6909->6908 6581 403a80 CloseHandle 6582 403a90 6581->6582 6583 403a91 GetLastError 6581->6583 6584 404283 6585 4042c3 6584->6585 6586 403154 4 API calls 6585->6586 6587 404323 6586->6587 6910 404185 6911 4041ff 6910->6911 6912 4041cc 6911->6912 6913 403154 4 API calls 6911->6913 6914 404323 6913->6914 6588 403e87 6589 403e4c 6588->6589 6590 403e67 6589->6590 6591 403e62 6589->6591 6592 403e7b 6589->6592 6595 403e78 6590->6595 6596 402674 4 API calls 6590->6596 6594 403cc8 4 API calls 6591->6594 6593 402674 4 API calls 6592->6593 6593->6595 6594->6590 6596->6595 5356 407493 5357 407484 SetErrorMode 5356->5357 6606 403a97 6607 403aac 6606->6607 6608 403bbc GetStdHandle 6607->6608 6609 403b0e CreateFileA 6607->6609 6615 403ab2 6607->6615 6610 403c17 GetLastError 6608->6610 6623 403bba 6608->6623 6609->6610 6611 403b2c 6609->6611 6610->6615 6613 403b3b GetFileSize 6611->6613 6611->6623 6613->6610 6617 403b4e SetFilePointer 6613->6617 6614 403be7 GetFileType 6614->6615 6616 403c02 CloseHandle 6614->6616 6616->6615 6617->6610 6619 403b6a ReadFile 6617->6619 6619->6610 6620 403b8c 6619->6620 6621 403b9f SetFilePointer 6620->6621 6620->6623 6621->6610 6622 403bb0 SetEndOfFile 6621->6622 6622->6610 6622->6623 6623->6614 6623->6615 5582 40aa98 5625 4030dc 5582->5625 5584 40aaae 5628 4042e8 5584->5628 5586 40aab3 5631 404654 GetModuleHandleA GetVersion 5586->5631 5590 40aabd 5722 406a18 5590->5722 5592 40aac2 5731 409520 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5592->5731 5599 40ab05 5759 40707c 5599->5759 5603 4031e8 18 API calls 5604 40ab23 5603->5604 5773 40795c 5604->5773 5610 407d94 InterlockedExchange 5613 40ab72 5610->5613 5611 40abb0 5793 40791c 5611->5793 5613->5611 5830 409f88 5613->5830 5614 40abd6 5615 40abf1 5614->5615 5616 409f88 18 API calls 5614->5616 5797 407ea4 5615->5797 5616->5615 5618 40ac16 5807 408f84 5618->5807 5622 40ac5c 5623 408f84 35 API calls 5622->5623 5624 40ac95 5622->5624 5623->5622 5840 403094 5625->5840 5627 4030e1 GetModuleHandleA GetCommandLineA 5627->5584 5629 403154 4 API calls 5628->5629 5630 404323 5628->5630 5629->5630 5630->5586 5632 4046a5 5631->5632 5633 404685 GetProcAddress 5631->5633 5635 4046ad GetProcAddress 5632->5635 5636 4048af GetProcAddress 5632->5636 5633->5632 5634 404696 5633->5634 5634->5632 5639 4046bc 5635->5639 5637 4048c5 GetProcAddress 5636->5637 5638 4048be 5636->5638 5641 4048d4 SetProcessDEPPolicy 5637->5641 5642 4048d8 5637->5642 5638->5637 5841 4045a0 GetSystemDirectoryA 5639->5841 5641->5642 5644 403198 4 API calls 5642->5644 5646 4048ed 5644->5646 5645 4031e8 18 API calls 5647 4046d8 5645->5647 5721 404a74 6F551CD0 5646->5721 5647->5636 5648 40470b 5647->5648 5649 4032fc 18 API calls 5647->5649 5844 40322c 5648->5844 5649->5648 5652 4032fc 18 API calls 5653 404726 5652->5653 5848 4045cc SetErrorMode 5653->5848 5656 40322c 4 API calls 5657 40473c 5656->5657 5658 4032fc 18 API calls 5657->5658 5659 404749 5658->5659 5660 4045cc 2 API calls 5659->5660 5661 404751 5660->5661 5662 40322c 4 API calls 5661->5662 5663 40475f 5662->5663 5664 4032fc 18 API calls 5663->5664 5665 40476c 5664->5665 5666 4045cc 2 API calls 5665->5666 5667 404774 5666->5667 5668 40322c 4 API calls 5667->5668 5669 404782 5668->5669 5670 4032fc 18 API calls 5669->5670 5671 40478f 5670->5671 5672 4045cc 2 API calls 5671->5672 5673 404797 5672->5673 5674 40322c 4 API calls 5673->5674 5675 4047a5 5674->5675 5676 4032fc 18 API calls 5675->5676 5677 4047b2 5676->5677 5678 4045cc 2 API calls 5677->5678 5679 4047ba 5678->5679 5680 40322c 4 API calls 5679->5680 5681 4047c8 5680->5681 5682 4032fc 18 API calls 5681->5682 5683 4047d5 5682->5683 5684 4045cc 2 API calls 5683->5684 5685 4047dd 5684->5685 5686 40322c 4 API calls 5685->5686 5687 4047eb 5686->5687 5688 4032fc 18 API calls 5687->5688 5689 4047f8 5688->5689 5690 4045cc 2 API calls 5689->5690 5691 404800 5690->5691 5692 40322c 4 API calls 5691->5692 5693 40480e 5692->5693 5694 4032fc 18 API calls 5693->5694 5695 40481b 5694->5695 5696 4045cc 2 API calls 5695->5696 5697 404823 5696->5697 5698 40322c 4 API calls 5697->5698 5699 404831 5698->5699 5700 4032fc 18 API calls 5699->5700 5701 40483e 5700->5701 5702 4045cc 2 API calls 5701->5702 5703 404846 5702->5703 5704 40322c 4 API calls 5703->5704 5705 404854 5704->5705 5706 4032fc 18 API calls 5705->5706 5707 404861 5706->5707 5708 4045cc 2 API calls 5707->5708 5709 404869 5708->5709 5710 40322c 4 API calls 5709->5710 5711 404877 5710->5711 5712 4032fc 18 API calls 5711->5712 5713 404884 5712->5713 5714 4045cc 2 API calls 5713->5714 5715 40488c 5714->5715 5716 40322c 4 API calls 5715->5716 5717 40489a 5716->5717 5718 4032fc 18 API calls 5717->5718 5719 4048a7 5718->5719 5720 4045cc 2 API calls 5719->5720 5720->5636 5721->5590 5857 4060f8 5722->5857 5732 409575 5731->5732 5937 407144 GetSystemDirectoryA 5732->5937 5736 40959c 5737 4032fc 18 API calls 5736->5737 5738 4095a9 5737->5738 5950 40741c SetErrorMode 5738->5950 5741 407700 19 API calls 5742 4095c3 5741->5742 5743 4031b8 4 API calls 5742->5743 5744 4095dd 5743->5744 5745 40a018 GetSystemInfo VirtualQuery 5744->5745 5746 40a0cc 5745->5746 5749 40a042 5745->5749 5751 409c08 5746->5751 5747 40a0ad VirtualQuery 5747->5746 5747->5749 5748 40a06c VirtualProtect 5748->5749 5749->5746 5749->5747 5749->5748 5750 40a09b VirtualProtect 5749->5750 5750->5747 5978 407020 GetCommandLineA 5751->5978 5753 409cf0 5754 4031b8 4 API calls 5753->5754 5756 409d0a 5754->5756 5755 40707c 20 API calls 5758 409c25 5755->5758 5756->5599 5823 40a128 5756->5823 5757 403454 18 API calls 5757->5758 5758->5753 5758->5755 5758->5757 5760 4070a3 GetModuleFileNameA 5759->5760 5761 4070c7 GetCommandLineA 5759->5761 5762 403278 18 API calls 5760->5762 5768 4070cc 5761->5768 5763 4070c5 5762->5763 5765 4070f4 5763->5765 5764 4070d1 5766 403198 4 API calls 5764->5766 5770 403198 4 API calls 5765->5770 5769 4070d9 5766->5769 5767 406f40 18 API calls 5767->5768 5768->5764 5768->5767 5768->5769 5771 40322c 4 API calls 5769->5771 5772 407109 5770->5772 5771->5765 5772->5603 5774 407966 5773->5774 5985 4079f2 5774->5985 5988 4079f4 5774->5988 5775 407992 5776 4079a6 5775->5776 5777 407908 35 API calls 5775->5777 5780 40a0d4 FindResourceA 5776->5780 5777->5776 5781 40a0e9 5780->5781 5782 40a0ee SizeofResource 5780->5782 5783 409f88 18 API calls 5781->5783 5784 40a100 LoadResource 5782->5784 5785 40a0fb 5782->5785 5783->5782 5787 40a113 LockResource 5784->5787 5788 40a10e 5784->5788 5786 409f88 18 API calls 5785->5786 5786->5784 5790 40a124 5787->5790 5791 40a11f 5787->5791 5789 409f88 18 API calls 5788->5789 5789->5787 5790->5610 5790->5613 5792 409f88 18 API calls 5791->5792 5792->5790 5794 407930 5793->5794 5795 407940 5794->5795 5796 407868 34 API calls 5794->5796 5795->5614 5796->5795 5798 407eb1 5797->5798 5799 405ce0 18 API calls 5798->5799 5800 407f05 5798->5800 5799->5800 5801 407d94 InterlockedExchange 5800->5801 5802 407f17 5801->5802 5803 405ce0 18 API calls 5802->5803 5804 407f2d 5802->5804 5803->5804 5805 407f70 5804->5805 5806 405ce0 18 API calls 5804->5806 5805->5618 5806->5805 5818 408fb5 5807->5818 5821 408ffe 5807->5821 5808 409049 5991 408134 5808->5991 5810 4034f0 18 API calls 5810->5818 5811 409060 5813 4031b8 4 API calls 5811->5813 5812 4034f0 18 API calls 5812->5821 5815 40907a 5813->5815 5814 403420 18 API calls 5814->5818 5837 405070 5815->5837 5816 4031e8 18 API calls 5816->5818 5817 4031e8 18 API calls 5817->5821 5818->5810 5818->5814 5818->5816 5820 408134 35 API calls 5818->5820 5818->5821 5819 403420 18 API calls 5819->5821 5820->5818 5821->5808 5821->5812 5821->5817 5821->5819 5822 408134 35 API calls 5821->5822 5822->5821 5824 40322c 4 API calls 5823->5824 5825 40a14b 5824->5825 5826 40a15a MessageBoxA 5825->5826 5827 40a16f 5826->5827 5828 403198 4 API calls 5827->5828 5829 40a177 5828->5829 5829->5599 5831 409f91 5830->5831 5832 409fa9 5830->5832 5834 405ce0 18 API calls 5831->5834 5833 405ce0 18 API calls 5832->5833 5835 409fba 5833->5835 5836 409fa3 5834->5836 5835->5611 5836->5611 5838 402594 18 API calls 5837->5838 5839 40507b 5838->5839 5839->5622 5840->5627 5852 40458c 5841->5852 5846 403230 5844->5846 5845 403252 5845->5652 5846->5845 5847 4025ac 4 API calls 5846->5847 5847->5845 5855 403414 5848->5855 5851 40461e 5851->5656 5853 4032c4 18 API calls 5852->5853 5854 40459b 5853->5854 5854->5645 5856 403418 LoadLibraryA 5855->5856 5856->5851 5858 405d90 19 API calls 5857->5858 5859 406109 5858->5859 5860 4056d0 GetSystemDefaultLCID 5859->5860 5862 405706 5860->5862 5861 40512c 19 API calls 5861->5862 5862->5861 5863 40565c 19 API calls 5862->5863 5864 4031e8 18 API calls 5862->5864 5866 405768 5862->5866 5863->5862 5864->5862 5865 40512c 19 API calls 5865->5866 5866->5865 5867 40565c 19 API calls 5866->5867 5868 4031e8 18 API calls 5866->5868 5869 4057eb 5866->5869 5867->5866 5868->5866 5870 4031b8 4 API calls 5869->5870 5871 405805 5870->5871 5872 405814 GetSystemDefaultLCID 5871->5872 5929 40565c GetLocaleInfoA 5872->5929 5875 4031e8 18 API calls 5876 405854 5875->5876 5877 40565c 19 API calls 5876->5877 5878 405869 5877->5878 5879 40565c 19 API calls 5878->5879 5880 40588d 5879->5880 5935 4056a8 GetLocaleInfoA 5880->5935 5883 4056a8 GetLocaleInfoA 5884 4058bd 5883->5884 5885 40565c 19 API calls 5884->5885 5886 4058d7 5885->5886 5887 4056a8 GetLocaleInfoA 5886->5887 5888 4058f4 5887->5888 5889 40565c 19 API calls 5888->5889 5890 40590e 5889->5890 5891 4031e8 18 API calls 5890->5891 5892 40591b 5891->5892 5893 40565c 19 API calls 5892->5893 5894 405930 5893->5894 5895 4031e8 18 API calls 5894->5895 5896 40593d 5895->5896 5897 4056a8 GetLocaleInfoA 5896->5897 5898 40594b 5897->5898 5899 40565c 19 API calls 5898->5899 5900 405965 5899->5900 5901 4031e8 18 API calls 5900->5901 5902 405972 5901->5902 5903 40565c 19 API calls 5902->5903 5904 405987 5903->5904 5905 4031e8 18 API calls 5904->5905 5906 405994 5905->5906 5907 40565c 19 API calls 5906->5907 5908 4059a9 5907->5908 5909 4059c6 5908->5909 5910 4059b7 5908->5910 5912 40322c 4 API calls 5909->5912 5911 40322c 4 API calls 5910->5911 5913 4059c4 5911->5913 5912->5913 5914 40565c 19 API calls 5913->5914 5915 4059e8 5914->5915 5916 405a05 5915->5916 5917 4059f6 5915->5917 5919 403198 4 API calls 5916->5919 5918 40322c 4 API calls 5917->5918 5920 405a03 5918->5920 5919->5920 5921 4033b4 18 API calls 5920->5921 5922 405a27 5921->5922 5923 4033b4 18 API calls 5922->5923 5924 405a41 5923->5924 5925 4031b8 4 API calls 5924->5925 5926 405a5b 5925->5926 5927 406144 GetVersionExA 5926->5927 5928 40615b 5927->5928 5928->5592 5930 405683 5929->5930 5931 405695 5929->5931 5932 403278 18 API calls 5930->5932 5933 40322c 4 API calls 5931->5933 5934 405693 5932->5934 5933->5934 5934->5875 5936 4056c4 5935->5936 5936->5883 5954 405230 5937->5954 5940 406a88 5941 406a92 5940->5941 5942 406ab5 5940->5942 5957 406da0 5941->5957 5943 40322c 4 API calls 5942->5943 5945 406abe 5943->5945 5945->5736 5946 406a99 5946->5942 5947 406aa4 5946->5947 5962 403340 5947->5962 5949 406ab2 5949->5736 5951 403414 5950->5951 5952 407454 LoadLibraryA 5951->5952 5953 40746a 5952->5953 5953->5741 5955 4032c4 18 API calls 5954->5955 5956 40523f 5955->5956 5956->5940 5958 406da7 5957->5958 5959 406dab 5957->5959 5958->5946 5977 406dc0 CharPrevA 5959->5977 5961 406dbc 5961->5946 5963 403344 5962->5963 5964 4033a5 5962->5964 5965 4031e8 5963->5965 5966 40334c 5963->5966 5970 403254 18 API calls 5965->5970 5972 4031fc 5965->5972 5966->5964 5967 40335b 5966->5967 5971 4031e8 18 API calls 5966->5971 5969 403254 18 API calls 5967->5969 5968 403228 5968->5949 5974 403375 5969->5974 5970->5972 5971->5967 5972->5968 5973 4025ac 4 API calls 5972->5973 5973->5968 5975 4031e8 18 API calls 5974->5975 5976 4033a1 5975->5976 5976->5949 5977->5961 5979 406f40 18 API calls 5978->5979 5980 407043 5979->5980 5981 406f40 18 API calls 5980->5981 5982 407055 5980->5982 5981->5980 5983 403198 4 API calls 5982->5983 5984 40706a 5983->5984 5984->5758 5986 4079f4 5985->5986 5987 407a33 CreateFileA 5986->5987 5987->5775 5989 403414 5988->5989 5990 407a33 CreateFileA 5989->5990 5990->5775 5992 40814f 5991->5992 5996 408144 5991->5996 5997 4080d8 5992->5997 5995 405ce0 18 API calls 5995->5996 5996->5811 5998 40812b 5997->5998 5999 4080ec 5997->5999 5998->5995 5998->5996 5999->5998 6001 408028 5999->6001 6002 408033 6001->6002 6003 408044 6001->6003 6004 405ce0 18 API calls 6002->6004 6005 40791c 34 API calls 6003->6005 6004->6003 6006 408058 6005->6006 6007 40791c 34 API calls 6006->6007 6008 408079 6007->6008 6009 407d94 InterlockedExchange 6008->6009 6010 40808e 6009->6010 6011 4080a4 6010->6011 6012 405ce0 18 API calls 6010->6012 6011->5999 6012->6011 6624 40949a 6625 40948c 6624->6625 6626 409428 Wow64RevertWow64FsRedirection 6625->6626 6627 409494 6626->6627 6628 40949c SetLastError 6629 4094a5 6628->6629 6013 407aa8 ReadFile 6014 407ac8 6013->6014 6015 407adf 6013->6015 6016 407ad8 6014->6016 6017 407ace GetLastError 6014->6017 6018 407908 35 API calls 6016->6018 6017->6015 6017->6016 6018->6015 6630 402caa 6631 403154 4 API calls 6630->6631 6632 402caf 6631->6632 6933 4075aa 6934 407594 6933->6934 6935 403198 4 API calls 6934->6935 6936 40759c 6935->6936 6937 403198 4 API calls 6936->6937 6938 4075a4 6937->6938 6633 4028ac 6634 402594 18 API calls 6633->6634 6635 4028b6 6634->6635 6939 4093ac 6942 409278 6939->6942 6943 409281 6942->6943 6944 403198 4 API calls 6943->6944 6945 40928f 6943->6945 6944->6943 6946 4055b0 6947 4055c3 6946->6947 6948 4052a8 33 API calls 6947->6948 6949 4055d7 6948->6949 6636 40acb4 6637 40acd9 6636->6637 6638 409ddc 29 API calls 6637->6638 6641 40acde 6638->6641 6639 40ad31 6670 4026c4 GetSystemTime 6639->6670 6641->6639 6644 409254 18 API calls 6641->6644 6642 40ad36 6643 4097d0 46 API calls 6642->6643 6645 40ad3e 6643->6645 6646 40ad0d 6644->6646 6647 4031e8 18 API calls 6645->6647 6650 40ad15 MessageBoxA 6646->6650 6648 40ad4b 6647->6648 6649 406d78 19 API calls 6648->6649 6651 40ad58 6649->6651 6650->6639 6652 40ad22 6650->6652 6653 406b10 19 API calls 6651->6653 6654 405cb4 19 API calls 6652->6654 6655 40ad68 6653->6655 6654->6639 6656 406a88 19 API calls 6655->6656 6657 40ad79 6656->6657 6658 403340 18 API calls 6657->6658 6659 40ad87 6658->6659 6660 4031e8 18 API calls 6659->6660 6661 40ad97 6660->6661 6662 40795c 37 API calls 6661->6662 6663 40add6 6662->6663 6664 402594 18 API calls 6663->6664 6665 40adf6 6664->6665 6666 407ea4 19 API calls 6665->6666 6667 40ae38 6666->6667 6668 408134 35 API calls 6667->6668 6669 40ae5f 6668->6669 6670->6642 6671 401ab9 6672 401a96 6671->6672 6673 401aa9 RtlDeleteCriticalSection 6672->6673 6674 401a9f RtlLeaveCriticalSection 6672->6674 6674->6673

                                        Control-flow Graph

                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,00000000,004048EE,?,?,?,?,00000000,?,0040AAB8), ref: 0040466F
                                        • GetVersion.KERNEL32(kernel32.dll,00000000,004048EE,?,?,?,?,00000000,?,0040AAB8), ref: 00404676
                                        • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0040468B
                                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 004046B3
                                        • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004048B5
                                        • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004048CB
                                        • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,kernel32.dll,00000000,004048EE,?,?,?,?,00000000,?,0040AAB8), ref: 004048D6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModulePolicyProcessVersion
                                        • String ID: SetDefaultDllDirectories$SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$apphelp.dll$clbcatq.dll$comres.dll$cryptbase.dll$dwmapi.dll$kernel32.dll$oleacc.dll$profapi.dll$propsys.dll$setupapi.dll$userenv.dll$uxtheme.dll$version.dll
                                        • API String ID: 3297890031-2388063882
                                        • Opcode ID: 6206738d1768993a266272c574535deacfcb651ff371490375f42cd1ba234e07
                                        • Instruction ID: 9e7baa03e94b680687c531d55c537e9110a8ac934c54f9465d7227ec1282235b
                                        • Opcode Fuzzy Hash: 6206738d1768993a266272c574535deacfcb651ff371490375f42cd1ba234e07
                                        • Instruction Fuzzy Hash: B2611070600149AFDB00FBF6DA8398E77A99F80309B2045BBA604772D6D778EF059B5D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 230 40a018-40a03c GetSystemInfo VirtualQuery 231 40a042 230->231 232 40a0cc-40a0d3 230->232 233 40a0c1-40a0c6 231->233 233->232 234 40a044-40a04b 233->234 235 40a0ad-40a0bf VirtualQuery 234->235 236 40a04d-40a051 234->236 235->232 235->233 236->235 237 40a053-40a05b 236->237 238 40a06c-40a07d VirtualProtect 237->238 239 40a05d-40a060 237->239 241 40a081-40a083 238->241 242 40a07f 238->242 239->238 240 40a062-40a065 239->240 240->238 243 40a067-40a06a 240->243 244 40a092-40a095 241->244 242->241 243->238 243->241 245 40a085-40a08e call 40a010 244->245 246 40a097-40a099 244->246 245->244 246->235 248 40a09b-40a0a8 VirtualProtect 246->248 248->235
                                        APIs
                                        • GetSystemInfo.KERNEL32(?), ref: 0040A02A
                                        • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 0040A035
                                        • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 0040A076
                                        • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 0040A0A8
                                        • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 0040A0B8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Virtual$ProtectQuery$InfoSystem
                                        • String ID:
                                        • API String ID: 2441996862-0
                                        • Opcode ID: 9ac3e84cebc6f461d525c38fea5a33ab6cb0156132446b09103c7350edb016b4
                                        • Instruction ID: f5309bbdda193f62b4be3c179e768a57e3f3f612c04de257546ab44ee606f1f6
                                        • Opcode Fuzzy Hash: 9ac3e84cebc6f461d525c38fea5a33ab6cb0156132446b09103c7350edb016b4
                                        • Instruction Fuzzy Hash: 142190B1240308ABD6309E69CC85F5777D8DF85354F08493AFAC5E33C2D63DE860866A
                                        APIs
                                        • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040D4C0,00000001,?,00405727,?,00000000,00405806), ref: 0040567A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID:
                                        • API String ID: 2299586839-0
                                        • Opcode ID: 7459d56e7c64c485d498697c6eb088ce7aaa21e11ea95b6c07db09bb75ef8263
                                        • Instruction ID: d14b50eaf9df709ed1cf3d56deeb77a2084f63d122e7671578114c6bad5e918b
                                        • Opcode Fuzzy Hash: 7459d56e7c64c485d498697c6eb088ce7aaa21e11ea95b6c07db09bb75ef8263
                                        • Instruction Fuzzy Hash: 68E0D87170021427D711A9699C86EFB735CDB58314F4006BFB909E73C6EDB59E8046ED

                                        Control-flow Graph

                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004095DE,?,?,?,?,00000000,00000000,?,0040AACC), ref: 00409542
                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00409548
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004095DE,?,?,?,?,00000000,00000000,?,0040AACC), ref: 0040955C
                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00409562
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                        • API String ID: 1646373207-2130885113
                                        • Opcode ID: 9711803e7e97600f978dac47126909fe1692835b2a3da83a2610dda9fb37f9b7
                                        • Instruction ID: 3d1781b746021e9606986d5b6d55f7cbde73f6a932e0ba52378b2443c6d91f24
                                        • Opcode Fuzzy Hash: 9711803e7e97600f978dac47126909fe1692835b2a3da83a2610dda9fb37f9b7
                                        • Instruction Fuzzy Hash: 79115470908244BEDB01FBA2CD43B5A7B68D784744F204477F501762D3DA7D5E08DA2D

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00409AE8: GetLastError.KERNEL32(00000000,00409B8B), ref: 00409B0C
                                        • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AF9E
                                        • SetWindowLongA.USER32(00020450,000000FC,Function_00009E00), ref: 0040AFB5
                                          • Part of subcall function 00406FCC: GetCommandLineA.KERNEL32(00000000,00407010,?,?,?,?,00000000), ref: 00406FE4
                                          • Part of subcall function 00409E8C: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78,00000000,00409F5F), ref: 00409EFC
                                          • Part of subcall function 00409E8C: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78,00000000), ref: 00409F10
                                          • Part of subcall function 00409E8C: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409F29
                                          • Part of subcall function 00409E8C: GetExitCodeProcess.KERNEL32(?), ref: 00409F3B
                                          • Part of subcall function 00409E8C: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78), ref: 00409F44
                                        • RemoveDirectoryA.KERNEL32(00000000,0040B0F4,Function_00009E00,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040B0A1
                                        • DestroyWindow.USER32(00020450,0040B0F4,Function_00009E00,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040B0B5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$CloseCreateHandleProcess$CodeCommandDestroyDirectoryErrorExitLastLineLongMultipleObjectsRemoveWait
                                        • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                        • API String ID: 849423697-3001827809
                                        • Opcode ID: 08113ef3ce2da518920d8c13058acc363925f6704d668fbfbfd076efd3cb2295
                                        • Instruction ID: d96ad4f456555d006dfdd6a111ba55fa130d32b67bbf9cfe256734ebf9c0f5f1
                                        • Opcode Fuzzy Hash: 08113ef3ce2da518920d8c13058acc363925f6704d668fbfbfd076efd3cb2295
                                        • Instruction Fuzzy Hash: 95413070A006449BD711EBE9EE85B9A77E4EB58304F10427BF514BB2E1C7B89C49CB9C

                                        Control-flow Graph

                                        APIs
                                        • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AF9E
                                        • SetWindowLongA.USER32(00020450,000000FC,Function_00009E00), ref: 0040AFB5
                                          • Part of subcall function 00406FCC: GetCommandLineA.KERNEL32(00000000,00407010,?,?,?,?,00000000), ref: 00406FE4
                                          • Part of subcall function 00409E8C: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78,00000000,00409F5F), ref: 00409EFC
                                          • Part of subcall function 00409E8C: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78,00000000), ref: 00409F10
                                          • Part of subcall function 00409E8C: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409F29
                                          • Part of subcall function 00409E8C: GetExitCodeProcess.KERNEL32(?), ref: 00409F3B
                                          • Part of subcall function 00409E8C: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78), ref: 00409F44
                                        • RemoveDirectoryA.KERNEL32(00000000,0040B0F4,Function_00009E00,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040B0A1
                                        • DestroyWindow.USER32(00020450,0040B0F4,Function_00009E00,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040B0B5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$CloseCreateHandleProcess$CodeCommandDestroyDirectoryExitLineLongMultipleObjectsRemoveWait
                                        • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                        • API String ID: 3586484885-3001827809
                                        • Opcode ID: 3e82f52e343573e9ee8ccf82fbc097b32b2466bbbc9497f93a956efcdcfa5545
                                        • Instruction ID: 22e85acea042a1c9b241f29fbd05952515ad99a43a6683ef4ce3977848861488
                                        • Opcode Fuzzy Hash: 3e82f52e343573e9ee8ccf82fbc097b32b2466bbbc9497f93a956efcdcfa5545
                                        • Instruction Fuzzy Hash: 00410971A006049BD710EBE9EE85BAA77A4EB58304F10427AF514BB2E1D7789C48CB9C

                                        Control-flow Graph

                                        APIs
                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78,00000000,00409F5F), ref: 00409EFC
                                        • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78,00000000), ref: 00409F10
                                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409F29
                                        • GetExitCodeProcess.KERNEL32(?), ref: 00409F3B
                                        • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409F84,?,00409F78), ref: 00409F44
                                          • Part of subcall function 00409AE8: GetLastError.KERNEL32(00000000,00409B8B), ref: 00409B0C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                        • String ID: D
                                        • API String ID: 3356880605-2746444292
                                        • Opcode ID: 7df226d52587f770460e981b15b5d19bc6ab37567cde566df4420800d0169a2d
                                        • Instruction ID: c83664c5db2498e28503e3c1fa1a9009394fa647db11d74ebe1f458a85c7f7ae
                                        • Opcode Fuzzy Hash: 7df226d52587f770460e981b15b5d19bc6ab37567cde566df4420800d0169a2d
                                        • Instruction Fuzzy Hash: 19113DB16042096ADB00EBE6CC42F9EB7ACEF89714F50017AB604F72C6DA789D048669

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 211 4019dc-4019e7 212 401abb-401abd 211->212 213 4019ed-401a02 211->213 214 401a04-401a09 RtlEnterCriticalSection 213->214 215 401a0e-401a2d LocalFree 213->215 214->215 216 401a41-401a47 215->216 217 401a49-401a6e call 4012dc * 3 216->217 218 401a2f-401a3f VirtualFree 216->218 225 401a70-401a85 LocalFree 217->225 226 401a87-401a9d 217->226 218->216 225->225 225->226 228 401aa9-401ab3 RtlDeleteCriticalSection 226->228 229 401a9f-401aa4 RtlLeaveCriticalSection 226->229 229->228
                                        APIs
                                        • RtlEnterCriticalSection.KERNEL32(0040D41C,00000000,00401AB4), ref: 00401A09
                                        • LocalFree.KERNEL32(00000000,00000000,00401AB4), ref: 00401A1B
                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,00401AB4), ref: 00401A3A
                                        • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00401AB4), ref: 00401A79
                                        • RtlLeaveCriticalSection.KERNEL32(0040D41C,00401ABB), ref: 00401AA4
                                        • RtlDeleteCriticalSection.KERNEL32(0040D41C,00401ABB), ref: 00401AAE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                        • String ID:
                                        • API String ID: 3782394904-0
                                        • Opcode ID: 15ada844baba389fd7ade49cb76aeb00e47773f80fc89bec03b8d509a4e9cc02
                                        • Instruction ID: 2a1e8c518b16d72ac75c21d19d034316e64e92064156904d4596c6339aa50fda
                                        • Opcode Fuzzy Hash: 15ada844baba389fd7ade49cb76aeb00e47773f80fc89bec03b8d509a4e9cc02
                                        • Instruction Fuzzy Hash: 65114274B422805ADB11EBE99EC6F5276689785708F44407FF448B62F2C67CA848CB6D

                                        Control-flow Graph

                                        APIs
                                        • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040AD18
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Message
                                        • String ID: .tmp$@z@$d~@
                                        • API String ID: 2030045667-2080866987
                                        • Opcode ID: 2b85bf55d00087c4ee4d3d53e5bb2d438756d7f2ac1061807f4f56549d36f6d1
                                        • Instruction ID: dd76c9251985b1ff4450233ddc9785193850427026a6d5c0e90a1b5537d094b7
                                        • Opcode Fuzzy Hash: 2b85bf55d00087c4ee4d3d53e5bb2d438756d7f2ac1061807f4f56549d36f6d1
                                        • Instruction Fuzzy Hash: 4B419570A046009FD705EFA5DE91A2A77A5EB59304B11447BF804BB7E1CA79AC04CB9D

                                        Control-flow Graph

                                        APIs
                                        • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040AD18
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Message
                                        • String ID: .tmp$@z@$d~@
                                        • API String ID: 2030045667-2080866987
                                        • Opcode ID: 81bdbc4c120031e8217955485f9b4631603aba5f155e491865d52178ba1ca84f
                                        • Instruction ID: bf9d77eae5c07405b3109107b1835c74e23881a639ebcc62aff07684a9841850
                                        • Opcode Fuzzy Hash: 81bdbc4c120031e8217955485f9b4631603aba5f155e491865d52178ba1ca84f
                                        • Instruction Fuzzy Hash: BF419570B006019FD705EFA5DE92A6A77A5EB59304B10447BF804BB7E1CBB9AC04CB9D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 345 403d02-403d10 346 403d12-403d19 345->346 347 403d29-403d30 345->347 348 403ddf-403de5 ExitProcess 346->348 349 403d1f 346->349 350 403d32-403d3c 347->350 351 403d3e-403d45 347->351 349->347 352 403d21-403d23 349->352 350->347 353 403d47-403d51 351->353 354 403db8-403dcc call 403cc8 * 2 call 4019dc 351->354 352->347 355 403dea-403e19 call 4030b4 352->355 358 403d56-403d62 353->358 371 403dd1-403dd8 354->371 358->358 361 403d64-403d6e 358->361 362 403d73-403d84 361->362 362->362 365 403d86-403d8d 362->365 367 403da4-403db3 call 403fe4 call 403f67 365->367 368 403d8f-403da2 MessageBoxA 365->368 367->354 368->354 371->355 373 403dda call 4030b4 371->373 373->348
                                        APIs
                                        • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                        • ExitProcess.KERNEL32 ref: 00403DE5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ExitMessageProcess
                                        • String ID: Error$Runtime error at 00000000
                                        • API String ID: 1220098344-2970929446
                                        • Opcode ID: 06c1af3a807ed13e53e556f1551eab319716f56e5b0a099a7904d38b73613604
                                        • Instruction ID: 19c161ad1fd1f445befe0ff666437f64548d8e35ccd3b0abec794ae5707e41c3
                                        • Opcode Fuzzy Hash: 06c1af3a807ed13e53e556f1551eab319716f56e5b0a099a7904d38b73613604
                                        • Instruction Fuzzy Hash: 0421C834E152418AE714EFE59A817153E989B5930DF04817BD504B73E3C67C9A4EC36E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 376 401918-40193a RtlInitializeCriticalSection 377 401946-40197c call 4012dc * 3 LocalAlloc 376->377 378 40193c-401941 RtlEnterCriticalSection 376->378 385 4019ad-4019c1 377->385 386 40197e 377->386 378->377 390 4019c3-4019c8 RtlLeaveCriticalSection 385->390 391 4019cd 385->391 387 401983-401995 386->387 387->387 389 401997-4019a6 387->389 389->385 390->391
                                        APIs
                                        • RtlInitializeCriticalSection.KERNEL32(0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                        • RtlEnterCriticalSection.KERNEL32(0040D41C,0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                        • LocalAlloc.KERNEL32(00000000,00000FF8,0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                        • RtlLeaveCriticalSection.KERNEL32(0040D41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                        • String ID:
                                        • API String ID: 730355536-0
                                        • Opcode ID: 8414f493d6facd55d67710fc415b07d88c3ef9d9c2abb5a5bebd487d02bb0f40
                                        • Instruction ID: ca3d82fa79822ebb621977d4c6345e30539334a4bf25a92a69ec079a2ec9ab95
                                        • Opcode Fuzzy Hash: 8414f493d6facd55d67710fc415b07d88c3ef9d9c2abb5a5bebd487d02bb0f40
                                        • Instruction Fuzzy Hash: F20192B4E442405EE715ABFA9A56B253BA4D789704F1080BFF044F72F2C67C6458C75D

                                        Control-flow Graph

                                        APIs
                                        • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,004098BF,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409816
                                        • GetLastError.KERNEL32(00000000,00000000,?,00000000,004098BF,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040981F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID: .tmp
                                        • API String ID: 1375471231-2986845003
                                        • Opcode ID: bcfdd319b68c6234bb3b3c2b6e0791bb6992f3f2d01426f3b13c32e67b0b1ca6
                                        • Instruction ID: 48b9f2fdce89366346d31e95a36bae064327856a755920fc8e2ea7d65379a348
                                        • Opcode Fuzzy Hash: bcfdd319b68c6234bb3b3c2b6e0791bb6992f3f2d01426f3b13c32e67b0b1ca6
                                        • Instruction Fuzzy Hash: 23211575A10208ABDB05FFE5C8529DFB7B9EB48304F10457BE901B73C2DA789E05CAA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 487 409978-409989 488 4099d2-4099d7 487->488 489 40998b-40998c 487->489 490 40998e-409991 489->490 491 409993-40999c Sleep 490->491 492 40999e-4099a1 490->492 493 4099ac-4099b1 call 409438 491->493 492->493 494 4099a3-4099a7 Sleep 492->494 496 4099b6-4099b8 493->496 494->493 496->488 497 4099ba-4099c2 GetLastError 496->497 497->488 498 4099c4-4099cc GetLastError 497->498 498->488 499 4099ce-4099d0 498->499 499->488 499->490
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLastSleep
                                        • String ID:
                                        • API String ID: 1458359878-0
                                        • Opcode ID: 1c248293a53693e5016b31d34f136ae5d975e0b827204b722e02cf7f87de802c
                                        • Instruction ID: 55ccdd2d2ee1bdbcd31af2ea42c7aee1c1b219f05c386506858fe4dd166fe014
                                        • Opcode Fuzzy Hash: 1c248293a53693e5016b31d34f136ae5d975e0b827204b722e02cf7f87de802c
                                        • Instruction Fuzzy Hash: 6AF090B2A0511856CA25A6AE9881B6FB28CEAC0368714413FFA44F7383D43DDC0152BA

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 500 401fd4-401fe6 501 401fe8 call 401918 500->501 502 401ffb-402010 500->502 506 401fed-401fef 501->506 504 402012-402017 RtlEnterCriticalSection 502->504 505 40201c-402025 502->505 504->505 507 402027 505->507 508 40202c-402032 505->508 506->502 509 401ff1-401ff6 506->509 507->508 510 402038-40203c 508->510 511 4020cb-4020d1 508->511 512 40214f-402158 509->512 515 402041-402050 510->515 516 40203e 510->516 513 4020d3-4020e0 511->513 514 40211d-40211f call 401ee0 511->514 517 4020e2-4020ea 513->517 518 4020ef-40211b call 402f54 513->518 524 402124-40213b 514->524 515->511 519 402052-402060 515->519 516->515 517->518 518->512 522 402062-402066 519->522 523 40207c-402080 519->523 528 402068 522->528 529 40206b-40207a 522->529 525 402082 523->525 526 402085-4020a0 523->526 532 402147 524->532 533 40213d-402142 RtlLeaveCriticalSection 524->533 525->526 531 4020a2-4020c6 call 402f54 526->531 528->529 529->531 531->512 533->532
                                        APIs
                                        • RtlEnterCriticalSection.KERNEL32(0040D41C,00000000,00402148), ref: 00402017
                                          • Part of subcall function 00401918: RtlInitializeCriticalSection.KERNEL32(0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                          • Part of subcall function 00401918: RtlEnterCriticalSection.KERNEL32(0040D41C,0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                          • Part of subcall function 00401918: LocalAlloc.KERNEL32(00000000,00000FF8,0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                          • Part of subcall function 00401918: RtlLeaveCriticalSection.KERNEL32(0040D41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                        • String ID:
                                        • API String ID: 296031713-0
                                        • Opcode ID: f63e8093b7c21695f3c5f0f727b66ad92d47f8bd02e6a7dbcfb51ec74dbfdd03
                                        • Instruction ID: 72c497f3d878e3d6a4a9583ee00a9bb41c235ef620702b970aaba137d6b92855
                                        • Opcode Fuzzy Hash: f63e8093b7c21695f3c5f0f727b66ad92d47f8bd02e6a7dbcfb51ec74dbfdd03
                                        • Instruction Fuzzy Hash: 2341C2B2E007019FD710CFA9DE8561A7BA0EB58314B15817BD549B73E1D378A849CB48
                                        APIs
                                        • DeleteFileA.KERNEL32(00000000,00000000,00409495), ref: 0040946F
                                        • GetLastError.KERNEL32(00000000,00000000,00409495), ref: 00409477
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: DeleteErrorFileLast
                                        • String ID:
                                        • API String ID: 2018770650-0
                                        • Opcode ID: cef11d40a142b83803210e371880030b93b56e60c6b6d61991ebac398e5bf5ba
                                        • Instruction ID: 3a2bfa3924d7da3ec485a5c2eebce42195f764b2344cc107bbad9e5710e02f6c
                                        • Opcode Fuzzy Hash: cef11d40a142b83803210e371880030b93b56e60c6b6d61991ebac398e5bf5ba
                                        • Instruction Fuzzy Hash: 3EF0AF71A08608ABCB01EFB59C4159EB3A8EB8831476045BBF808F32C3E6395E018599
                                        APIs
                                        • SetErrorMode.KERNEL32(00008000), ref: 00407426
                                        • LoadLibraryA.KERNEL32(00000000,00000000,00407470,?,00000000,0040748E,?,00008000), ref: 00407455
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLibraryLoadMode
                                        • String ID:
                                        • API String ID: 2987862817-0
                                        • Opcode ID: 7c3291ca482dc4e73124ef6673235b1c1e4da24983ec1cf579c69c8d77eb9c24
                                        • Instruction ID: f52ba4a9feec5d4d4615fe406f45eaba014741ff6d770d8a308f032ff20cb8dd
                                        • Opcode Fuzzy Hash: 7c3291ca482dc4e73124ef6673235b1c1e4da24983ec1cf579c69c8d77eb9c24
                                        • Instruction Fuzzy Hash: 26F08270A14708BEDB025FB68C5282ABAECE749B1475288B6F900A2AD2E53C5820C569
                                        APIs
                                        • RemoveDirectoryA.KERNEL32(00000000,0040B0F4,Function_00009E00,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040B0A1
                                        • DestroyWindow.USER32(00020450,0040B0F4,Function_00009E00,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040B0B5
                                          • Part of subcall function 00409978: Sleep.KERNEL32(?), ref: 00409997
                                          • Part of subcall function 00409978: GetLastError.KERNEL32(?), ref: 004099BA
                                          • Part of subcall function 00409978: GetLastError.KERNEL32(?), ref: 004099C4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLast$DestroyDirectoryRemoveSleepWindow
                                        • String ID:
                                        • API String ID: 2192421792-0
                                        • Opcode ID: 42b787c3d9f5bd55058fd6c8f85d5fac1abeba9ca40111c3c6816528150393fb
                                        • Instruction ID: 80fe6e0f7824975e72fa29ef6d7a10d3d2514edd0f005a574200bdc13b2d30de
                                        • Opcode Fuzzy Hash: 42b787c3d9f5bd55058fd6c8f85d5fac1abeba9ca40111c3c6816528150393fb
                                        • Instruction Fuzzy Hash: C9F0CD70A105009BD725ABA9EE99B2632E5E7A4305F04453AA110BB2F1C7BD9C88CA8D
                                        APIs
                                        • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 00407B07
                                        • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407B0F
                                          • Part of subcall function 00407908: GetLastError.KERNEL32(@z@,004079A6,?,?,020F03AC,?,0040AB3B,00000001,00000000,00000002,00000000,0040B132,?,00000000,0040B169), ref: 0040790B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLast$FilePointer
                                        • String ID:
                                        • API String ID: 1156039329-0
                                        • Opcode ID: 1efacffe01c84972d5e79d9e95937cadebc248d177395cf3b78af7fa5ea4bab0
                                        • Instruction ID: 2b235249b0a7ee07bcb8c1d8603e448d3cb6330bb11491e7c51f1e2a1a123f33
                                        • Opcode Fuzzy Hash: 1efacffe01c84972d5e79d9e95937cadebc248d177395cf3b78af7fa5ea4bab0
                                        • Instruction Fuzzy Hash: 13E092767081005FD610E55DC881A9B33DCDFC53A8F004537B654EB1D1D675B8008366
                                        APIs
                                        • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407ABF
                                        • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407ACE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorFileLastRead
                                        • String ID:
                                        • API String ID: 1948546556-0
                                        • Opcode ID: 62bc4757170e124d293d2e1ae2527044cf5abdc53c736f625f33b9d4ecf98daf
                                        • Instruction ID: e15dfe76c2c2153dd18fa5b66318eead10a3336b01bc7908bb5745e2d55223c8
                                        • Opcode Fuzzy Hash: 62bc4757170e124d293d2e1ae2527044cf5abdc53c736f625f33b9d4ecf98daf
                                        • Instruction Fuzzy Hash: DAE092A17181106EEB20A65E9884F6B67DCCBC9314F04817BF508EB282D6B8DC008777
                                        APIs
                                        • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 00407A57
                                        • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 00407A63
                                          • Part of subcall function 00407908: GetLastError.KERNEL32(@z@,004079A6,?,?,020F03AC,?,0040AB3B,00000001,00000000,00000002,00000000,0040B132,?,00000000,0040B169), ref: 0040790B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLast$FilePointer
                                        • String ID:
                                        • API String ID: 1156039329-0
                                        • Opcode ID: 0f363b337b605630cba33b2c75e34e58c088fa0b570b5e63e1fb747f55acf4b7
                                        • Instruction ID: b2e9c79a061d94bc6c1ac4e6a69a759f2ef78579472dc31f5d333ffaff30462c
                                        • Opcode Fuzzy Hash: 0f363b337b605630cba33b2c75e34e58c088fa0b570b5e63e1fb747f55acf4b7
                                        • Instruction Fuzzy Hash: C7E01AB1A002109EEB20EBB58981B5662D89B44364B048576A654DB2C6D274E800CB66
                                        APIs
                                        • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Virtual$AllocFree
                                        • String ID:
                                        • API String ID: 2087232378-0
                                        • Opcode ID: e3bf9ef34a83e5b8d51b462a41b7d68ce2248d991abf67c6f3f1ae437811ef8b
                                        • Instruction ID: 66c3474f10fe082fedccbde799efe3bb5b58ff080b56d2e089ed954f0af67306
                                        • Opcode Fuzzy Hash: e3bf9ef34a83e5b8d51b462a41b7d68ce2248d991abf67c6f3f1ae437811ef8b
                                        • Instruction Fuzzy Hash: DAF02772B0032017DB2069AA0CC1B536AC59F85B90F1540BBFA4CFF3F9D2B98C0442A9
                                        APIs
                                        • GetSystemDefaultLCID.KERNEL32(00000000,00405806), ref: 004056EF
                                          • Part of subcall function 0040512C: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00405149
                                          • Part of subcall function 0040565C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040D4C0,00000001,?,00405727,?,00000000,00405806), ref: 0040567A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: DefaultInfoLoadLocaleStringSystem
                                        • String ID:
                                        • API String ID: 1658689577-0
                                        • Opcode ID: cc3e47e390c1b33211b3d9873ad613d49b391b3cefde462b73c2cd7d0ab13d86
                                        • Instruction ID: 82c784cd7830e1ca4cd44457dad2f2fa429cf4e25a926eea24d274db27b93b1b
                                        • Opcode Fuzzy Hash: cc3e47e390c1b33211b3d9873ad613d49b391b3cefde462b73c2cd7d0ab13d86
                                        • Instruction Fuzzy Hash: C1316F75E00509ABCB00EF95CC819EEB379FF84304F508577E819BB285E739AE058B98
                                        APIs
                                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00407A34
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID:
                                        • API String ID: 823142352-0
                                        • Opcode ID: 5bc26aafbd8d3cc7e99f1b4789c5f450247a7b7967715b9db18694e2d0d8c5c5
                                        • Instruction ID: 042ae40820150c0b4851109f40d588701a9899a67d40570aa5757512981d293a
                                        • Opcode Fuzzy Hash: 5bc26aafbd8d3cc7e99f1b4789c5f450247a7b7967715b9db18694e2d0d8c5c5
                                        • Instruction Fuzzy Hash: 6FE0ED753442586EE340DAED6D81FA677DC974A714F008132B998DB382D4719D118BA8
                                        APIs
                                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00407A34
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID:
                                        • API String ID: 823142352-0
                                        • Opcode ID: b99464c5deed90c436ccb8039285842caa459c4cfee6896295820f2cd2136feb
                                        • Instruction ID: 8ced2eed2e357b00b36525f681a949bcf9e14530d7ff6951507f50c56b932d1f
                                        • Opcode Fuzzy Hash: b99464c5deed90c436ccb8039285842caa459c4cfee6896295820f2cd2136feb
                                        • Instruction Fuzzy Hash: 95E0ED753442586EE240DAED6D81F96779C974A714F008122B998DB382D4719D118BA8
                                        APIs
                                        • GetFileAttributesA.KERNEL32(00000000,00000000,00406E74,?,?,?,?,00000000,?,00406E89,004071E3,00000000,00407228,?,?,?), ref: 00406E57
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: 8e258e6088ff2729972a65b025d9916a43b1951ab399dc39633550a2ec6328db
                                        • Instruction ID: 5d103c24ca312c86e291a35865c809fd23e08ae6a8f6832d02acb9ca341f4446
                                        • Opcode Fuzzy Hash: 8e258e6088ff2729972a65b025d9916a43b1951ab399dc39633550a2ec6328db
                                        • Instruction Fuzzy Hash: ADE0E530300308BBD301EE72DC42D0ABBACDB89704B920476B400A26C2D5785E108068
                                        APIs
                                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00407B5B
                                          • Part of subcall function 00407908: GetLastError.KERNEL32(@z@,004079A6,?,?,020F03AC,?,0040AB3B,00000001,00000000,00000002,00000000,0040B132,?,00000000,0040B169), ref: 0040790B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorFileLastWrite
                                        • String ID:
                                        • API String ID: 442123175-0
                                        • Opcode ID: 006c08a2f5d9871c0a1980147acda0c26795bf6e192fd3a261290223f417e960
                                        • Instruction ID: 30ae2be02b9f15b9cba2c15a2490e5271afae9e105f225727eb8a6e5b17a7771
                                        • Opcode Fuzzy Hash: 006c08a2f5d9871c0a1980147acda0c26795bf6e192fd3a261290223f417e960
                                        • Instruction Fuzzy Hash: 3FE06D727081106BD710A65A98C0E5777ECCF85764F00403BB608DB281C574AC01867A
                                        APIs
                                        • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004095C3,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0040771F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FormatMessage
                                        • String ID:
                                        • API String ID: 1306739567-0
                                        • Opcode ID: b9ec76e9ce0cf7c9b11fbb0d22c3d5372d7ad8be8fd57ca1cb8678c9dba0653c
                                        • Instruction ID: cd8e50964804133df0be52219a4bf40107040f8cbf32d452899ff663d46cfc84
                                        • Opcode Fuzzy Hash: b9ec76e9ce0cf7c9b11fbb0d22c3d5372d7ad8be8fd57ca1cb8678c9dba0653c
                                        • Instruction Fuzzy Hash: 7CE04FB1B8830126F62519545C87F7B164E47C0B84F64403B7B50EE3D2DABEB94B429F
                                        APIs
                                        • SetEndOfFile.KERNEL32(?,02370004,0040AEF9,00000000), ref: 00407B2F
                                          • Part of subcall function 00407908: GetLastError.KERNEL32(@z@,004079A6,?,?,020F03AC,?,0040AB3B,00000001,00000000,00000002,00000000,0040B132,?,00000000,0040B169), ref: 0040790B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorFileLast
                                        • String ID:
                                        • API String ID: 734332943-0
                                        • Opcode ID: 879c3aef20c26933657ab209da42f9acde188edf801b45e7798529f352953bc6
                                        • Instruction ID: c094c2b5ec81b014f7647aed55f46f5be6f6c9eff784118cc89584b894c57cec
                                        • Opcode Fuzzy Hash: 879c3aef20c26933657ab209da42f9acde188edf801b45e7798529f352953bc6
                                        • Instruction Fuzzy Hash: AFC04CB1B141045BDB00A6AA85C2A1672DC5A482083404076B504DB247D678F8504755
                                        APIs
                                        • SetErrorMode.KERNEL32(?,00407495), ref: 00407488
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorMode
                                        • String ID:
                                        • API String ID: 2340568224-0
                                        • Opcode ID: 3513d2af45e6240a0d0531d222129c39ee3681c2f506e4d79ab3159715fa7836
                                        • Instruction ID: fee884e8913e26ea2b20a1c4334648daa9a2c142b99fe0c27f31eb53e83e856d
                                        • Opcode Fuzzy Hash: 3513d2af45e6240a0d0531d222129c39ee3681c2f506e4d79ab3159715fa7836
                                        • Instruction Fuzzy Hash: C6B09B76A0C2006DE705DEE5645153877D4D7C47103B14877F100D65C1D93C94108519
                                        APIs
                                        • SetErrorMode.KERNEL32(?,00407495), ref: 00407488
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorMode
                                        • String ID:
                                        • API String ID: 2340568224-0
                                        • Opcode ID: a150b1ccc28004dcf137bb0f7729195edfbe3cd1821f17504bb802deebb031e2
                                        • Instruction ID: c7febe38ef9f985557de65a49c8e3beabd1cb56d23a205183508381f5ecd03fa
                                        • Opcode Fuzzy Hash: a150b1ccc28004dcf137bb0f7729195edfbe3cd1821f17504bb802deebb031e2
                                        • Instruction Fuzzy Hash: EEA022A8C08008BACE00EEE88080A3C33A82A883003C008E23200B2082C03CE000820B
                                        APIs
                                        • CharPrevA.USER32(?,?,00406DBC,?,00406A99,?,?,0040959C,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004095DE), ref: 00406DC2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CharPrev
                                        • String ID:
                                        • API String ID: 122130370-0
                                        • Opcode ID: d44d7a6884596ca32ea416b380b4e8946229468d7e659b1743621721cd4621d4
                                        • Instruction ID: 95ac89871b9e49aa2ffc5daef894b278f4bc9d8aafa7dca88aae54a0e9e7edad
                                        • Opcode Fuzzy Hash: d44d7a6884596ca32ea416b380b4e8946229468d7e659b1743621721cd4621d4
                                        • Instruction Fuzzy Hash:
                                        APIs
                                        • VirtualFree.KERNEL32(FFFFFFFF,00000000,00008000), ref: 00401570
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FreeVirtual
                                        • String ID:
                                        • API String ID: 1263568516-0
                                        • Opcode ID: 4069ebeab1ecaaa6227b0d54b40c6f300b7ac340d294d08becb426def254346f
                                        • Instruction ID: ed4d65520c00d96bd64096adec8f86249eaccd310614155879460d3c6a05d2ca
                                        • Opcode Fuzzy Hash: 4069ebeab1ecaaa6227b0d54b40c6f300b7ac340d294d08becb426def254346f
                                        • Instruction Fuzzy Hash: EC21F970608711AFC700DF19C880A5AB7E0EFC4760F14C96AE899AB3A1D374EC45CB9A
                                        APIs
                                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0040841C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 4fb7b38294bdf3fcfaab8189c6b2d31175aea6f156bf412ec83bea8fb86574a1
                                        • Instruction ID: 68aadeca7c52aa1374545c41b60170f14cbd4c45bc0c673343149efe9cc76684
                                        • Opcode Fuzzy Hash: 4fb7b38294bdf3fcfaab8189c6b2d31175aea6f156bf412ec83bea8fb86574a1
                                        • Instruction Fuzzy Hash: 7B116D716042059BDB00EF19C981B4B37A4AF84359F04847EF998AF2C7DF78D8058B6A
                                        APIs
                                        • VirtualFree.KERNEL32(00000000,00000000,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FreeVirtual
                                        • String ID:
                                        • API String ID: 1263568516-0
                                        • Opcode ID: ae0a35522eec5974c246f826a8cf4d5dbbbccf5172876aab042d95c32cb5ff07
                                        • Instruction ID: d2bd3e7102ef9204b91f8816383c595cec19663beeae75bd92b4ab4675e4226e
                                        • Opcode Fuzzy Hash: ae0a35522eec5974c246f826a8cf4d5dbbbccf5172876aab042d95c32cb5ff07
                                        • Instruction Fuzzy Hash: E401F772A042104BC310AF28DDC092A77D4DB84324F19497ED985B73A1D23B7C0587A8
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseHandle
                                        • String ID:
                                        • API String ID: 2962429428-0
                                        • Opcode ID: b39bb4760bd10523e8477a282be401f25cebef3596302d631dfd489199f81fc2
                                        • Instruction ID: 1333f047c66b0d9688efca9d11da816c999e90cdcd736c06211d3ba452c28d9f
                                        • Opcode Fuzzy Hash: b39bb4760bd10523e8477a282be401f25cebef3596302d631dfd489199f81fc2
                                        • Instruction Fuzzy Hash: B4D0A7D1B00A6007E315F2BF498964B92C85F88655F08843BF685E73D1D67CAC00D38D
                                        APIs
                                        • VirtualFree.KERNEL32(?,00000000,00008000,?,00408319), ref: 0040834B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FreeVirtual
                                        • String ID:
                                        • API String ID: 1263568516-0
                                        • Opcode ID: 230c808500062b5c35cb01985a317edf3050be8cd861299b6b1c2025d975cd45
                                        • Instruction ID: 2902acfab023b9b2f0de86f7a78627cda5d54dfc4b924a21aa22279fbea0049e
                                        • Opcode Fuzzy Hash: 230c808500062b5c35cb01985a317edf3050be8cd861299b6b1c2025d975cd45
                                        • Instruction Fuzzy Hash: 64D002B17553046FDB90EEB94DC5B0237D87B48700F14457A6E44EB2C6F775D8008B14
                                        APIs
                                        • GetCurrentProcess.KERNEL32(00000028), ref: 004098F7
                                        • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004098FD
                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409916
                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 0040993D
                                        • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 00409942
                                        • ExitWindowsEx.USER32(00000002,00000000), ref: 00409953
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                        • String ID: SeShutdownPrivilege
                                        • API String ID: 107509674-3733053543
                                        • Opcode ID: 76c26366ab73d400da16d1d616fb3f23b1dfff142f9860e5fbeddd1887b8e56a
                                        • Instruction ID: c716305aa6b255ea0f8bf04b803605974c64d9a32ef9e4c16490a57abd096404
                                        • Opcode Fuzzy Hash: 76c26366ab73d400da16d1d616fb3f23b1dfff142f9860e5fbeddd1887b8e56a
                                        • Instruction Fuzzy Hash: 17F062B0284302B6E610AAB18C07F2722885B81B18F40493EB711F52C3D7BDD904866F
                                        APIs
                                        • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 0040A0DE
                                        • SizeofResource.KERNEL32(00000000,00000000,?,0040AB53,00000000,0040B0EA,?,00000001,00000000,00000002,00000000,0040B132,?,00000000,0040B169), ref: 0040A0F1
                                        • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,0040AB53,00000000,0040B0EA,?,00000001,00000000,00000002,00000000,0040B132,?,00000000), ref: 0040A103
                                        • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040AB53,00000000,0040B0EA,?,00000001,00000000,00000002,00000000,0040B132), ref: 0040A114
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Resource$FindLoadLockSizeof
                                        • String ID:
                                        • API String ID: 3473537107-0
                                        • Opcode ID: 5a5895066e8623d9c04d621fb25767811aface55f1ffab09d7e5ea7dbda8e6a9
                                        • Instruction ID: 6e0ad9993521ca4487a6dc9182c9ec88a9d7ecf9898e216691337b01ea42cf55
                                        • Opcode Fuzzy Hash: 5a5895066e8623d9c04d621fb25767811aface55f1ffab09d7e5ea7dbda8e6a9
                                        • Instruction Fuzzy Hash: 92E0EA9078970725EAA136E608D6B6B10884BB578EF40113ABB14B92C3DDBC8C14516E
                                        APIs
                                        • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004058AA,?,?,?,00000000,00405A5C), ref: 004056BB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID:
                                        • API String ID: 2299586839-0
                                        • Opcode ID: 6c93c86b5f3b9f7a8269726404ed0fa1fa14f48feaf77c0ba1f6e5dd371dd8fd
                                        • Instruction ID: 0ac2273093169a9723f5a49d7def2a1a0e4efde15c2d8dcba0568209acb81ea7
                                        • Opcode Fuzzy Hash: 6c93c86b5f3b9f7a8269726404ed0fa1fa14f48feaf77c0ba1f6e5dd371dd8fd
                                        • Instruction Fuzzy Hash: 34D05EA631E6502AE310519B2D85EBB4EACCAC57A4F54483BF64CD7252D2248C069776
                                        APIs
                                        • GetSystemTime.KERNEL32(?), ref: 004026CE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: SystemTime
                                        • String ID:
                                        • API String ID: 2656138-0
                                        • Opcode ID: 9ed56ef6959dd8920af8b6d924cbc2bc4732ada3ba303b98172f22f33df6bd3d
                                        • Instruction ID: 8398a6df79db6557de4560d78939933842e781e1ed99b38cfbf2fd723ed8f470
                                        • Opcode Fuzzy Hash: 9ed56ef6959dd8920af8b6d924cbc2bc4732ada3ba303b98172f22f33df6bd3d
                                        • Instruction Fuzzy Hash: 3BE04F21E0010A42C704ABA5CD435FDF7AEAB95604F044172A418E92E0F631C252C748
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                        • Instruction ID: 388b29b0a79f5f19ed4b4953a6a76f47c3e14b9604a8131d453ab3a085cd796f
                                        • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                        • Instruction Fuzzy Hash: BC32E675E04219DFCB14CF99CA80A9DBBB2BF88314F24816AD855B7385DB34AE42CF54
                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,004075A5,?,00000000,00409DB8), ref: 004074C9
                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004074CF
                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004075A5,?,00000000,00409DB8), ref: 0040751D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressCloseHandleModuleProc
                                        • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                        • API String ID: 4190037839-2401316094
                                        • Opcode ID: 7c066b870a361991bc0752fcd93cb8768e255443e349242cb7f15e42003cd7d9
                                        • Instruction ID: b0f7b576ff72b1c2059ac61aa9c71175e867ef76c41006bc9f97b140b7c9741a
                                        • Opcode Fuzzy Hash: 7c066b870a361991bc0752fcd93cb8768e255443e349242cb7f15e42003cd7d9
                                        • Instruction Fuzzy Hash: 02215470E04209BBDB00EAE5CC55ADE77A8AB44304F508877A900F36C1E77CBA01C75A
                                        APIs
                                        • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                        • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                        • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                        • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                        • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                        • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                        • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                        • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                        • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                        • String ID:
                                        • API String ID: 1694776339-0
                                        • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                        • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                        • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                        • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                        APIs
                                        • GetSystemDefaultLCID.KERNEL32(00000000,00405A5C,?,?,?,?,00000000,00000000,00000000,?,00406A3B,00000000,00406A4E), ref: 0040582E
                                          • Part of subcall function 0040565C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040D4C0,00000001,?,00405727,?,00000000,00405806), ref: 0040567A
                                          • Part of subcall function 004056A8: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004058AA,?,?,?,00000000,00405A5C), ref: 004056BB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: InfoLocale$DefaultSystem
                                        • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                        • API String ID: 1044490935-665933166
                                        • Opcode ID: f64dfcc9beea8e06f9a7216c135bb3ef8748e57adf0d60dccc58cc6af9805412
                                        • Instruction ID: 1f8fb3564ea85801462352e9f704d9e8acf1e4fd8595550e023c4eac14c4b858
                                        • Opcode Fuzzy Hash: f64dfcc9beea8e06f9a7216c135bb3ef8748e57adf0d60dccc58cc6af9805412
                                        • Instruction Fuzzy Hash: 2B513E34B006486BDB00FAA58C81A8F77A9DB99304F50857BA515BB3C6CA3DDA098F5C
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                        • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                        • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$AllocString
                                        • String ID:
                                        • API String ID: 262959230-0
                                        • Opcode ID: a67f2483392f3a9295a6f421ec51b00ba0520a603cf3575c2b5e933881db78c1
                                        • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                        • Opcode Fuzzy Hash: a67f2483392f3a9295a6f421ec51b00ba0520a603cf3575c2b5e933881db78c1
                                        • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                        APIs
                                        • GetModuleHandleA.KERNEL32(00000000,0040AAAE), ref: 004030E3
                                        • GetCommandLineA.KERNEL32(00000000,0040AAAE), ref: 004030EE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CommandHandleLineModule
                                        • String ID: U1hd.@$%q
                                        • API String ID: 2123368496-1561265964
                                        • Opcode ID: 4ac654993ecb6f0c10b1cacd39e13426f3fb1ace3b4aa0046ecf3c9b516135ec
                                        • Instruction ID: daea45a2aa12e23edc1a75ca5ccfa9dec32d0aab9986280789c112b27ba3568a
                                        • Opcode Fuzzy Hash: 4ac654993ecb6f0c10b1cacd39e13426f3fb1ace3b4aa0046ecf3c9b516135ec
                                        • Instruction Fuzzy Hash: 3AC0027894134055D764AFF69E497047594A74930DF40443FA20C7A1F1D67C460A6BDD
                                        APIs
                                        • MessageBoxA.USER32(00000000,00000000,Setup,00000010), ref: 0040A15D
                                        Strings
                                        • The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si, xrefs: 0040A141
                                        • Setup, xrefs: 0040A14D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2033875693.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2033641508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034012267.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2034183391.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Message
                                        • String ID: Setup$The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si
                                        • API String ID: 2030045667-3271211647
                                        • Opcode ID: ff94df1eb2564fec58b9a221cc3fe3b9cf965a2b136f430670f36a0b3f2e2132
                                        • Instruction ID: 9b5d989b58a55d658cadae164e54e3781760331d38193a884cd145b826483737
                                        • Opcode Fuzzy Hash: ff94df1eb2564fec58b9a221cc3fe3b9cf965a2b136f430670f36a0b3f2e2132
                                        • Instruction Fuzzy Hash: 87E065302443087EE312EA629C13F5E7BACE789B54F614477F500B55C1D6795E10D46D

                                        Execution Graph

                                        Execution Coverage:15.5%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:6.8%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:104
                                        execution_graph 50234 435d80 50235 435d95 50234->50235 50239 435daf 50235->50239 50240 435768 50235->50240 50245 435798 50240->50245 50249 4357b2 50240->50249 50243 447244 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50243->50245 50244 43596c 50247 402b58 DestroyWindow 50244->50247 50245->50243 50245->50244 50246 4357fa 50245->50246 50245->50249 50250 43599d 50245->50250 50251 4359e9 50245->50251 50254 43583d 50245->50254 50256 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50245->50256 50258 435898 50245->50258 50262 43590c 50245->50262 50263 435b7e 50245->50263 50264 435a4d 50245->50264 50268 435a71 50245->50268 50270 435ab0 50245->50270 50272 435ae1 50245->50272 50274 435b05 50245->50274 50276 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50245->50276 50277 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50245->50277 50278 435b44 50245->50278 50282 434850 50245->50282 50298 402648 50245->50298 50302 435014 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50245->50302 50303 432140 50245->50303 50294 402b58 50246->50294 50247->50249 50309 403400 50249->50309 50252 402b58 DestroyWindow 50250->50252 50253 402b58 DestroyWindow 50251->50253 50252->50249 50253->50249 50255 402b58 DestroyWindow 50254->50255 50255->50249 50256->50245 50259 402b58 DestroyWindow 50258->50259 50259->50249 50265 402b58 DestroyWindow 50262->50265 50266 402b58 DestroyWindow 50263->50266 50267 402b58 DestroyWindow 50264->50267 50265->50249 50266->50249 50267->50249 50269 402b58 DestroyWindow 50268->50269 50269->50249 50271 402b58 DestroyWindow 50270->50271 50271->50249 50273 402b58 DestroyWindow 50272->50273 50273->50249 50275 402b58 DestroyWindow 50274->50275 50275->50249 50276->50245 50277->50245 50279 402b58 DestroyWindow 50278->50279 50279->50249 50281 435bc8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50281->50239 50283 43490d 50282->50283 50284 43487d 50282->50284 50345 4347b0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50283->50345 50313 403494 50284->50313 50287 43488b 50317 403778 50287->50317 50288 4348ff 50290 403400 4 API calls 50288->50290 50291 43495d 50290->50291 50291->50245 50292 4348ac 50292->50288 50324 49622c 50292->50324 50295 402b63 50294->50295 50296 402b5c 50294->50296 50295->50249 51045 416a3c DestroyWindow 50296->51045 50299 40264c 50298->50299 50300 402656 50298->50300 50299->50300 51046 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50299->51046 50300->50245 50300->50300 50302->50245 50304 432160 50303->50304 50305 43214e 50303->50305 50307 432182 50304->50307 51048 4320e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50304->51048 51047 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50305->51047 50307->50245 50310 403406 50309->50310 50311 40341f 50309->50311 50310->50311 50312 402660 4 API calls 50310->50312 50311->50239 50311->50281 50312->50311 50315 403498 50313->50315 50314 4034ba 50314->50287 50315->50314 50346 402660 50315->50346 50318 4037aa 50317->50318 50320 40377d 50317->50320 50319 403400 4 API calls 50318->50319 50323 4037a0 50319->50323 50320->50318 50321 403791 50320->50321 50351 4034e0 50321->50351 50323->50292 50325 4962fc 50324->50325 50326 496264 50324->50326 50400 448dd0 50325->50400 50327 403494 4 API calls 50326->50327 50331 49626f 50327->50331 50329 403400 4 API calls 50330 496320 50329->50330 50332 403400 4 API calls 50330->50332 50336 49627f 50331->50336 50361 4037b8 50331->50361 50334 496328 50332->50334 50334->50292 50335 496298 50335->50336 50337 4037b8 4 API calls 50335->50337 50336->50329 50338 4962bb 50337->50338 50366 42d174 50338->50366 50370 47f568 50338->50370 50345->50288 50347 402664 50346->50347 50348 40266e 50346->50348 50347->50348 50350 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50347->50350 50348->50314 50350->50348 50356 4034bc 50351->50356 50353 4034f0 50354 403400 4 API calls 50353->50354 50355 403508 50354->50355 50355->50323 50357 4034c0 50356->50357 50358 4034dc 50356->50358 50359 402648 4 API calls 50357->50359 50358->50353 50360 4034c9 50359->50360 50360->50353 50418 403744 50361->50418 50363 4037fc 50363->50335 50364 4037c6 50364->50363 50422 4038a4 50364->50422 50432 403738 50366->50432 50369 42d189 50374 47f586 50370->50374 50371 47f59e 50372 403400 4 API calls 50371->50372 50373 47f5fa 50380 47f60d 50373->50380 50381 47f6db 50373->50381 50374->50371 50374->50373 50375 47f5d8 50374->50375 50378 4037b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50374->50378 50376 403400 4 API calls 50375->50376 50378->50374 50401 448df5 50400->50401 50402 448e38 50400->50402 50403 403494 4 API calls 50401->50403 50405 448e4c 50402->50405 51019 4489cc 50402->51019 50404 448e00 50403->50404 50409 4037b8 4 API calls 50404->50409 50407 403400 4 API calls 50405->50407 50408 448e7f 50407->50408 50408->50336 50410 448e1c 50409->50410 50411 4037b8 4 API calls 50410->50411 50411->50402 50419 40374a 50418->50419 50421 40375b 50418->50421 50420 4034bc 4 API calls 50419->50420 50419->50421 50420->50421 50421->50364 50423 4038b1 50422->50423 50430 4038e1 50422->50430 50425 4038da 50423->50425 50427 4038bd 50423->50427 50424 403400 4 API calls 50426 4038cb 50424->50426 50428 4034bc 4 API calls 50425->50428 50426->50363 50431 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50427->50431 50428->50430 50430->50424 50431->50426 50433 40373c GetFileAttributesA 50432->50433 50433->50369 51020 403494 4 API calls 51019->51020 51021 448a02 51020->51021 51022 4037b8 4 API calls 51021->51022 51023 448a14 51022->51023 51024 403778 4 API calls 51023->51024 51025 448a35 51024->51025 51026 4037b8 4 API calls 51025->51026 51027 448a4d 51026->51027 51028 403778 4 API calls 51027->51028 51029 448a78 51028->51029 51030 4037b8 4 API calls 51029->51030 51045->50295 51046->50300 51047->50304 51048->50307 51049 40d084 51052 407360 WriteFile 51049->51052 51053 40737d 51052->51053 51054 402584 51055 402598 51054->51055 51056 4025ab 51054->51056 51084 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 51055->51084 51057 4025c2 RtlEnterCriticalSection 51056->51057 51058 4025cc 51056->51058 51057->51058 51070 4023b4 13 API calls 51058->51070 51060 40259d 51060->51056 51062 4025a1 51060->51062 51063 4025d5 51064 4025d9 51063->51064 51071 402088 51063->51071 51066 402635 51064->51066 51067 40262b RtlLeaveCriticalSection 51064->51067 51067->51066 51068 4025e5 51068->51064 51085 402210 9 API calls 51068->51085 51070->51063 51072 40209c 51071->51072 51073 4020af 51071->51073 51092 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 51072->51092 51075 4020c6 RtlEnterCriticalSection 51073->51075 51078 4020d0 51073->51078 51075->51078 51076 4020a1 51076->51073 51077 4020a5 51076->51077 51081 402106 51077->51081 51078->51081 51086 401f94 51078->51086 51081->51068 51082 4021f1 RtlLeaveCriticalSection 51083 4021fb 51082->51083 51083->51068 51084->51060 51085->51064 51089 401fa4 51086->51089 51087 401fd0 51091 401ff4 51087->51091 51098 401db4 51087->51098 51089->51087 51089->51091 51093 401f0c 51089->51093 51091->51082 51091->51083 51092->51076 51102 40178c 51093->51102 51096 401f29 51096->51089 51099 401e02 51098->51099 51100 401dd2 51098->51100 51099->51100 51130 401d1c 51099->51130 51100->51091 51105 4017a8 51102->51105 51104 4017b2 51121 401678 VirtualAlloc 51104->51121 51105->51104 51107 40180f 51105->51107 51110 401803 51105->51110 51113 4014e4 51105->51113 51122 4013e0 LocalAlloc 51105->51122 51107->51096 51112 401e80 9 API calls 51107->51112 51109 4017be 51109->51107 51123 4015c0 VirtualFree 51110->51123 51112->51096 51114 4014f3 VirtualAlloc 51113->51114 51116 401520 51114->51116 51117 401543 51114->51117 51124 401398 51116->51124 51117->51105 51120 401530 VirtualFree 51120->51117 51121->51109 51122->51105 51123->51107 51127 401340 51124->51127 51128 40134c LocalAlloc 51127->51128 51129 40135e 51127->51129 51128->51129 51129->51117 51129->51120 51131 401d2e 51130->51131 51132 401d51 51131->51132 51133 401d63 51131->51133 51143 401940 51132->51143 51135 401940 3 API calls 51133->51135 51136 401d61 51135->51136 51137 401d79 51136->51137 51153 401bf8 9 API calls 51136->51153 51137->51100 51139 401d88 51140 401da2 51139->51140 51154 401c4c 9 API calls 51139->51154 51155 401454 LocalAlloc 51140->51155 51144 401966 51143->51144 51152 4019bf 51143->51152 51156 40170c 51144->51156 51148 401983 51150 40199a 51148->51150 51161 4015c0 VirtualFree 51148->51161 51150->51152 51162 401454 LocalAlloc 51150->51162 51152->51136 51153->51139 51154->51140 51155->51137 51158 401743 51156->51158 51157 401783 51160 4013e0 LocalAlloc 51157->51160 51158->51157 51159 40175d VirtualFree 51158->51159 51159->51158 51160->51148 51161->51150 51162->51152 51163 477e4c 51164 477e67 51163->51164 51165 477e6f CallWindowProcW 51163->51165 51164->51165 51166 477e80 CallWindowProcW 51164->51166 51167 477e8f 51165->51167 51166->51167 51168 44b948 51169 44b956 51168->51169 51171 44b975 51168->51171 51169->51171 51172 44b82c 51169->51172 51173 44b85f 51172->51173 51183 414f38 51173->51183 51175 44b872 51176 44b89f GetDC 51175->51176 51177 40357c 4 API calls 51175->51177 51187 41a638 51176->51187 51177->51176 51180 44b8d0 51195 44b560 51180->51195 51182 44b8e4 ReleaseDC 51182->51171 51184 414f46 51183->51184 51185 4034e0 4 API calls 51184->51185 51186 414f53 51185->51186 51186->51175 51188 41a663 51187->51188 51189 41a6ff 51187->51189 51206 403520 51188->51206 51190 403400 4 API calls 51189->51190 51191 41a717 SelectObject 51190->51191 51191->51180 51193 41a6bb 51194 41a6f3 CreateFontIndirectA 51193->51194 51194->51189 51196 44b577 51195->51196 51197 44b60a 51196->51197 51198 44b5f3 51196->51198 51199 44b58a 51196->51199 51197->51182 51201 44b603 DrawTextA 51198->51201 51199->51197 51200 402648 4 API calls 51199->51200 51202 44b59b 51200->51202 51201->51197 51203 44b5b9 MultiByteToWideChar DrawTextW 51202->51203 51204 402660 4 API calls 51203->51204 51205 44b5eb 51204->51205 51205->51182 51207 4034e0 4 API calls 51206->51207 51208 40352a 51207->51208 51208->51193 51209 40d2cc 51210 40d2d4 51209->51210 51211 40d2fe 51210->51211 51212 40d302 51210->51212 51213 40d2f7 51210->51213 51214 40d306 51212->51214 51215 40d318 51212->51215 51223 406298 GlobalHandle GlobalUnlock GlobalFree 51213->51223 51221 40626c GlobalAlloc GlobalLock 51214->51221 51222 40627c GlobalHandle GlobalUnlock GlobalReAlloc GlobalLock 51215->51222 51219 40d314 51219->51211 51224 40910c 51219->51224 51221->51219 51222->51219 51223->51211 51225 409118 51224->51225 51232 40723c LoadStringA 51225->51232 51228 403450 4 API calls 51229 409149 51228->51229 51230 403400 4 API calls 51229->51230 51231 40915e 51230->51231 51231->51211 51233 4034e0 4 API calls 51232->51233 51234 407269 51233->51234 51234->51228 51235 413a8c SetWindowLongA GetWindowLongA 51236 413ae9 SetPropA SetPropA 51235->51236 51237 413acb GetWindowLongA 51235->51237 51241 41f7ec KiUserCallbackDispatcher 51236->51241 51237->51236 51238 413ada SetWindowLongA 51237->51238 51238->51236 51239 413b39 51241->51239 51242 450994 51243 450a8c 51242->51243 51244 4509bf GetVersion 51242->51244 51246 403420 4 API calls 51243->51246 51244->51243 51245 4509d2 51244->51245 51256 450964 GetSystemDirectoryA 51245->51256 51248 450ab0 51246->51248 51250 42c84c 5 API calls 51251 4509e5 51250->51251 51252 40357c 4 API calls 51251->51252 51253 4509f2 51252->51253 51254 4509fa LoadLibraryA 51253->51254 51254->51243 51255 450a0e 6 API calls 51254->51255 51255->51243 51259 407934 51256->51259 51262 40352c 51259->51262 51263 4034e0 51262->51263 51264 4034bc 4 API calls 51263->51264 51265 4034f0 51264->51265 51266 403400 4 API calls 51265->51266 51267 403508 51266->51267 51267->51250 51268 47e054 51269 47e05f 51268->51269 51271 47e075 GetLastError 51269->51271 51272 47e0a0 51269->51272 51276 45304c 51269->51276 51271->51272 51273 47e07f GetLastError 51271->51273 51273->51272 51274 47e089 GetTickCount 51273->51274 51274->51272 51275 47e097 Sleep 51274->51275 51275->51269 51277 452e68 2 API calls 51276->51277 51278 453062 51277->51278 51279 453066 51278->51279 51280 453082 DeleteFileA GetLastError 51278->51280 51279->51269 51281 452ea4 Wow64RevertWow64FsRedirection 51280->51281 51282 4530a8 51281->51282 51282->51269 51283 416f92 51284 41703a 51283->51284 51285 416faa 51283->51285 51302 41576c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51284->51302 51287 416fc4 SendMessageA 51285->51287 51288 416fb8 51285->51288 51298 417018 51287->51298 51289 416fc2 CallWindowProcA 51288->51289 51290 416fde 51288->51290 51289->51298 51299 41a4a8 GetSysColor 51290->51299 51293 416fe9 SetTextColor 51294 416ffe 51293->51294 51300 41a4a8 GetSysColor 51294->51300 51296 417003 SetBkColor 51301 41ab30 GetSysColor CreateBrushIndirect 51296->51301 51299->51293 51300->51296 51301->51298 51302->51298 51303 416a94 51304 416aa1 51303->51304 51305 416afb 51303->51305 51310 4169a0 CreateWindowExA 51304->51310 51306 416aa8 SetPropA SetPropA 51306->51305 51307 416adb 51306->51307 51308 416aee SetWindowPos 51307->51308 51308->51305 51310->51306 51311 450390 51312 4503b5 51311->51312 51313 450448 51311->51313 51314 450402 51312->51314 51332 450360 GetSystemDirectoryA 51312->51332 51315 403420 4 API calls 51313->51315 51314->51313 51318 45040b 51314->51318 51317 450468 51315->51317 51320 450360 5 API calls 51318->51320 51322 45041d 51320->51322 51321 42c84c 5 API calls 51324 4503e2 51321->51324 51323 42c84c 5 API calls 51322->51323 51325 450428 51323->51325 51326 40357c 4 API calls 51324->51326 51327 40357c 4 API calls 51325->51327 51328 4503ef 51326->51328 51329 450435 51327->51329 51330 4503f7 LoadLibraryA 51328->51330 51331 45043d LoadLibraryA 51329->51331 51330->51314 51331->51313 51333 407934 4 API calls 51332->51333 51334 45038a 51333->51334 51334->51321 51335 49339c 51336 4933d6 51335->51336 51337 4933d8 51336->51337 51338 4933e2 51336->51338 51534 4094e8 MessageBeep 51337->51534 51340 49341a 51338->51340 51341 4933f1 51338->51341 51346 493429 51340->51346 51347 493452 51340->51347 51343 447498 18 API calls 51341->51343 51342 403420 4 API calls 51344 493a2e 51342->51344 51345 4933fe 51343->51345 51348 403400 4 API calls 51344->51348 51535 407000 51345->51535 51350 447498 18 API calls 51346->51350 51356 49348a 51347->51356 51357 493461 51347->51357 51351 493a36 51348->51351 51354 493436 51350->51354 51543 407050 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51354->51543 51363 493499 51356->51363 51364 4934b2 51356->51364 51358 447498 18 API calls 51357->51358 51360 49346e 51358->51360 51359 493441 51544 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51359->51544 51545 407084 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51360->51545 51547 4076d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 51363->51547 51370 4934c1 51364->51370 51371 4934e6 51364->51371 51365 4933dd 51365->51342 51366 493479 51546 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51366->51546 51369 4934a1 51548 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51369->51548 51373 447498 18 API calls 51370->51373 51376 49351e 51371->51376 51377 4934f5 51371->51377 51374 4934ce 51373->51374 51549 4076f8 51374->51549 51382 49352d 51376->51382 51383 493556 51376->51383 51379 447498 18 API calls 51377->51379 51378 4934d6 51552 447570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51378->51552 51381 493502 51379->51381 51553 42cc54 51381->51553 51385 447498 18 API calls 51382->51385 51390 4935a2 51383->51390 51391 493565 51383->51391 51388 49353a 51385->51388 51563 407648 8 API calls 51388->51563 51397 4935da 51390->51397 51398 4935b1 51390->51398 51392 447498 18 API calls 51391->51392 51394 493574 51392->51394 51393 493545 51564 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51393->51564 51396 447498 18 API calls 51394->51396 51399 493585 51396->51399 51404 4935e9 51397->51404 51405 493612 51397->51405 51400 447498 18 API calls 51398->51400 51565 4930a0 8 API calls 51399->51565 51402 4935be 51400->51402 51567 42ccf4 51402->51567 51403 493591 51566 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51403->51566 51408 447498 18 API calls 51404->51408 51413 49364a 51405->51413 51414 493621 51405->51414 51411 4935f6 51408->51411 51573 42cd1c 51411->51573 51420 493659 51413->51420 51421 493682 51413->51421 51415 447498 18 API calls 51414->51415 51417 49362e 51415->51417 51582 42cd4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 51417->51582 51423 447498 18 API calls 51420->51423 51426 4936ba 51421->51426 51427 493691 51421->51427 51422 493639 51583 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51422->51583 51425 493666 51423->51425 51428 42cd7c 5 API calls 51425->51428 51434 4936c9 51426->51434 51435 493706 51426->51435 51429 447498 18 API calls 51427->51429 51430 493671 51428->51430 51431 49369e 51429->51431 51584 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51430->51584 51433 42cda4 5 API calls 51431->51433 51436 4936a9 51433->51436 51437 447498 18 API calls 51434->51437 51441 493758 51435->51441 51442 493715 51435->51442 51585 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51436->51585 51439 4936d8 51437->51439 51440 447498 18 API calls 51439->51440 51443 4936e9 51440->51443 51448 4937cb 51441->51448 51449 493767 51441->51449 51444 447498 18 API calls 51442->51444 51586 42c948 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 51443->51586 51446 493728 51444->51446 51450 447498 18 API calls 51446->51450 51447 4936f5 51587 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51447->51587 51456 49380a 51448->51456 51457 4937da 51448->51457 51522 447498 51449->51522 51453 493739 51450->51453 51588 493298 12 API calls 51453->51588 51466 493849 51456->51466 51467 493819 51456->51467 51461 447498 18 API calls 51457->51461 51459 493747 51589 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51459->51589 51463 4937e7 51461->51463 51462 493782 51464 4937bb 51462->51464 51465 493786 51462->51465 51469 45304c 5 API calls 51463->51469 51478 493888 51466->51478 51479 493858 51466->51479 51471 447498 18 API calls 51467->51471 51472 4937f4 51469->51472 51474 493826 51471->51474 51592 447570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51472->51592 51593 452eb4 51474->51593 51486 4938d0 51478->51486 51487 493897 51478->51487 51482 447498 18 API calls 51479->51482 51481 493833 51600 447570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51481->51600 51485 493865 51482->51485 51601 453554 51485->51601 51493 493918 51486->51493 51494 4938df 51486->51494 51489 447498 18 API calls 51487->51489 51492 4938a6 51489->51492 51490 493872 51608 447570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51490->51608 51495 447498 18 API calls 51492->51495 51500 49392b 51493->51500 51506 4939e1 51493->51506 51496 447498 18 API calls 51494->51496 51497 4938b7 51495->51497 51498 4938ee 51496->51498 51609 447718 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51497->51609 51499 447498 18 API calls 51498->51499 51501 4938ff 51499->51501 51503 447498 18 API calls 51500->51503 51610 447718 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51501->51610 51504 493958 51503->51504 51505 447498 18 API calls 51504->51505 51507 49396f 51505->51507 51506->51365 51614 44743c 51506->51614 51611 40822c 7 API calls 51507->51611 51523 4474a0 51522->51523 51623 436518 51523->51623 51525 4474bf 51526 42ca58 7 API calls 51525->51526 51526->51462 51534->51365 51536 40700f 51535->51536 51537 407028 51536->51537 51539 407031 51536->51539 51538 403400 4 API calls 51537->51538 51540 40702f 51538->51540 51541 403778 4 API calls 51539->51541 51542 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51540->51542 51541->51540 51542->51365 51543->51359 51544->51365 51545->51366 51546->51365 51547->51369 51548->51365 51550 403738 51549->51550 51551 407702 SetCurrentDirectoryA 51550->51551 51551->51378 51552->51365 51554 403738 51553->51554 51555 42cc77 GetFullPathNameA 51554->51555 51556 42cc83 51555->51556 51557 42cc9a 51555->51557 51556->51557 51558 42cc8b 51556->51558 51559 403494 4 API calls 51557->51559 51560 4034e0 4 API calls 51558->51560 51561 42cc98 51559->51561 51560->51561 51562 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51561->51562 51562->51365 51563->51393 51564->51365 51565->51403 51566->51365 51568 42cbec IsDBCSLeadByte 51567->51568 51569 42cd04 51568->51569 51570 403778 4 API calls 51569->51570 51571 42cd15 51570->51571 51572 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51571->51572 51572->51365 51651 42cac4 51573->51651 51576 42cd30 51578 403400 4 API calls 51576->51578 51577 42cd39 51579 403778 4 API calls 51577->51579 51580 42cd37 51578->51580 51579->51580 51581 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51580->51581 51581->51365 51582->51422 51583->51365 51584->51365 51585->51365 51586->51447 51587->51365 51588->51459 51589->51365 51592->51365 51594 452e68 2 API calls 51593->51594 51595 452eca 51594->51595 51596 452ece 51595->51596 51597 452eec CreateDirectoryA GetLastError 51595->51597 51596->51481 51598 452ea4 Wow64RevertWow64FsRedirection 51597->51598 51599 452f12 51598->51599 51599->51481 51600->51365 51602 452e68 2 API calls 51601->51602 51603 45356a 51602->51603 51604 45356e 51603->51604 51605 45358a RemoveDirectoryA GetLastError 51603->51605 51604->51490 51606 452ea4 Wow64RevertWow64FsRedirection 51605->51606 51607 4535b0 51606->51607 51607->51490 51608->51365 51609->51365 51610->51365 51615 447440 51614->51615 51654 43643c 51615->51654 51625 436524 51623->51625 51633 436546 51623->51633 51624 4365c9 51650 40905c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51624->51650 51625->51633 51645 40905c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51625->51645 51627 4365b1 51639 403494 4 API calls 51627->51639 51628 4365a5 51638 40352c 4 API calls 51628->51638 51629 436599 51637 403510 4 API calls 51629->51637 51630 43658d 51646 403510 51630->51646 51631 4365bd 51649 4040e8 18 API calls 51631->51649 51633->51624 51633->51627 51633->51628 51633->51629 51633->51630 51633->51631 51636 4365da 51636->51525 51643 4365a2 51637->51643 51644 4365ae 51638->51644 51640 4365ba 51639->51640 51640->51525 51641 4365c6 51641->51525 51643->51525 51644->51525 51645->51633 51647 4034e0 4 API calls 51646->51647 51648 40351d 51647->51648 51648->51525 51649->51641 51650->51636 51652 42cacc IsDBCSLeadByte 51651->51652 51653 42cacb 51652->51653 51653->51576 51653->51577 51655 436445 51654->51655 51657 436467 51654->51657 51655->51657 51665 40905c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51655->51665 51656 4364e6 51657->51656 51660 4364ba 51657->51660 51661 4364dd 51657->51661 51665->51657 51668 46c7d0 51669 46cc6d 51668->51669 51670 46c804 51668->51670 51672 403400 4 API calls 51669->51672 51671 46c840 51670->51671 51674 46c89c 51670->51674 51675 46c87a 51670->51675 51676 46c88b 51670->51676 51677 46c858 51670->51677 51678 46c869 51670->51678 51671->51669 51763 4698f8 51671->51763 51673 46ccac 51672->51673 51680 403400 4 API calls 51673->51680 52025 46c760 46 API calls 51674->52025 51728 46c390 51675->51728 52024 46c550 70 API calls 51676->52024 52022 46c0e0 49 API calls 51677->52022 52023 46c248 43 API calls 51678->52023 51686 46ccb4 51680->51686 51687 46c85e 51687->51669 51687->51671 51688 46c8d8 51688->51669 51700 46c91b 51688->51700 52026 496688 51688->52026 51693 42d010 6 API calls 51693->51700 51695 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51695->51700 51696 46bbec 24 API calls 51696->51700 51699 414f38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51699->51700 51700->51669 51700->51693 51700->51695 51700->51696 51700->51699 51701 46ca97 51700->51701 51718 46cb5f 51700->51718 51766 469834 51700->51766 51774 484978 51700->51774 51799 46b958 51700->51799 51950 484470 51700->51950 52061 46be9c 20 API calls 51700->52061 51806 46aba0 51701->51806 51702 46bbec 24 API calls 51702->51669 51704 46cafd 51705 403450 4 API calls 51704->51705 51706 46cb0d 51705->51706 51707 46cb69 51706->51707 51708 46cb19 51706->51708 51710 46cb76 51707->51710 51711 46cc2b 51707->51711 52045 458718 51708->52045 51869 46bbec 51710->51869 51714 402b58 DestroyWindow 51711->51714 51715 46cc40 51714->51715 51717 402b58 DestroyWindow 51715->51717 51716 458718 24 API calls 51716->51718 51719 46cc48 51717->51719 51718->51702 52062 46d0e4 51728->52062 51731 46c512 51732 403420 4 API calls 51731->51732 51734 46c52c 51732->51734 51733 414f38 4 API calls 51735 46c3de 51733->51735 51736 403400 4 API calls 51734->51736 51761 46c4fe 51735->51761 52065 456720 51735->52065 51739 46c534 51736->51739 51738 403450 4 API calls 51738->51731 51740 403400 4 API calls 51739->51740 51741 46c53c 51740->51741 51741->51671 51761->51731 51761->51738 51764 469834 19 API calls 51763->51764 51765 469907 51764->51765 51765->51688 51771 469863 51766->51771 51767 407d44 19 API calls 51768 46989c 51767->51768 52272 453aac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51768->52272 51770 4698a4 51772 403400 4 API calls 51770->51772 51771->51767 51771->51770 51773 4698bc 51772->51773 51773->51700 52273 418630 51774->52273 51776 4849af GetForegroundWindow 51777 4849ba SetActiveWindow 51776->51777 51778 4849c8 51776->51778 51777->51778 51781 4849e9 51778->51781 52275 484874 51778->52275 51782 484a15 51781->51782 51786 484aaa 51781->51786 51787 484a74 51781->51787 51783 484aec 51782->51783 51784 45850c 24 API calls 51782->51784 52291 4838a0 51783->52291 51784->51783 51790 46748c 20 API calls 51786->51790 52287 46748c 51787->52287 51792 484aa8 51790->51792 52290 4802d4 43 API calls 51792->52290 51796 484b28 51797 403420 4 API calls 51796->51797 51798 46ca59 KiUserCallbackDispatcher 51797->51798 51798->51700 51800 46b964 51799->51800 51801 46b969 51799->51801 51802 46b967 51800->51802 52593 46b3c4 51800->52593 52683 46a704 47 API calls 51801->52683 51802->51700 51804 46b971 51804->51700 51807 403400 4 API calls 51806->51807 51808 46abce 51807->51808 52719 47f004 51808->52719 51810 46ac31 51811 46ac35 51810->51811 51812 46ac4e 51810->51812 51813 46748c 20 API calls 51811->51813 51814 46ac3f 51812->51814 51815 496578 4 API calls 51812->51815 51813->51814 51816 46ad6d 51814->51816 51817 46add8 51814->51817 51868 46aee2 51814->51868 51819 46ac6a 51815->51819 51821 403494 4 API calls 51816->51821 51822 403494 4 API calls 51817->51822 51818 403420 4 API calls 51823 46af0c 51818->51823 51819->51814 51820 46ac72 51819->51820 51824 46bbec 24 API calls 51820->51824 51825 46ad7a 51821->51825 51826 46ade5 51822->51826 51823->51704 51827 46ac7f 51824->51827 51828 40357c 4 API calls 51825->51828 51829 40357c 4 API calls 51826->51829 51838 46acc0 51827->51838 51839 46aca8 SetActiveWindow 51827->51839 51830 46ad87 51828->51830 51831 46adf2 51829->51831 51832 40357c 4 API calls 51830->51832 51833 40357c 4 API calls 51831->51833 51834 46ad94 51832->51834 51835 46adff 51833->51835 51836 40357c 4 API calls 51834->51836 51837 40357c 4 API calls 51835->51837 51840 46ada1 51836->51840 51841 46ae0c 51837->51841 51848 42fa00 14 API calls 51838->51848 51839->51838 51843 46748c 20 API calls 51840->51843 51842 40357c 4 API calls 51841->51842 51845 46ae1a 51842->51845 51844 46adaf 51843->51844 51846 40357c 4 API calls 51844->51846 51847 414f68 4 API calls 51845->51847 51849 46adb8 51846->51849 51850 46add6 51847->51850 51851 46acd6 51848->51851 51852 40357c 4 API calls 51849->51852 52729 4677c4 51850->52729 52728 496824 19 API calls 51851->52728 51856 46ad11 51857 402b58 DestroyWindow 51856->51857 51859 46ad3b 51857->51859 51860 46ba68 22 API calls 51859->51860 51861 46ad43 51860->51861 51861->51704 51868->51818 51870 4698f8 19 API calls 51869->51870 51871 46bc17 51870->51871 51872 46bc39 51871->51872 51873 465f58 7 API calls 51871->51873 52820 465f58 51872->52820 51873->51872 51951 46d0e4 49 API calls 51950->51951 51952 4844b3 51951->51952 51953 4844bc 51952->51953 53125 409030 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51952->53125 51955 414f38 4 API calls 51953->51955 51956 4844cc 51955->51956 51957 403450 4 API calls 51956->51957 51958 4844d9 51957->51958 52898 46d43c 51958->52898 51961 4844e9 51963 414f38 4 API calls 51961->51963 51964 4844f9 51963->51964 51965 403450 4 API calls 51964->51965 51966 484506 51965->51966 51967 46a4ec SendMessageA 51966->51967 51968 48451f 51967->51968 51969 484570 51968->51969 53127 47b124 23 API calls 51968->53127 52927 42462c IsIconic 51969->52927 52022->51687 52023->51671 52024->51671 52025->51671 52027 43de68 4 API calls 52026->52027 52028 4966a9 52027->52028 52029 49673a 52028->52029 52030 4966b4 52028->52030 52032 496749 52029->52032 54754 495eb0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52029->54754 54721 432070 52030->54721 52032->51700 52040 4966fe 54752 495f44 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52040->54752 52042 496712 54753 434270 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DestroyWindow 52042->54753 52046 45873d 52045->52046 52047 45875d 52046->52047 52048 407d44 19 API calls 52046->52048 52050 403400 4 API calls 52047->52050 52049 458755 52048->52049 52051 45850c 24 API calls 52049->52051 52052 458772 52050->52052 52051->52047 52052->51716 52061->51700 52091 46d17c 52062->52091 52066 42d010 6 API calls 52065->52066 52071 45674e 52066->52071 52067 456766 52068 403420 4 API calls 52067->52068 52071->52067 52072 42ccf4 5 API calls 52071->52072 52073 403494 4 API calls 52071->52073 52229 4565a8 GetModuleHandleA GetProcAddress 52071->52229 52072->52071 52073->52071 52092 414f38 4 API calls 52091->52092 52093 46d1b0 52092->52093 52152 467524 52093->52152 52097 46d1c2 52098 46d1d1 52097->52098 52103 46d1ea 52097->52103 52196 4802d4 43 API calls 52098->52196 52100 46d1e5 52101 403420 4 API calls 52100->52101 52102 46c3c2 52101->52102 52102->51731 52102->51733 52104 46d231 52103->52104 52105 46d218 52103->52105 52106 46d296 52104->52106 52119 46d235 52104->52119 52197 4802d4 43 API calls 52105->52197 52199 42cf9c CharNextA 52106->52199 52109 46d2a5 52110 46d2a9 52109->52110 52114 46d2c2 52109->52114 52200 4802d4 43 API calls 52110->52200 52112 46d27d 52198 4802d4 43 API calls 52112->52198 52113 46d2e6 52201 4802d4 43 API calls 52113->52201 52114->52113 52166 467694 52114->52166 52119->52112 52119->52114 52122 46d2ff 52123 403778 4 API calls 52122->52123 52155 46753e 52152->52155 52154 42d010 6 API calls 52154->52155 52155->52154 52156 403450 4 API calls 52155->52156 52157 407000 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52155->52157 52158 467587 52155->52158 52206 42cefc 52155->52206 52156->52155 52157->52155 52159 403420 4 API calls 52158->52159 52160 4675a1 52159->52160 52161 414f68 52160->52161 52162 414f38 4 API calls 52161->52162 52163 414f8c 52162->52163 52164 403400 4 API calls 52163->52164 52165 414fbd 52164->52165 52165->52097 52168 46769e 52166->52168 52167 4676b1 52167->52113 52170 4676c4 52167->52170 52168->52167 52217 42cf8c CharNextA 52168->52217 52171 4676ce 52170->52171 52172 4676fb 52171->52172 52218 42cf8c CharNextA 52171->52218 52172->52113 52172->52122 52196->52100 52197->52100 52198->52100 52199->52109 52200->52100 52201->52100 52207 403494 4 API calls 52206->52207 52210 42cf0c 52207->52210 52208 403744 4 API calls 52208->52210 52210->52208 52213 42cf42 52210->52213 52215 42c894 IsDBCSLeadByte 52210->52215 52211 42cf86 52211->52155 52213->52211 52214 4037b8 4 API calls 52213->52214 52216 42c894 IsDBCSLeadByte 52213->52216 52214->52213 52215->52210 52216->52213 52217->52168 52218->52171 52230 452e68 2 API calls 52229->52230 52272->51770 52274 41863a 52273->52274 52274->51776 52285 4848aa 52275->52285 52276 484947 52277 484952 52276->52277 52409 48483c GetTickCount 52276->52409 52279 402b58 DestroyWindow 52277->52279 52280 484967 KiUserCallbackDispatcher 52279->52280 52280->51781 52285->52276 52296 42fa00 52285->52296 52312 47f4bc 52285->52312 52316 47a4ec 52285->52316 52319 483b4c 52285->52319 52416 47a530 20 API calls 52285->52416 52561 4673a0 52287->52561 52290->51782 52292 4838f1 52291->52292 52293 4838c3 52291->52293 52295 483058 PostMessageA 52292->52295 52592 4965d4 19 API calls 52293->52592 52295->51796 52297 42fa0c 52296->52297 52298 42fa2f GetActiveWindow GetFocus 52297->52298 52299 41f2f4 2 API calls 52298->52299 52300 42fa46 52299->52300 52301 42fa63 52300->52301 52302 42fa53 RegisterClassA 52300->52302 52303 42faf2 SetFocus 52301->52303 52304 42fa71 CreateWindowExA 52301->52304 52302->52301 52305 403400 4 API calls 52303->52305 52304->52303 52306 42faa4 52304->52306 52307 42fb0e 52305->52307 52417 4246cc 52306->52417 52307->52285 52309 42facc 52310 42fad4 CreateWindowExA 52309->52310 52310->52303 52311 42faea ShowWindow 52310->52311 52311->52303 52313 47f563 52312->52313 52314 47f4d0 52312->52314 52313->52285 52314->52313 52423 457c6c 15 API calls 52314->52423 52424 47a448 52316->52424 52320 45850c 24 API calls 52319->52320 52321 483b91 52320->52321 52322 483ba8 52321->52322 52323 483b9c 52321->52323 52325 45850c 24 API calls 52322->52325 52324 45850c 24 API calls 52323->52324 52326 483ba6 52324->52326 52325->52326 52327 483bb8 52326->52327 52328 483bc4 52326->52328 52329 45850c 24 API calls 52327->52329 52330 45850c 24 API calls 52328->52330 52331 483bc2 52329->52331 52330->52331 52332 47d578 44 API calls 52331->52332 52333 483bd8 52332->52333 52334 403494 4 API calls 52333->52334 52335 483be5 52334->52335 52336 40357c 4 API calls 52335->52336 52337 483bf0 52336->52337 52414 484854 52409->52414 52411 484871 52411->52277 52412 484846 GetTickCount 52412->52411 52412->52414 52413 483894 12 API calls 52413->52414 52414->52411 52414->52412 52414->52413 52556 42f0c4 MsgWaitForMultipleObjects 52414->52556 52557 484808 GetForegroundWindow 52414->52557 52416->52285 52418 4246fe 52417->52418 52419 4246de GetWindowTextA 52417->52419 52421 403494 4 API calls 52418->52421 52420 4034e0 4 API calls 52419->52420 52422 4246fc 52420->52422 52421->52422 52422->52309 52423->52313 52425 47a454 52424->52425 52426 47a47c 52424->52426 52427 47a475 52425->52427 52430 453aac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52425->52430 52426->52285 52431 47a308 20 API calls 52427->52431 52430->52427 52431->52426 52556->52414 52558 48481b GetWindowThreadProcessId 52557->52558 52559 484834 52557->52559 52558->52559 52560 484829 GetCurrentProcessId 52558->52560 52559->52414 52560->52559 52562 403494 4 API calls 52561->52562 52563 4673ce 52562->52563 52578 42e018 52563->52578 52566 42e018 5 API calls 52567 4673f2 52566->52567 52568 46728c 19 API calls 52567->52568 52569 4673fc 52568->52569 52570 42e018 5 API calls 52569->52570 52571 46740b 52570->52571 52581 467304 52571->52581 52585 42df60 52578->52585 52582 467324 52581->52582 52583 407d44 19 API calls 52582->52583 52586 42e00b 52585->52586 52588 42df80 52585->52588 52586->52566 52587 4037b8 4 API calls 52587->52588 52588->52586 52588->52587 52590 403800 4 API calls 52588->52590 52591 42c894 IsDBCSLeadByte 52588->52591 52590->52588 52591->52588 52592->52292 52595 46b40b 52593->52595 52594 46b883 52596 46b89e 52594->52596 52597 46b8cf 52594->52597 52595->52594 52598 46b4c6 52595->52598 52602 403494 4 API calls 52595->52602 52601 403494 4 API calls 52596->52601 52599 403494 4 API calls 52597->52599 52600 46b4e7 52598->52600 52604 46b528 52598->52604 52603 46b8dd 52599->52603 52605 403494 4 API calls 52600->52605 52606 46b8ac 52601->52606 52607 46b44a 52602->52607 52704 469de0 12 API calls 52603->52704 52608 403400 4 API calls 52604->52608 52610 46b4f5 52605->52610 52703 469de0 12 API calls 52606->52703 52612 414f38 4 API calls 52607->52612 52613 46b526 52608->52613 52614 414f38 4 API calls 52610->52614 52616 46b46b 52612->52616 52637 46b61d 52613->52637 52684 46a4ec 52613->52684 52619 46b516 52614->52619 52615 46b8ba 52618 403400 4 API calls 52615->52618 52617 403634 4 API calls 52616->52617 52621 46b47b 52617->52621 52623 46b900 52618->52623 52620 403634 4 API calls 52619->52620 52620->52613 52625 414f38 4 API calls 52621->52625 52628 403400 4 API calls 52623->52628 52624 46b694 52626 403400 4 API calls 52624->52626 52629 46b48f 52625->52629 52630 46b692 52626->52630 52627 46b548 52631 46b586 52627->52631 52632 46b54e 52627->52632 52633 46b908 52628->52633 52629->52598 52639 414f38 4 API calls 52629->52639 52696 46a928 44 API calls 52630->52696 52634 403400 4 API calls 52631->52634 52635 403494 4 API calls 52632->52635 52636 403420 4 API calls 52633->52636 52638 46b584 52634->52638 52640 46b55c 52635->52640 52641 46b915 52636->52641 52637->52624 52642 46b653 52637->52642 52690 46a7e0 52638->52690 52643 46b4b6 52639->52643 52645 47d578 44 API calls 52640->52645 52641->51802 52646 403494 4 API calls 52642->52646 52648 403634 4 API calls 52643->52648 52650 46b574 52645->52650 52647 46b661 52646->52647 52651 414f38 4 API calls 52647->52651 52648->52598 52649 46b6bd 52657 46b71e 52649->52657 52658 46b6c8 52649->52658 52653 403634 4 API calls 52650->52653 52654 46b682 52651->52654 52653->52638 52656 403634 4 API calls 52654->52656 52656->52630 52659 403400 4 API calls 52657->52659 52660 403494 4 API calls 52658->52660 52663 46b726 52659->52663 52672 46b6d6 52660->52672 52666 402b58 DestroyWindow 52663->52666 52668 46b72d 52666->52668 52670 46b73a 52668->52670 52682 46b7cf 52668->52682 52697 496578 52670->52697 52672->52663 52676 403634 4 API calls 52672->52676 52678 46b71c 52672->52678 52676->52672 52678->52663 52680 46b870 52702 429594 SendMessageA SendMessageA 52680->52702 52701 429544 SendMessageA 52682->52701 52683->51804 52705 42a490 52684->52705 52686 46a4fb 52687 46a51b 52686->52687 52688 42a490 SendMessageA 52686->52688 52687->52627 52689 46a50b 52688->52689 52689->52627 52694 46a80d 52690->52694 52691 46a86f 52692 403400 4 API calls 52691->52692 52693 46a884 52692->52693 52694->52691 52708 46a764 44 API calls 52694->52708 52696->52649 52709 43de68 52697->52709 52701->52680 52702->52594 52703->52615 52704->52615 52706 418630 52705->52706 52707 42a4a3 SendMessageA 52706->52707 52707->52686 52708->52694 52714 43238c 52709->52714 52720 47f01d 52719->52720 52724 47f05a 52719->52724 52733 4564a8 52720->52733 52724->51810 52726 402b58 DestroyWindow 52727 47f08b 52726->52727 52727->51810 52728->51856 52734 4564b9 52733->52734 52735 4564c6 52734->52735 52736 4564bd 52734->52736 52766 45628c 30 API calls 52735->52766 52758 4561ac 52736->52758 52739 4564c3 52739->52724 52740 47ec74 52739->52740 52748 47ecb4 52740->52748 52749 47ed70 52740->52749 52741 47ed13 52742 403420 4 API calls 52741->52742 52743 47ee53 52742->52743 52743->52726 52747 47d578 44 API calls 52747->52749 52748->52741 52748->52749 52752 47d578 44 API calls 52748->52752 52755 47ed1c 52748->52755 52797 47a9e8 52748->52797 52812 47ab64 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52748->52812 52749->52741 52749->52747 52751 454868 20 API calls 52749->52751 52814 47a8a8 20 API calls 52749->52814 52750 47d578 44 API calls 52750->52755 52751->52749 52752->52748 52753 42cd7c 5 API calls 52753->52755 52754 42cda4 5 API calls 52754->52755 52755->52748 52755->52750 52755->52753 52755->52754 52757 47ed5d 52755->52757 52813 47e980 53 API calls 52755->52813 52757->52741 52767 42e26c 52758->52767 52760 4561c9 52761 456217 52760->52761 52770 4560e0 52760->52770 52761->52739 52766->52739 52768 42e277 52767->52768 52769 42e27d RegOpenKeyExA 52767->52769 52768->52769 52769->52760 52777 42e1a8 52770->52777 52772 456178 52773 403420 4 API calls 52772->52773 52775 456108 52775->52772 52776 40352c 4 API calls 52775->52776 52776->52775 52780 42e050 52777->52780 52781 42e076 RegQueryValueExA 52780->52781 52782 42e0bb 52781->52782 52787 42e099 52781->52787 52783 403400 4 API calls 52782->52783 52785 42e187 52783->52785 52784 42e0b3 52786 403400 4 API calls 52784->52786 52785->52775 52786->52782 52787->52782 52787->52784 52788 4034e0 4 API calls 52787->52788 52789 403744 4 API calls 52787->52789 52788->52787 52790 42e0f0 RegQueryValueExA 52789->52790 52790->52781 52791 42e10c 52790->52791 52791->52782 52792 4038a4 4 API calls 52791->52792 52798 47a9fe 52797->52798 52799 47a9fa 52797->52799 52800 403450 4 API calls 52798->52800 52799->52748 52801 47aa0b 52800->52801 52802 403450 4 API calls 52801->52802 52803 47aa17 52802->52803 52804 47aa37 52803->52804 52805 47aa1d 52803->52805 52816 47a8a8 20 API calls 52804->52816 52815 47a8a8 20 API calls 52805->52815 52808 47aa33 52809 403400 4 API calls 52808->52809 52812->52748 52813->52755 52814->52749 52815->52808 52816->52808 52823 465f63 52820->52823 52899 46d465 52898->52899 52900 46d4b2 52899->52900 52901 414f38 4 API calls 52899->52901 52902 403420 4 API calls 52900->52902 52903 46d47b 52901->52903 52905 46d55c 52902->52905 53131 4675b0 6 API calls 52903->53131 52905->51961 53126 409030 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 52905->53126 52906 46d483 52907 414f68 4 API calls 52906->52907 52908 46d491 52907->52908 52909 46d49e 52908->52909 52911 46d4b7 52908->52911 53132 4802d4 43 API calls 52909->53132 52912 46d4cf 52911->52912 52914 467694 CharNextA 52911->52914 53133 4802d4 43 API calls 52912->53133 52915 46d4cb 52914->52915 52915->52912 52916 46d4e5 52915->52916 52917 46d501 52916->52917 52918 46d4eb 52916->52918 52920 42cdec CharNextA 52917->52920 53134 4802d4 43 API calls 52918->53134 53127->51969 53131->52906 53132->52900 53133->52900 53134->52900 54722 432076 54721->54722 54723 402648 4 API calls 54722->54723 54724 4320a6 54723->54724 54725 4960e0 54724->54725 54726 4961b5 54725->54726 54729 4960fa 54725->54729 54732 4961f8 54726->54732 54728 43420c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54728->54729 54729->54726 54729->54728 54730 432140 4 API calls 54729->54730 54731 403450 4 API calls 54729->54731 54755 40905c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54729->54755 54730->54729 54731->54729 54733 496214 54732->54733 54756 43420c 54733->54756 54735 496219 54736 432140 4 API calls 54735->54736 54737 496224 54736->54737 54738 43da34 54737->54738 54739 43da61 54738->54739 54744 43da53 54738->54744 54739->52040 54740 43dadd 54748 43db97 54740->54748 54759 447524 54740->54759 54744->54739 54744->54740 54745 447524 4 API calls 54744->54745 54745->54744 54746 43dd9d 54746->54739 54785 4474c4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54746->54785 54748->54746 54749 43dd7e 54748->54749 54783 4474c4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54748->54783 54784 4474c4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54749->54784 54752->52042 54754->52032 54755->54729 54757 402648 4 API calls 54756->54757 54758 43421b 54757->54758 54758->54735 54760 447543 54759->54760 54761 44754a 54759->54761 54786 4472d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54760->54786 54783->54748 54784->54746 54785->54746 54786->54761 54793 49a490 54851 403344 54793->54851 54795 49a49e 54854 4056a0 54795->54854 54797 49a4a3 54857 4063f4 GetModuleHandleA GetVersion 54797->54857 54801 49a4ad 54948 409d9c 54801->54948 55303 4032fc 54851->55303 54853 403349 GetModuleHandleA GetCommandLineA 54853->54795 54855 4056db 54854->54855 55304 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54854->55304 54855->54797 54858 406445 54857->54858 54859 406425 GetProcAddress 54857->54859 54860 40644d GetProcAddress 54858->54860 54861 40664f GetProcAddress 54858->54861 54859->54858 54862 406436 54859->54862 54863 40645c 54860->54863 54864 406665 GetProcAddress 54861->54864 54865 40665e 54861->54865 54862->54858 55305 406340 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetSystemDirectoryA 54863->55305 54867 406674 SetProcessDEPPolicy 54864->54867 54868 406678 54864->54868 54865->54864 54867->54868 54871 403400 4 API calls 54868->54871 54869 40646b 54870 403450 4 API calls 54869->54870 54873 406478 54870->54873 54872 40668d 54871->54872 54947 406814 6F551CD0 54872->54947 54873->54861 54874 4064ab 54873->54874 54876 40357c 4 API calls 54873->54876 54875 403494 4 API calls 54874->54875 54877 4064b9 54875->54877 54876->54874 54878 40357c 4 API calls 54877->54878 54879 4064c6 54878->54879 55306 40636c SetErrorMode LoadLibraryA 54879->55306 54881 4064ce 54882 403494 4 API calls 54881->54882 54883 4064dc 54882->54883 54884 40357c 4 API calls 54883->54884 54885 4064e9 54884->54885 55307 40636c SetErrorMode LoadLibraryA 54885->55307 54887 4064f1 54888 403494 4 API calls 54887->54888 54889 4064ff 54888->54889 54947->54801 55318 409474 54948->55318 55303->54853 55304->54855 55305->54869 55306->54881 55307->54887 55319 40910c 5 API calls 55318->55319 55320 409485 55319->55320 55321 408a2c GetSystemDefaultLCID 55320->55321 55323 408a62 55321->55323 55322 40723c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 55322->55323 55323->55322 55324 4089b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 55323->55324 55325 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55323->55325 55327 408ac4 55323->55327 55324->55323 55325->55323 55326 40723c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 55326->55327 55327->55326 55328 4089b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 55327->55328 55329 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55327->55329 55330 408b47 55327->55330 55328->55327 55329->55327 55331 403420 4 API calls 55330->55331 55332 408b61 55331->55332 55333 408b70 GetSystemDefaultLCID 55332->55333 55390 4089b8 GetLocaleInfoA 55333->55390 55391 4089f1 55390->55391 55392 4089df 55390->55392 55394 403494 4 API calls 55391->55394 55393 4034e0 4 API calls 55392->55393 56980 499793 56981 4997a7 56980->56981 56982 42f574 4 API calls 56981->56982 56983 4997d8 56982->56983 56984 42f574 4 API calls 56983->56984 56985 4997eb 56984->56985 56986 42f574 4 API calls 56985->56986 56987 4997fe 56986->56987 56988 42f574 4 API calls 56987->56988 56989 499811 56988->56989 56990 424714 5 API calls 56989->56990 56991 499821 56990->56991 56992 42d174 GetFileAttributesA 56991->56992 56993 49982b 56992->56993 56994 49984d 56993->56994 57177 497b6c 43 API calls 56993->57177 56995 499866 56994->56995 56996 499856 56994->56996 57009 498914 56995->57009 57179 4983a0 28 API calls 56996->57179 57000 499848 57178 409030 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 57000->57178 57002 49985b 57003 499864 57002->57003 57180 498538 64 API calls 57002->57180 57181 457a90 GetWindowLongA DestroyWindow SendMessageA 57003->57181 57006 499889 57007 403400 4 API calls 57006->57007 57008 4998a8 57007->57008 57010 49893a 57009->57010 57011 498958 57010->57011 57012 498951 57010->57012 57014 498993 57011->57014 57015 498987 57011->57015 57339 47fa5c 6 API calls 57012->57339 57017 4989bd 57014->57017 57019 4989bf 57014->57019 57020 4989b3 57014->57020 57340 457950 34 API calls 57015->57340 57018 45850c 24 API calls 57017->57018 57021 498a0a 57018->57021 57342 4584b0 30 API calls 57019->57342 57341 4582f8 36 API calls 57020->57341 57024 403494 4 API calls 57021->57024 57025 498a17 57024->57025 57026 40357c 4 API calls 57025->57026 57027 498a25 57026->57027 57028 45850c 24 API calls 57027->57028 57029 498a2d 57028->57029 57030 403494 4 API calls 57029->57030 57031 498a3a 57030->57031 57177->57000 57179->57002 57180->57003 57181->57006 57339->57011 57340->57014 57341->57017 57342->57017 57516 41671a 57517 416746 57516->57517 57518 416726 GetClassInfoA 57516->57518 57518->57517 57519 41673a GetClassInfoA 57518->57519 57519->57517 57520 42405c 57521 424092 57520->57521 57536 4240b3 57521->57536 57614 423fb8 57521->57614 57524 42413c 57528 424143 57524->57528 57529 424177 57524->57529 57525 4240dd 57526 4240e3 57525->57526 57527 4241a0 57525->57527 57530 4240e8 57526->57530 57544 424115 57526->57544 57533 4241b2 57527->57533 57534 4241bb 57527->57534 57535 424149 57528->57535 57573 424401 57528->57573 57531 424182 57529->57531 57532 4244ea IsIconic 57529->57532 57540 424246 57530->57540 57541 4240ee 57530->57541 57542 424526 57531->57542 57543 42418b 57531->57543 57532->57536 57537 4244fe GetFocus 57532->57537 57545 4241c8 57533->57545 57546 4241b9 57533->57546 57629 4245e4 11 API calls 57534->57629 57538 424363 SendMessageA 57535->57538 57539 424157 57535->57539 57537->57536 57549 42450f 57537->57549 57538->57536 57539->57536 57571 424110 57539->57571 57592 4243a6 57539->57592 57634 423fd4 NtdllDefWindowProc_A 57540->57634 57550 4240f7 57541->57550 57551 42426e PostMessageA 57541->57551 57641 424ca0 WinHelpA PostMessageA 57542->57641 57554 42453d 57543->57554 57543->57571 57544->57536 57562 42412e 57544->57562 57563 42428f 57544->57563 57548 42462c 11 API calls 57545->57548 57630 423fd4 NtdllDefWindowProc_A 57546->57630 57548->57536 57639 41f444 GetCurrentThreadId EnumThreadWindows 57549->57639 57557 424100 57550->57557 57558 4242f5 57550->57558 57618 423fd4 NtdllDefWindowProc_A 57551->57618 57560 424546 57554->57560 57561 42455b 57554->57561 57566 424109 57557->57566 57567 42421e IsIconic 57557->57567 57568 4242fe 57558->57568 57569 42432f 57558->57569 57559 42453b 57559->57536 57570 424924 5 API calls 57560->57570 57642 42497c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 57561->57642 57562->57571 57572 42425b 57562->57572 57619 423fd4 NtdllDefWindowProc_A 57563->57619 57566->57571 57578 4241e1 57566->57578 57580 42423a 57567->57580 57581 42422e 57567->57581 57579 423f64 5 API calls 57568->57579 57627 423fd4 NtdllDefWindowProc_A 57569->57627 57570->57536 57571->57536 57628 423fd4 NtdllDefWindowProc_A 57571->57628 57584 4245c8 12 API calls 57572->57584 57573->57536 57588 424427 IsWindowEnabled 57573->57588 57576 424295 57585 4242d3 57576->57585 57586 4242b1 57576->57586 57577 42451e SetFocus 57577->57536 57578->57536 57631 42309c ShowWindow PostMessageA PostQuitMessage 57578->57631 57587 424306 57579->57587 57633 423fd4 NtdllDefWindowProc_A 57580->57633 57632 424010 15 API calls 57581->57632 57584->57536 57620 423ed4 57585->57620 57593 423f64 5 API calls 57586->57593 57596 424318 57587->57596 57602 41f3a8 6 API calls 57587->57602 57588->57536 57597 424435 57588->57597 57591 424335 57598 42434d 57591->57598 57604 41f2f4 2 API calls 57591->57604 57592->57536 57599 4243c8 IsWindowEnabled 57592->57599 57600 4242b9 PostMessageA 57593->57600 57635 423fd4 NtdllDefWindowProc_A 57596->57635 57607 42443c IsWindowVisible 57597->57607 57605 423ed4 6 API calls 57598->57605 57599->57536 57606 4243d6 57599->57606 57600->57536 57602->57596 57604->57598 57605->57536 57636 412760 7 API calls 57606->57636 57607->57536 57609 42444a GetFocus 57607->57609 57610 418630 57609->57610 57611 42445f SetFocus 57610->57611 57637 415690 57611->57637 57615 423fc2 57614->57615 57616 423fcd 57614->57616 57615->57616 57617 408b70 7 API calls 57615->57617 57616->57524 57616->57525 57617->57616 57618->57536 57619->57576 57621 423f5d PostMessageA 57620->57621 57622 423ee4 57620->57622 57621->57536 57622->57621 57623 423eea EnumWindows 57622->57623 57623->57621 57624 423f06 GetWindow GetWindowLongA 57623->57624 57643 423e6c GetWindow 57623->57643 57625 423f25 57624->57625 57625->57621 57626 423f51 SetWindowPos 57625->57626 57626->57621 57626->57625 57627->57591 57628->57536 57629->57536 57630->57536 57631->57536 57632->57536 57633->57536 57634->57536 57635->57536 57636->57536 57638 4156ab SetFocus 57637->57638 57638->57536 57640 41f472 57639->57640 57640->57536 57640->57577 57641->57559 57642->57559 57644 423e8d GetWindowLongA 57643->57644 57645 423e99 57643->57645 57644->57645 57646 477e98 57679 4781ac 57646->57679 57648 477ecc 57649 477ee6 GetClassInfoW 57648->57649 57669 477f22 57648->57669 57650 477efa 57649->57650 57649->57669 57653 477f17 SetWindowLongW 57650->57653 57651 478087 57652 42a490 SendMessageA 57651->57652 57653->57669 57655 477fe9 57655->57651 57660 47d578 44 API calls 57655->57660 57658 477f55 GetACP 57658->57669 57659 4035c0 4 API calls 57659->57669 57661 47801e 57660->57661 57668 477f9a SendMessageW 57668->57669 57669->57655 57669->57658 57669->57659 57669->57668 57737 403ba4 7 API calls 57669->57737 57680 4781b6 57679->57680 57681 497064 52 API calls 57680->57681 57682 4781cc 57681->57682 57683 49736c 21 API calls 57682->57683 57684 4781d3 57683->57684 57685 4972d8 11 API calls 57684->57685 57686 4781da 57685->57686 57687 414f68 4 API calls 57686->57687 57688 4781e7 57687->57688 57689 414f68 4 API calls 57688->57689 57690 4781f8 57689->57690 57691 414f68 4 API calls 57690->57691 57692 478209 57691->57692 57693 414f68 4 API calls 57692->57693 57694 47821a 57693->57694 57695 41d520 24 API calls 57694->57695 57696 47822a 57695->57696 57697 41aafc 5 API calls 57696->57697 57698 478235 57697->57698 57699 41d520 24 API calls 57698->57699 57700 47828c 57699->57700 57740 41af88 57700->57740 57702 478295 57702->57648 57737->57669 57741 41afa3 57740->57741 57748 41aff5 57740->57748 57741->57748 57749 41b5b8 19 API calls 57741->57749 57743 41afc2 57750 41a4a8 GetSysColor 57743->57750 57745 41afcf SetBkColor 57751 41a4a8 GetSysColor 57745->57751 57747 41afe4 SetTextColor 57747->57748 57748->57702 57749->57743 57750->57745 57751->57747 57770 41f2a4 57771 41f2b3 IsWindowVisible 57770->57771 57772 41f2e9 57770->57772 57771->57772 57773 41f2bd IsWindowEnabled 57771->57773 57773->57772 57774 41f2c7 57773->57774 57775 402648 4 API calls 57774->57775 57776 41f2d1 EnableWindow 57775->57776 57776->57772 57777 41ffa8 57778 41ffb1 57777->57778 57781 42024c 57778->57781 57780 41ffbe 57782 42033e 57781->57782 57783 420263 57781->57783 57782->57780 57783->57782 57802 41fe0c GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 57783->57802 57785 420299 57786 4202c3 57785->57786 57787 42029d 57785->57787 57812 41fe0c GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 57786->57812 57803 41ffec 57787->57803 57791 4202d1 57793 4202d5 57791->57793 57794 4202fb 57791->57794 57792 41ffec 10 API calls 57795 4202c1 57792->57795 57796 41ffec 10 API calls 57793->57796 57797 41ffec 10 API calls 57794->57797 57795->57780 57798 4202e7 57796->57798 57799 42030d 57797->57799 57800 41ffec 10 API calls 57798->57800 57801 41ffec 10 API calls 57799->57801 57800->57795 57801->57795 57802->57785 57804 420007 57803->57804 57805 41fd8c 4 API calls 57804->57805 57806 42001d 57804->57806 57805->57806 57813 41fd8c 57806->57813 57808 420065 57809 420088 SetScrollInfo 57808->57809 57821 41feec 57809->57821 57812->57791 57814 418630 57813->57814 57815 41fda9 GetWindowLongA 57814->57815 57816 41fde6 57815->57816 57817 41fdc6 57815->57817 57833 41fd18 GetWindowLongA GetSystemMetrics GetSystemMetrics 57816->57833 57832 41fd18 GetWindowLongA GetSystemMetrics GetSystemMetrics 57817->57832 57820 41fdd2 57820->57808 57822 41fefa 57821->57822 57823 41ff02 57821->57823 57822->57792 57824 41ff3f 57823->57824 57825 41ff41 57823->57825 57826 41ff31 57823->57826 57827 41ff81 GetScrollPos 57824->57827 57835 418298 IsWindowVisible ScrollWindow SetWindowPos 57825->57835 57834 418298 IsWindowVisible ScrollWindow SetWindowPos 57826->57834 57827->57822 57830 41ff8c 57827->57830 57831 41ff9b SetScrollPos 57830->57831 57831->57822 57832->57820 57833->57820 57834->57824 57835->57824 57836 404d2a 57843 404d3a 57836->57843 57837 404e07 ExitProcess 57838 404de0 57852 404cf0 57838->57852 57839 404e12 57842 404cf0 4 API calls 57844 404df4 57842->57844 57843->57837 57843->57838 57843->57839 57845 404db7 MessageBoxA 57843->57845 57846 404dcc 57843->57846 57856 401a90 57844->57856 57845->57838 57868 40500c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57846->57868 57849 404df9 57849->57837 57849->57839 57854 404cfe 57852->57854 57853 404d13 57853->57842 57854->57853 57869 402728 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57854->57869 57857 401aa1 57856->57857 57858 401b6f 57856->57858 57859 401ac2 LocalFree 57857->57859 57860 401ab8 RtlEnterCriticalSection 57857->57860 57858->57849 57861 401af5 57859->57861 57860->57859 57862 401ae3 VirtualFree 57861->57862 57863 401afd 57861->57863 57862->57861 57864 401b24 LocalFree 57863->57864 57865 401b3b 57863->57865 57864->57864 57864->57865 57866 401b53 RtlLeaveCriticalSection 57865->57866 57867 401b5d RtlDeleteCriticalSection 57865->57867 57866->57867 57867->57849 57869->57853 57870 4209e8 57871 4209fb 57870->57871 57891 415f80 57871->57891 57873 420b42 57874 420b59 57873->57874 57898 414b24 KiUserCallbackDispatcher 57873->57898 57878 420b70 57874->57878 57899 414b68 KiUserCallbackDispatcher 57874->57899 57875 420aa1 57896 420c98 20 API calls 57875->57896 57876 420a36 57876->57873 57876->57875 57884 420a92 MulDiv 57876->57884 57879 420b92 57878->57879 57900 4204b0 12 API calls 57878->57900 57882 420aba 57882->57873 57897 4204b0 12 API calls 57882->57897 57895 41a754 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 57884->57895 57887 420ad7 57888 420af3 MulDiv 57887->57888 57889 420b16 57887->57889 57888->57889 57889->57873 57890 420b1f MulDiv 57889->57890 57890->57873 57892 415f92 57891->57892 57901 4148c0 57892->57901 57894 415faa 57894->57876 57895->57875 57896->57882 57897->57887 57898->57874 57899->57878 57900->57879 57902 4148da 57901->57902 57905 4108a8 57902->57905 57904 4148f0 57904->57894 57908 40e0f4 57905->57908 57907 4108ae 57907->57904 57909 40e156 57908->57909 57911 40e107 57908->57911 57910 40e164 19 API calls 57909->57910 57912 40e160 57910->57912 57919 40e164 57911->57919 57912->57907 57916 40e139 57932 40db78 DestroyWindow 57916->57932 57918 40e14e 57918->57907 57920 40e174 57919->57920 57922 40e18a 57920->57922 57933 40e4ec 57920->57933 57949 40da30 57920->57949 57952 40e39c 57922->57952 57925 40da30 5 API calls 57926 40e192 57925->57926 57926->57925 57927 40e1fe 57926->57927 57955 40dfb0 57926->57955 57929 40e39c 5 API calls 57927->57929 57930 40e131 57929->57930 57931 40dacc DestroyWindow 57930->57931 57931->57916 57932->57918 57934 40edbc 5 API calls 57933->57934 57937 40e527 57934->57937 57935 403778 4 API calls 57935->57937 57936 40e5dd 57938 40e607 57936->57938 57939 40e5f8 57936->57939 57937->57935 57937->57936 58022 40dbc4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 57937->58022 58023 40e4d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 57937->58023 58019 40be74 57938->58019 57969 40e810 57939->57969 57944 40e605 57946 403400 4 API calls 57944->57946 57947 40e6ac 57946->57947 57947->57920 57950 40ee58 5 API calls 57949->57950 57951 40da3a 57950->57951 57951->57920 58056 40d90c 57952->58056 57956 40e3a4 5 API calls 57955->57956 57957 40dfe3 57956->57957 57958 40edbc 5 API calls 57957->57958 57959 40dfee 57958->57959 57960 40edbc 5 API calls 57959->57960 57961 40dff9 57960->57961 57962 40e014 57961->57962 57963 40e00b 57961->57963 57968 40e011 57961->57968 58065 40de28 57962->58065 58068 40df18 19 API calls 57963->58068 57966 403420 4 API calls 57967 40e0df 57966->57967 57967->57926 57968->57966 57970 40e846 57969->57970 57971 40e83c 57969->57971 57973 40e961 57970->57973 57974 40e8e5 57970->57974 57975 40e946 57970->57975 57976 40e9c6 57970->57976 57977 40e888 57970->57977 57978 40e929 57970->57978 57979 40e90b 57970->57979 57994 40e8ac 57970->57994 58013 40e8b9 57970->58013 58025 40d890 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 57971->58025 57988 40dbb4 5 API calls 57973->57988 58033 40e274 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 57974->58033 58038 40ece0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 57975->58038 57985 40dbb4 5 API calls 57976->57985 58026 40dbb4 57977->58026 58036 40edf8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 57978->58036 58035 40e234 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 57979->58035 57981 403400 4 API calls 57990 40ea3b 57981->57990 57993 40e9ce 57985->57993 57989 40e969 57988->57989 57996 40e973 57989->57996 57997 40e96d 57989->57997 57990->57944 57991 40e934 58037 40a188 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57991->58037 57992 40e8f0 58034 40d8c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 57992->58034 58000 40e9d2 57993->58000 58001 40e9eb 57993->58001 57994->57981 58039 40ee58 57996->58039 58010 40e971 57997->58010 58011 40ee58 5 API calls 57997->58011 58006 40ee58 5 API calls 58000->58006 58045 40e274 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 58001->58045 58002 40e8b1 58031 40e328 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 58002->58031 58003 40e894 58029 40e274 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 58003->58029 58006->57994 58009 40e89f 58030 40e6bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 58009->58030 58010->57994 58043 40e274 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 58010->58043 58015 40e994 58011->58015 58013->57994 58032 40dc68 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 58013->58032 58042 40dcf0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 58015->58042 58016 40e9b6 58044 40e724 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58016->58044 58051 40be20 58019->58051 58022->57937 58023->57937 58024 40dbc4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 58024->57944 58025->57970 58027 40ee58 5 API calls 58026->58027 58028 40dbbe 58027->58028 58028->58002 58028->58003 58029->58009 58030->57994 58031->58013 58032->57994 58033->57992 58034->57994 58035->57994 58036->57991 58037->57994 58038->57994 58046 40dbd0 58039->58046 58042->58010 58043->58016 58044->57994 58045->57994 58047 40dbdb 58046->58047 58048 40dc15 58047->58048 58050 40dc1c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 58047->58050 58048->57994 58050->58047 58052 40be32 58051->58052 58054 40be57 58051->58054 58052->58054 58055 40bed4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58052->58055 58054->57944 58054->58024 58055->58054 58057 40ee58 5 API calls 58056->58057 58058 40d919 58057->58058 58059 40d92c 58058->58059 58063 40ef5c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 58058->58063 58059->57926 58061 40d927 58064 40d8a8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 58061->58064 58063->58061 58064->58059 58069 40afcc 19 API calls 58065->58069 58067 40de50 58067->57968 58068->57968 58069->58067 58070 416e6c 58071 416e97 58070->58071 58072 416e7f 58070->58072 58084 416e92 58071->58084 58095 416de0 PtInRect GetCapture 58071->58095 58073 416e81 58072->58073 58074 416eea 58072->58074 58079 416e86 58073->58079 58080 416eb4 58073->58080 58087 4156c0 58074->58087 58077 416f21 58078 4156c0 59 API calls 58078->58077 58081 416f51 GetCapture 58079->58081 58079->58084 58080->58084 58086 421f3c 6 API calls 58080->58086 58081->58084 58082 416ef3 58082->58077 58094 416d20 PtInRect 58082->58094 58084->58077 58084->58078 58086->58084 58088 4156cd 58087->58088 58089 415733 58088->58089 58091 415728 58088->58091 58093 415731 58088->58093 58096 424fdc 13 API calls 58089->58096 58091->58093 58097 4154ac 46 API calls 58091->58097 58093->58082 58094->58077 58095->58084 58096->58093 58097->58093 58098 422cac 58099 422cdc 58098->58099 58100 422cbf 58098->58100 58102 422ef1 58099->58102 58103 422d16 58099->58103 58109 422f4f 58099->58109 58100->58099 58101 40910c 5 API calls 58100->58101 58101->58099 58104 422f43 58102->58104 58105 422f39 58102->58105 58135 422d6d 58103->58135 58138 4235f8 GetSystemMetrics 58103->58138 58104->58109 58113 422f87 58104->58113 58114 422f68 58104->58114 58141 42227c 11 API calls 58105->58141 58106 422e19 58110 422e25 58106->58110 58111 422e5b 58106->58111 58107 422ecc 58115 422ee6 ShowWindow 58107->58115 58118 422e2f SendMessageA 58110->58118 58119 422e75 ShowWindow 58111->58119 58117 422f91 GetActiveWindow 58113->58117 58120 422f7f SetWindowPos 58114->58120 58115->58109 58116 422db1 58139 4235f0 GetSystemMetrics 58116->58139 58124 422f9c 58117->58124 58137 422fbb 58117->58137 58121 418630 58118->58121 58123 418630 58119->58123 58120->58109 58125 422e53 ShowWindow 58121->58125 58128 422e97 CallWindowProcA 58123->58128 58129 422fa4 IsIconic 58124->58129 58130 422eaa SendMessageA 58125->58130 58126 422fc1 58134 422fd8 SetWindowPos SetActiveWindow 58126->58134 58127 422fe6 58132 422ff0 ShowWindow 58127->58132 58140 415114 58128->58140 58133 422fae 58129->58133 58129->58137 58130->58109 58132->58109 58136 41f444 2 API calls 58133->58136 58134->58109 58135->58106 58135->58107 58136->58137 58137->58126 58137->58127 58138->58116 58139->58135 58140->58130 58141->58104 58142 48f6bc 58143 48f70d 58142->58143 58144 48f739 58143->58144 58145 48f70f 58143->58145 58148 48f748 58144->58148 58149 48f772 58144->58149 58146 447498 18 API calls 58145->58146 58147 48f71c 58146->58147 58150 4534e4 5 API calls 58147->58150 58151 447498 18 API calls 58148->58151 58156 48f7ab 58149->58156 58157 48f781 58149->58157 58152 48f729 58150->58152 58154 48f755 58151->58154 58813 447570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58152->58813 58155 4530c4 11 API calls 58154->58155 58159 48f762 58155->58159 58164 48f7ba 58156->58164 58165 48f81f 58156->58165 58158 447498 18 API calls 58157->58158 58160 48f78e 58158->58160 58814 447570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58159->58814 58163 453134 11 API calls 58160->58163 58162 403420 4 API calls 58166 490d11 58162->58166 58167 48f79b 58163->58167 58168 447498 18 API calls 58164->58168 58174 48f82e 58165->58174 58175 48f8a4 58165->58175 58169 403420 4 API calls 58166->58169 58815 447570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58167->58815 58172 48f7c9 58168->58172 58170 490d1e 58169->58170 58173 403400 4 API calls 58170->58173 58176 447498 18 API calls 58172->58176 58177 490d26 58173->58177 58178 44743c 18 API calls 58174->58178 58183 48f90f 58175->58183 58184 48f8b3 58175->58184 58179 48f7e0 58176->58179 58180 48f83a 58178->58180 58181 447498 18 API calls 58179->58181 58182 44743c 18 API calls 58180->58182 58185 48f7f3 58181->58185 58187 48f847 58182->58187 58194 48f96b 58183->58194 58195 48f91e 58183->58195 58188 447498 18 API calls 58184->58188 58186 447498 18 API calls 58185->58186 58189 48f804 58186->58189 58190 447498 18 API calls 58187->58190 58191 48f8c2 58188->58191 58816 42d1e4 6 API calls 58189->58816 58196 48f857 58190->58196 58192 447498 18 API calls 58191->58192 58198 48f8d5 58192->58198 58208 48f97a 58194->58208 58209 48f9b3 58194->58209 58200 447498 18 API calls 58195->58200 58197 447498 18 API calls 58196->58197 58201 48f86a 58197->58201 58202 447498 18 API calls 58198->58202 58199 48f80e 58817 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58199->58817 58204 48f92d 58200->58204 58206 447498 18 API calls 58201->58206 58207 48f8e6 58202->58207 58205 447498 18 API calls 58204->58205 58210 48f940 58205->58210 58211 48f87b 58206->58211 58820 4473f0 18 API calls 58207->58820 58213 447498 18 API calls 58208->58213 58221 48fa22 58209->58221 58222 48f9c2 58209->58222 58214 447498 18 API calls 58210->58214 58215 44743c 18 API calls 58211->58215 58217 48f989 58213->58217 58218 48f951 58214->58218 58219 48f88b 58215->58219 58216 48f8f6 58821 42d37c 6 API calls 58216->58821 58223 447498 18 API calls 58217->58223 58823 42d42c GetPrivateProfileStringA GetProfileStringA lstrcmp 58218->58823 58818 42d2e8 6 API calls 58219->58818 58236 48fa8d 58221->58236 58237 48fa31 58221->58237 58227 447498 18 API calls 58222->58227 58228 48f99a 58223->58228 58226 48f8ff 58822 447570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58226->58822 58233 48f9d1 58227->58233 58825 42d478 GetPrivateProfileStringA GetProfileStringA 58228->58825 58230 48f95b 58824 447570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58230->58824 58231 48f894 58819 447718 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58231->58819 58239 447498 18 API calls 58233->58239 58234 48f9a3 58826 447570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58234->58826 58245 48faf8 58236->58245 58246 48fa9c 58236->58246 58241 447498 18 API calls 58237->58241 58242 48f9e4 58239->58242 58243 48fa40 58241->58243 58244 447498 18 API calls 58242->58244 58247 447498 18 API calls 58243->58247 58248 48f9f7 58244->58248 58256 48fb46 58245->58256 58257 48fb07 58245->58257 58249 447498 18 API calls 58246->58249 58250 48fa53 58247->58250 58251 447498 18 API calls 58248->58251 58252 48faab 58249->58252 58253 447498 18 API calls 58250->58253 58254 48fa08 58251->58254 58258 447498 18 API calls 58252->58258 58259 48fa64 58253->58259 58827 42d4e8 WritePrivateProfileStringA WriteProfileStringA 58254->58827 58269 48fb80 58256->58269 58270 48fb55 58256->58270 58261 447498 18 API calls 58257->58261 58262 48fabe 58258->58262 58263 44743c 18 API calls 58259->58263 58260 48fa12 58828 447570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58260->58828 58265 48fb16 58261->58265 58266 447498 18 API calls 58262->58266 58267 48fa74 58263->58267 58271 447498 18 API calls 58265->58271 58272 48facf 58266->58272 58829 42d558 21 API calls 58267->58829 58283 48fbb8 58269->58283 58284 48fb8f 58269->58284 58274 447498 18 API calls 58270->58274 58275 48fb27 58271->58275 58831 4473f0 18 API calls 58272->58831 58273 48fa7d 58830 447570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58273->58830 58278 48fb62 58274->58278 58279 447498 18 API calls 58275->58279 58282 447498 18 API calls 58278->58282 58285 48fb37 58279->58285 58280 48fadf 58832 42d5b8 21 API calls 58280->58832 58287 48fb72 58282->58287 58294 48fbe0 58283->58294 58295 48fbc7 58283->58295 58288 447498 18 API calls 58284->58288 58834 42d5d0 WritePrivateProfileStringA WriteProfileStringA 58285->58834 58286 48fae8 58833 447570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58286->58833 58835 42d61c WritePrivateProfileStringA WriteProfileStringA 58287->58835 58292 48fb9c 58288->58292 58293 42d658 5 API calls 58292->58293 58296 48fba7 58293->58296 58301 48fbef 58294->58301 58302 48fc04 58294->58302 58297 42d77c 5 API calls 58295->58297 58836 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58296->58836 58299 48fbcf 58297->58299 58837 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58299->58837 58303 42d840 5 API calls 58301->58303 58306 48fc13 58302->58306 58307 48fc36 58302->58307 58304 48fbf4 58303->58304 58838 447718 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58304->58838 58308 44743c 18 API calls 58306->58308 58310 48fc6e 58307->58310 58311 48fc45 58307->58311 58309 48fc1d 58308->58309 58312 42d89c 6 API calls 58309->58312 58318 48fc7d 58310->58318 58319 48fca6 58310->58319 58313 447498 18 API calls 58311->58313 58314 48fc25 58312->58314 58315 48fc52 58313->58315 58839 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58314->58839 58317 42c84c 5 API calls 58315->58317 58320 48fc5d 58317->58320 58321 447498 18 API calls 58318->58321 58324 48fcde 58319->58324 58325 48fcb5 58319->58325 58840 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58320->58840 58323 48fc8a 58321->58323 58841 42cfb8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue CharPrevA 58323->58841 58332 48fced 58324->58332 58333 48fd16 58324->58333 58327 447498 18 API calls 58325->58327 58330 48fcc2 58327->58330 58328 48fc95 58842 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58328->58842 58331 42d010 6 API calls 58330->58331 58335 48fccd 58331->58335 58334 447498 18 API calls 58332->58334 58339 48fd4e 58333->58339 58340 48fd25 58333->58340 58336 48fcfa 58334->58336 58843 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58335->58843 58844 42d938 6 API calls 58336->58844 58345 48fd8b 58339->58345 58346 48fd5d 58339->58346 58342 447498 18 API calls 58340->58342 58341 48fd05 58845 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58341->58845 58344 48fd32 58342->58344 58846 42d990 LocalAlloc TlsSetValue TlsGetValue TlsGetValue CharPrevA 58344->58846 58353 48fd9a 58345->58353 58354 48fdb3 58345->58354 58348 447498 18 API calls 58346->58348 58350 48fd6a 58348->58350 58349 48fd3d 58847 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58349->58847 58848 45329c 8 API calls 58350->58848 58356 42dce8 5 API calls 58353->58356 58360 48fddb 58354->58360 58361 48fdc2 58354->58361 58355 48fd7a 58849 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58355->58849 58358 48fda2 58356->58358 58850 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58358->58850 58365 48fdea 58360->58365 58366 48fe03 58360->58366 58362 42dd14 5 API calls 58361->58362 58363 48fdca 58362->58363 58851 4477ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 58363->58851 58367 42dd40 6 API calls 58365->58367 58370 48fe30 58366->58370 58371 48fe12 58366->58371 58368 48fdf2 58367->58368 58375 48fe58 58370->58375 58376 48fe3f 58370->58376 58853 42ddc4 8 API calls 58371->58853 58479 48f734 58479->58162 58813->58479 58814->58479 58815->58479 58816->58199 58817->58479 58818->58231 58819->58479 58820->58216 58821->58226 58822->58479 58823->58230 58824->58479 58825->58234 58826->58479 58827->58260 58828->58479 58829->58273 58830->58479 58831->58280 58832->58286 58833->58479 58834->58479 58835->58479 58836->58479 58837->58479 58838->58479 58839->58479 58840->58479 58841->58328 58842->58479 58843->58479 58844->58341 58845->58479 58846->58349 58847->58479 58848->58355 58849->58479 58850->58479 58851->58479 58931 422734 58932 422743 58931->58932 58937 4216c4 58932->58937 58935 422763 58938 421733 58937->58938 58952 4216d3 58937->58952 58941 421744 58938->58941 58962 412920 GetMenuItemCount GetMenuStringA GetMenuState 58938->58962 58940 421772 58944 4217e5 58940->58944 58949 42178d 58940->58949 58941->58940 58943 42180a 58941->58943 58942 4217e3 58945 421836 58942->58945 58964 42227c 11 API calls 58942->58964 58943->58942 58948 42181e SetMenu 58943->58948 58944->58942 58951 4217f9 58944->58951 58965 42160c 10 API calls 58945->58965 58948->58942 58949->58942 58955 4217b0 GetMenu 58949->58955 58950 42183d 58950->58935 58960 422638 10 API calls 58950->58960 58954 421802 SetMenu 58951->58954 58952->58938 58961 40917c 19 API calls 58952->58961 58954->58942 58956 4217d3 58955->58956 58957 4217ba 58955->58957 58963 412920 GetMenuItemCount GetMenuStringA GetMenuState 58956->58963 58959 4217cd SetMenu 58957->58959 58959->58956 58960->58935 58961->58952 58962->58941 58963->58942 58964->58945 58965->58950 58966 42e83f SetErrorMode
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ADDBACKSLASH$ADDPERIOD$ADDQUOTES$CHARLENGTH$CONVERTPERCENTSTR$DELETEINIENTRY$DELETEINISECTION$DIREXISTS$FILECOPY$FILEEXISTS$FILEORDIREXISTS$FONTEXISTS$GETCMDTAIL$GETENV$GETINIBOOL$GETINIINT$GETINISTRING$GETSHORTNAME$GETSYSNATIVEDIR$GETSYSTEMDIR$GETSYSWOW64DIR$GETTEMPDIR$GETUILANGUAGE$GETWINDIR$INIKEYEXISTS$ISADMINLOGGEDON$ISINISECTIONEMPTY$ISPOWERUSERLOGGEDON$PARAMCOUNT$PARAMSTR$REGDELETEKEYIFEMPTY$REGDELETEKEYINCLUDINGSUBKEYS$REGDELETEVALUE$REGGETSUBKEYNAMES$REGGETVALUENAMES$REGKEYEXISTS$REGQUERYBINARYVALUE$REGQUERYDWORDVALUE$REGQUERYMULTISTRINGVALUE$REGQUERYSTRINGVALUE$REGVALUEEXISTS$REGWRITEBINARYVALUE$REGWRITEDWORDVALUE$REGWRITEEXPANDSTRINGVALUE$REGWRITEMULTISTRINGVALUE$REGWRITESTRINGVALUE$REMOVEBACKSLASH$REMOVEBACKSLASHUNLESSROOT$REMOVEQUOTES$SETINIBOOL$SETINIINT$SETINISTRING$SETNTFSCOMPRESSION$STRINGCHANGE$STRINGCHANGEEX$USINGWINNT
                                        • API String ID: 0-4234653879
                                        • Opcode ID: 19854b33dafa67cb38d998cdaf23aab5f995192ac433efa49c9268e7aa2fcbb3
                                        • Instruction ID: 5ab6688b1d8de169e7eae929f0fe5b5c72d30124bbb070add725f290c9b618ac
                                        • Opcode Fuzzy Hash: 19854b33dafa67cb38d998cdaf23aab5f995192ac433efa49c9268e7aa2fcbb3
                                        • Instruction Fuzzy Hash: BAD25370B041455BDB04EBB9C8819AEBBA5AF58704F50893FB406AB346DF3CED068799
                                        Strings
                                        • Incrementing shared file count (64-bit)., xrefs: 0047257B
                                        • Version of existing file: (none), xrefs: 00471CDA
                                        • Failed to strip read-only attribute., xrefs: 00471EB3
                                        • Installing into GAC, xrefs: 004726FA
                                        • Skipping due to "onlyifdestfileexists" flag., xrefs: 00471EDA
                                        • Non-default bitness: 64-bit, xrefs: 0047188F
                                        • Time stamp of existing file: %s, xrefs: 00471A0B
                                        • , xrefs: 00471BAF, 00471D80, 00471DFE
                                        • Couldn't read time stamp. Skipping., xrefs: 00471D15
                                        • InUn, xrefs: 0047213F
                                        • Will register the file (a DLL/OCX) later., xrefs: 0047250E
                                        • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00471CA4
                                        • Time stamp of our file: %s, xrefs: 0047197B
                                        • Time stamp of our file: (failed to read), xrefs: 00471987
                                        • Dest file exists., xrefs: 0047199B
                                        • Existing file is a newer version. Skipping., xrefs: 00471BE2
                                        • Skipping due to "onlyifdoesntexist" flag., xrefs: 004719AE
                                        • Dest filename: %s, xrefs: 00471874
                                        • .tmp, xrefs: 00471F97
                                        • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 00471E76
                                        • Installing the file., xrefs: 00471EE9
                                        • Version of existing file: %u.%u.%u.%u, xrefs: 00471B5C
                                        • Dest file is protected by Windows File Protection., xrefs: 004718CD
                                        • Version of our file: %u.%u.%u.%u, xrefs: 00471AD0
                                        • Existing file has a later time stamp. Skipping., xrefs: 00471DAF
                                        • Existing file is protected by Windows File Protection. Skipping., xrefs: 00471DCC
                                        • Same version. Skipping., xrefs: 00471CC5
                                        • Non-default bitness: 32-bit, xrefs: 0047189B
                                        • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00471CB0
                                        • User opted not to overwrite the existing file. Skipping., xrefs: 00471E2D
                                        • Version of our file: (none), xrefs: 00471ADC
                                        • Same time stamp. Skipping., xrefs: 00471D35
                                        • Stripped read-only attribute., xrefs: 00471EA7
                                        • -- File entry --, xrefs: 004716DB
                                        • Time stamp of existing file: (failed to read), xrefs: 00471A17
                                        • Uninstaller requires administrator: %s, xrefs: 0047216F
                                        • Will register the file (a type library) later., xrefs: 00472502
                                        • I, xrefs: 00471688
                                        • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00471C95
                                        • Incrementing shared file count (32-bit)., xrefs: 00472594
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $-- File entry --$.tmp$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.$I
                                        • API String ID: 0-4118084788
                                        • Opcode ID: c14e226d9891336989dafe503ecccccce581ef0ae42d4d4c3c1148ce2efd792b
                                        • Instruction ID: 6bf2baeb3a70bced245c17dd6e1df6b1677c078c0e18323f60fd28fe4f0ee562
                                        • Opcode Fuzzy Hash: c14e226d9891336989dafe503ecccccce581ef0ae42d4d4c3c1148ce2efd792b
                                        • Instruction Fuzzy Hash: 73927134A042889FDB11DFA9C585BDDBBF4AF05304F1480ABE848BB392D7789E45DB19

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2397 42e4ec-42e4fd 2398 42e508-42e52d AllocateAndInitializeSid 2397->2398 2399 42e4ff-42e503 2397->2399 2400 42e6d7-42e6df 2398->2400 2401 42e533-42e550 GetVersion 2398->2401 2399->2400 2402 42e552-42e567 GetModuleHandleA GetProcAddress 2401->2402 2403 42e569-42e56b 2401->2403 2402->2403 2404 42e592-42e5ac GetCurrentThread OpenThreadToken 2403->2404 2405 42e56d-42e57b CheckTokenMembership 2403->2405 2408 42e5e3-42e60b GetTokenInformation 2404->2408 2409 42e5ae-42e5b8 GetLastError 2404->2409 2406 42e581-42e58d 2405->2406 2407 42e6b9-42e6cf FreeSid 2405->2407 2406->2407 2410 42e626-42e64a call 402648 GetTokenInformation 2408->2410 2411 42e60d-42e615 GetLastError 2408->2411 2412 42e5c4-42e5d7 GetCurrentProcess OpenProcessToken 2409->2412 2413 42e5ba-42e5bf call 4031bc 2409->2413 2424 42e658-42e660 2410->2424 2425 42e64c-42e656 call 4031bc * 2 2410->2425 2411->2410 2415 42e617-42e621 call 4031bc * 2 2411->2415 2412->2408 2414 42e5d9-42e5de call 4031bc 2412->2414 2413->2400 2414->2400 2415->2400 2427 42e662-42e663 2424->2427 2428 42e693-42e6b1 call 402660 CloseHandle 2424->2428 2425->2400 2431 42e665-42e678 EqualSid 2427->2431 2435 42e67a-42e687 2431->2435 2436 42e68f-42e691 2431->2436 2435->2436 2439 42e689-42e68d 2435->2439 2436->2428 2436->2431 2439->2428
                                        APIs
                                        • AllocateAndInitializeSid.ADVAPI32(0049B788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E526
                                        • GetVersion.KERNEL32(00000000,0042E6D0,?,0049B788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E543
                                        • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E6D0,?,0049B788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E55C
                                        • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E562
                                        • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E6D0,?,0049B788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E577
                                        • FreeSid.ADVAPI32(00000000,0042E6D7,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E6CA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                        • String ID: CheckTokenMembership$advapi32.dll
                                        • API String ID: 2252812187-1888249752
                                        • Opcode ID: bec140b171ea519891e8f75e6984b41f13cc792e2a5660a755a4f82e4b8777e7
                                        • Instruction ID: 33373ee259e646c263c3edb0d375fd355344fbe6f0fea3053a31bb261822ccd7
                                        • Opcode Fuzzy Hash: bec140b171ea519891e8f75e6984b41f13cc792e2a5660a755a4f82e4b8777e7
                                        • Instruction Fuzzy Hash: 33518371B44619AEDB10EAE69842B7F77ACDB19304FD4047BB500F72C2D57CD904876A

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2440 456dd4-456e06 call 403728 2443 456e21 2440->2443 2444 456e08-456e1f CoCreateInstance 2440->2444 2445 456e26-456e28 2443->2445 2444->2445 2446 456e55-456e99 call 403738 * 2 2445->2446 2447 456e2a-456e47 CoCreateInstance 2445->2447 2456 456ea6-456eaa 2446->2456 2457 456e9b-456ea1 call 456bf8 2446->2457 2447->2446 2448 456e49-456e50 call 453c18 2447->2448 2448->2446 2459 456eac-456eb3 2456->2459 2460 456eea-456ef9 2456->2460 2457->2456 2461 456eb5-456ecf call 47d578 call 42df60 2459->2461 2462 456ed4-456ee5 call 403738 2459->2462 2468 456f0c-456f11 2460->2468 2469 456efb-456f07 call 403738 2460->2469 2461->2462 2462->2460 2471 456f21-456f28 call 456bd8 2468->2471 2472 456f13-456f1c 2468->2472 2469->2468 2477 456f2e-456f36 2471->2477 2478 457089-45709c 2471->2478 2472->2471 2479 456f42-456f55 2477->2479 2480 456f38-456f3c 2477->2480 2482 45709e-4570a5 call 453c18 2478->2482 2483 4570aa-4570ae 2478->2483 2488 456f57-456f5e call 453c18 2479->2488 2489 456f63-456f67 2479->2489 2480->2478 2480->2479 2482->2483 2486 4570b0-4570b7 call 456bb8 2483->2486 2487 4570d3-4570db call 403ca4 2483->2487 2486->2487 2504 4570b9-4570d1 call 42c948 call 403ca4 2486->2504 2502 4570de-4570e2 2487->2502 2488->2489 2490 456f97-456f99 2489->2490 2491 456f69-456f89 2489->2491 2496 457004-457008 2490->2496 2497 456f9b-456faf call 403ca4 2490->2497 2491->2490 2505 456f8b-456f92 call 453c18 2491->2505 2500 457070-45707b 2496->2500 2501 45700a-45702a 2496->2501 2515 456fb6-456fd8 2497->2515 2516 456fb1 call 409050 2497->2516 2500->2478 2518 45707d-457084 call 453c18 2500->2518 2519 45702c-457033 call 453c18 2501->2519 2520 457038-45703f call 456be8 2501->2520 2506 4570e4 call 409050 2502->2506 2507 4570e9-4570f3 2502->2507 2504->2502 2505->2490 2506->2507 2521 4570f8-4570fa 2507->2521 2533 456fe6-456ffc SysFreeString 2515->2533 2534 456fda-456fe1 call 453c18 2515->2534 2516->2515 2518->2478 2519->2520 2520->2500 2537 457041-457062 2520->2537 2527 4570fc-457103 call 453c18 2521->2527 2528 457108-457127 call 456cec 2521->2528 2527->2528 2538 457132-457136 2528->2538 2539 457129-45712d SysFreeString 2528->2539 2534->2533 2537->2500 2545 457064-45706b call 453c18 2537->2545 2540 457141-457145 2538->2540 2541 457138-45713c 2538->2541 2539->2538 2543 457147-45714b 2540->2543 2544 457150-457159 2540->2544 2541->2540 2543->2544 2545->2500
                                        APIs
                                        • CoCreateInstance.OLE32(0049BA74,00000000,00000001,0049B774,?,00000000,0045717F), ref: 00456E1A
                                        • CoCreateInstance.OLE32(0049B764,00000000,00000001,0049B774,?,00000000,0045717F), ref: 00456E40
                                        • SysFreeString.OLEAUT32(00000000), ref: 00456FF7
                                        Strings
                                        • IPersistFile::Save, xrefs: 004570FE
                                        • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 004570A0
                                        • CoCreateInstance, xrefs: 00456E4B
                                        • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 00456FDC
                                        • {pf32}\, xrefs: 00456EBA
                                        • IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption), xrefs: 00457066
                                        • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 0045702E
                                        • %ProgramFiles(x86)%\, xrefs: 00456ECA
                                        • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 00456F59
                                        • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 00456F8D
                                        • IPropertyStore::Commit, xrefs: 0045707F
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CreateInstance$FreeString
                                        • String ID: %ProgramFiles(x86)%\$CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)${pf32}\
                                        • API String ID: 308859552-2363233914
                                        • Opcode ID: 07d5a5579f8ca6652d0c1b29a29510edaaf9d516a664dc31519823db798bd8dc
                                        • Instruction ID: 02ec3099c1e013a4d2a6014e0405d8002507ef7a0ca247d1a979c15f6e32810c
                                        • Opcode Fuzzy Hash: 07d5a5579f8ca6652d0c1b29a29510edaaf9d516a664dc31519823db798bd8dc
                                        • Instruction Fuzzy Hash: 57B18071A04204AFDB11DFA9D845B9E7BF8AF08706F5440B6F904E7262DB38DD48CB69

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2869 42405c-424090 2870 424092-424093 2869->2870 2871 4240c4-4240db call 423fb8 2869->2871 2872 424095-4240b1 call 40b69c 2870->2872 2876 42413c-424141 2871->2876 2877 4240dd 2871->2877 2905 4240b3-4240bb 2872->2905 2906 4240c0-4240c2 2872->2906 2881 424143 2876->2881 2882 424177-42417c 2876->2882 2879 4240e3-4240e6 2877->2879 2880 4241a0-4241b0 2877->2880 2883 424115-424118 2879->2883 2884 4240e8 2879->2884 2887 4241b2-4241b7 2880->2887 2888 4241bb-4241c3 call 4245e4 2880->2888 2890 424401-424409 2881->2890 2891 424149-424151 2881->2891 2885 424182-424185 2882->2885 2886 4244ea-4244f8 IsIconic 2882->2886 2900 4241f9-424200 2883->2900 2901 42411e-42411f 2883->2901 2896 424246-424256 call 423fd4 2884->2896 2897 4240ee-4240f1 2884->2897 2898 424526-42453b call 424ca0 2885->2898 2899 42418b-42418c 2885->2899 2892 4245a2-4245aa 2886->2892 2893 4244fe-424509 GetFocus 2886->2893 2903 4241c8-4241d0 call 42462c 2887->2903 2904 4241b9-4241dc call 423fd4 2887->2904 2888->2892 2890->2892 2902 42440f-42441a call 418630 2890->2902 2894 424363-42438a SendMessageA 2891->2894 2895 424157-42415c 2891->2895 2919 4245c1-4245c7 2892->2919 2893->2892 2909 42450f-424518 call 41f444 2893->2909 2894->2892 2917 424162-424163 2895->2917 2918 42449a-4244a5 2895->2918 2896->2892 2910 4240f7-4240fa 2897->2910 2911 42426e-424284 PostMessageA call 423fd4 2897->2911 2898->2892 2921 424192-424195 2899->2921 2922 42453d-424544 2899->2922 2900->2892 2913 424206-42420d 2900->2913 2914 424125-424128 2901->2914 2915 42438f-424396 2901->2915 2902->2892 2954 424420-42442f call 418630 IsWindowEnabled 2902->2954 2903->2892 2904->2892 2905->2919 2906->2871 2906->2872 2909->2892 2967 42451e-424524 SetFocus 2909->2967 2928 424100-424103 2910->2928 2929 4242f5-4242fc 2910->2929 2962 424289-42428a 2911->2962 2913->2892 2933 424213-424219 2913->2933 2934 42412e-424131 2914->2934 2935 42428f-4242af call 423fd4 2914->2935 2915->2892 2944 42439c-4243a1 call 404e54 2915->2944 2937 4244c2-4244cd 2917->2937 2938 424169-42416c 2917->2938 2918->2892 2940 4244ab-4244bd 2918->2940 2941 424570-424577 2921->2941 2942 42419b 2921->2942 2931 424546-424559 call 424924 2922->2931 2932 42455b-42456e call 42497c 2922->2932 2947 424109-42410a 2928->2947 2948 42421e-42422c IsIconic 2928->2948 2949 4242fe-424311 call 423f64 2929->2949 2950 42432f-424340 call 423fd4 2929->2950 2931->2892 2932->2892 2933->2892 2952 424137 2934->2952 2953 42425b-424269 call 4245c8 2934->2953 2983 4242d3-4242f0 call 423ed4 PostMessageA 2935->2983 2984 4242b1-4242ce call 423f64 PostMessageA 2935->2984 2937->2892 2961 4244d3-4244e5 2937->2961 2958 424172 2938->2958 2959 4243a6-4243ae 2938->2959 2940->2892 2956 42458a-424599 2941->2956 2957 424579-424588 2941->2957 2960 42459b-42459c call 423fd4 2942->2960 2944->2892 2968 424110 2947->2968 2969 4241e1-4241e9 2947->2969 2975 42423a-424241 call 423fd4 2948->2975 2976 42422e-424235 call 424010 2948->2976 2998 424323-42432a call 423fd4 2949->2998 2999 424313-42431d call 41f3a8 2949->2999 3003 424342-424348 call 41f2f4 2950->3003 3004 424356-42435e call 423ed4 2950->3004 2952->2960 2953->2892 2954->2892 3000 424435-424444 call 418630 IsWindowVisible 2954->3000 2956->2892 2957->2892 2958->2960 2959->2892 2965 4243b4-4243bb 2959->2965 2991 4245a1 2960->2991 2961->2892 2962->2892 2965->2892 2982 4243c1-4243d0 call 418630 IsWindowEnabled 2965->2982 2967->2892 2968->2960 2969->2892 2985 4241ef-4241f4 call 42309c 2969->2985 2975->2892 2976->2892 2982->2892 3014 4243d6-4243ec call 412760 2982->3014 2983->2892 2984->2892 2985->2892 2991->2892 2998->2892 2999->2998 3000->2892 3021 42444a-424495 GetFocus call 418630 SetFocus call 415690 SetFocus 3000->3021 3018 42434d-424350 3003->3018 3004->2892 3014->2892 3024 4243f2-4243fc 3014->3024 3018->3004 3021->2892 3024->2892
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fe6f3cab85cb6cd94dd259e2a1688b0505dda5d67cc9468b745cf4902a0b6c1d
                                        • Instruction ID: 43e49367b0b6739e18dd975752e7d81306140be7a57883210305ee73c05c6530
                                        • Opcode Fuzzy Hash: fe6f3cab85cb6cd94dd259e2a1688b0505dda5d67cc9468b745cf4902a0b6c1d
                                        • Instruction Fuzzy Hash: 59E16E30704124EFD710DB6AE685A5DB7F4EF84314FA540A6F6859B392CB38EE81DB09

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3028 422cac-422cbd 3029 422ce1-422d00 3028->3029 3030 422cbf-422cc9 3028->3030 3031 422ff6-42300d 3029->3031 3032 422d06-422d10 3029->3032 3030->3029 3033 422ccb-422cdc call 40910c call 40311c 3030->3033 3035 422ef1-422f37 call 402c00 3032->3035 3036 422d16-422d5b call 402c00 3032->3036 3033->3029 3045 422f43-422f4d 3035->3045 3046 422f39-422f3e call 42227c 3035->3046 3047 422d61-422d6b 3036->3047 3048 422dff-422e13 3036->3048 3052 422f4f-422f57 call 416b00 3045->3052 3053 422f5c-422f66 3045->3053 3046->3045 3054 422da7-422dbb call 4235f8 3047->3054 3055 422d6d-422d84 call 414b0c 3047->3055 3049 422e19-422e23 3048->3049 3050 422ecc-422eec call 418630 ShowWindow 3048->3050 3056 422e25-422e59 call 418630 SendMessageA call 418630 ShowWindow 3049->3056 3057 422e5b-422ea5 call 418630 ShowWindow call 418630 CallWindowProcA call 415114 3049->3057 3050->3031 3052->3031 3061 422f87-422f9a call 418630 GetActiveWindow 3053->3061 3062 422f68-422f85 call 418630 SetWindowPos 3053->3062 3074 422dc0-422dd4 call 4235f0 3054->3074 3075 422dbd 3054->3075 3077 422d86 3055->3077 3078 422d89-422da0 call 414b50 3055->3078 3096 422eaa-422ec7 SendMessageA 3056->3096 3057->3096 3080 422f9c-422fac call 418630 IsIconic 3061->3080 3081 422fbd-422fbf 3061->3081 3062->3031 3094 422dd9-422ddb 3074->3094 3097 422dd6 3074->3097 3075->3074 3077->3078 3093 422da2-422da5 3078->3093 3078->3094 3080->3081 3102 422fae-422fbb call 418630 call 41f444 3080->3102 3090 422fc1-422fe4 call 418630 SetWindowPos SetActiveWindow 3081->3090 3091 422fe6-422ff1 call 418630 ShowWindow 3081->3091 3090->3031 3091->3031 3093->3094 3103 422ddf-422de1 3094->3103 3104 422ddd 3094->3104 3096->3031 3097->3094 3102->3081 3107 422de3 3103->3107 3108 422de5-422dfa 3103->3108 3104->3103 3107->3108 3108->3048
                                        APIs
                                        • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422E44
                                        • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,0042300E), ref: 00422E54
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: MessageSendShowWindow
                                        • String ID:
                                        • API String ID: 1631623395-0
                                        • Opcode ID: 50d217a044accfbb6ff9672ceaa0ff858f3e4d17f8446c7d09d6d8818b0f9199
                                        • Instruction ID: bacc4b86db7cb1d0e13acf93141a7ddfdaa0ad6c2af5cb9121abc77d57b19b6c
                                        • Opcode Fuzzy Hash: 50d217a044accfbb6ff9672ceaa0ff858f3e4d17f8446c7d09d6d8818b0f9199
                                        • Instruction Fuzzy Hash: 1B916270B14254AFD700DBA9DB46F9E77F4AB04304F5600B6F904AB292C7B8AE01AB58
                                        APIs
                                          • Part of subcall function 004971B4: GetWindowRect.USER32(00000000), ref: 004971CA
                                        • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 004683DD
                                          • Part of subcall function 0041DB00: GetObjectA.GDI32(?,00000018,004683F6), ref: 0041DB2B
                                          • Part of subcall function 00467E10: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467EB3
                                          • Part of subcall function 00467E10: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467ED9
                                          • Part of subcall function 00467E10: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 00467F30
                                          • Part of subcall function 004677CC: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00468491,00000000,00000000,00000000,0000000C,00000000), ref: 004677E4
                                          • Part of subcall function 00497438: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 00497442
                                          • Part of subcall function 0042F188: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042F1E4
                                          • Part of subcall function 0042F188: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042F201
                                          • Part of subcall function 00497104: GetDC.USER32(00000000), ref: 00497126
                                          • Part of subcall function 00497104: SelectObject.GDI32(?,00000000), ref: 0049714C
                                          • Part of subcall function 00497104: ReleaseDC.USER32(00000000,?), ref: 0049719D
                                          • Part of subcall function 00497428: MulDiv.KERNEL32(0000004B,?,00000006), ref: 00497432
                                        • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,00000000,?), ref: 00469080
                                        • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00469091
                                        • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 004690A9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Menu$AppendExtractIconObject$AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadProcRectReleaseSelectSystemUserWindow
                                        • String ID: $(Default)$STOPIMAGE
                                        • API String ID: 616467991-770201673
                                        • Opcode ID: 533b5b9c69d50d4e3bf7389d015b08925e7f9e5915c964b06be795d887c19e03
                                        • Instruction ID: 80892e57212ece105f8354d293749779e47711168eff5a6823bea21c9da9ff55
                                        • Opcode Fuzzy Hash: 533b5b9c69d50d4e3bf7389d015b08925e7f9e5915c964b06be795d887c19e03
                                        • Instruction Fuzzy Hash: 90F2E7786005108FCB00EB69D8D9F9977F5BF89304F1542BAE5049B36ADB78EC46CB4A
                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,004566E7), ref: 004565D8
                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004565DE
                                        • GetDiskFreeSpaceExA.KERNELBASE(00000000,?,?,00000000,00000000,004566C5,?,00000000,kernel32.dll,GetDiskFreeSpaceExA,00000000,004566E7), ref: 00456634
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressDiskFreeHandleModuleProcSpace
                                        • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                        • API String ID: 1197914913-3712701948
                                        • Opcode ID: 25df71702425412e55e0ebe1ec94dd27c79a220fb61393adf873e88db180ab3d
                                        • Instruction ID: b48cc3d91c9fc3d8a1033014b63779c50d18bc65ef0bc06e4cd1291adb105b9d
                                        • Opcode Fuzzy Hash: 25df71702425412e55e0ebe1ec94dd27c79a220fb61393adf873e88db180ab3d
                                        • Instruction Fuzzy Hash: A2417471A00249AFCF01EFA5C8829EFBBB8EF48304F514567F800F7252D6795D098B69
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,0047628A,?,?,0049E1E4,00000000), ref: 00476179
                                        • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,0047628A,?,?,0049E1E4,00000000), ref: 00476256
                                        • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,0047628A,?,?,0049E1E4,00000000), ref: 00476264
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Find$File$CloseFirstNext
                                        • String ID: unins$unins???.*
                                        • API String ID: 3541575487-1009660736
                                        • Opcode ID: 816df3ee00217b6bb4e518e82dd9f1b30d6009901d4e98b0830000b4814bbc5f
                                        • Instruction ID: eb89464c752a784b36226a23c26c23c5edadcf818cb3280f2000aa581376a5b5
                                        • Opcode Fuzzy Hash: 816df3ee00217b6bb4e518e82dd9f1b30d6009901d4e98b0830000b4814bbc5f
                                        • Instruction Fuzzy Hash: 11312E70600548ABDB50EB65CC81ADEBBADDB45314F5180F6A84CAB3A6DB389F418F58
                                        APIs
                                        • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,00448BA9), ref: 00448AEC
                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00448B6D
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID:
                                        • API String ID: 2574300362-0
                                        • Opcode ID: 867ba43a10b71c4e0cee705246465b706dfe17f876c727b36fdc5ac37d46efd6
                                        • Instruction ID: 477aa25612ad46cb30709e51daa048e72857c65cf3d1b396dc19b103b65ac6e4
                                        • Opcode Fuzzy Hash: 867ba43a10b71c4e0cee705246465b706dfe17f876c727b36fdc5ac37d46efd6
                                        • Instruction Fuzzy Hash: AA5133B0E00545AFDB00EF95C481AAEB7F9EB44315F10817FB814BB395DA78AE058B99
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00453207,?,?,-00000001,00000000), ref: 004531E1
                                        • GetLastError.KERNEL32(00000000,?,00000000,00453207,?,?,-00000001,00000000), ref: 004531E9
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorFileFindFirstLast
                                        • String ID:
                                        • API String ID: 873889042-0
                                        • Opcode ID: 1201cac6feb998a2fb112764d438cb0eb727cdb5a4391e78fe092c8218b0a9ce
                                        • Instruction ID: d0bf465202dae3429285692917932fac375c13b7b10a14b33624456fe0da4cd4
                                        • Opcode Fuzzy Hash: 1201cac6feb998a2fb112764d438cb0eb727cdb5a4391e78fe092c8218b0a9ce
                                        • Instruction Fuzzy Hash: FEF02371A046047BCB10DF7AAC0145EF7ACDB4577675046BBFC14D3291DB784F088558
                                        APIs
                                        • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049D4C4,00000001,?,00408A83,?,00000000,00408B62), ref: 004089D6
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID:
                                        • API String ID: 2299586839-0
                                        • Opcode ID: 40f9e6ad7b9874a9b05efedc53f019727417c817c0661ecad43f37488e602a1d
                                        • Instruction ID: 37d1d3aac47cb6b8cd62020f591dd9ac8cec50bf03644e7f1bddec785b1dbc63
                                        • Opcode Fuzzy Hash: 40f9e6ad7b9874a9b05efedc53f019727417c817c0661ecad43f37488e602a1d
                                        • Instruction Fuzzy Hash: 63E0227170021452C315A91A8C82AFAB24C9B18314F00427FB948E73C3EDB89E8042ED
                                        APIs
                                        • NtdllDefWindowProc_A.USER32(?,?,?,?,?,004245A1,?,00000000,004245AC), ref: 00423FFE
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: NtdllProc_Window
                                        • String ID:
                                        • API String ID: 4255912815-0
                                        • Opcode ID: 15ec92afe3337674697e5aaff926351660f6d808b83c1ecc1d592f8d8ff41db7
                                        • Instruction ID: 626c949ff67c0b5daba62b8ffba664747ea83a29b03f4787c3cb7294a8149fcf
                                        • Opcode Fuzzy Hash: 15ec92afe3337674697e5aaff926351660f6d808b83c1ecc1d592f8d8ff41db7
                                        • Instruction Fuzzy Hash: 9CF0B379205608AF8B40DF99C588D4ABBE8AB4C260B058295B988CB321C234EE808F94
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: NameUser
                                        • String ID:
                                        • API String ID: 2645101109-0
                                        • Opcode ID: aa3a47175e92b859a3c3631cc0a30abc799c89e82c4a450a6b7a51612d703bec
                                        • Instruction ID: 82cf1e81aeab4cdf4c711474db213eebdc1b2e178f500b1422eacd8e28b83923
                                        • Opcode Fuzzy Hash: aa3a47175e92b859a3c3631cc0a30abc799c89e82c4a450a6b7a51612d703bec
                                        • Instruction Fuzzy Hash: 0AD0C27230460063C700AAA99C826AA359C8B84305F00883F3CC5DA2C3EABDDA4C5696

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1317 46fe70-46fea2 1318 46fea4-46feab 1317->1318 1319 46febf 1317->1319 1321 46feb6-46febd 1318->1321 1322 46fead-46feb4 1318->1322 1320 46fec6-46fefe call 403634 call 403738 call 42e310 1319->1320 1329 46ff00-46ff14 call 403738 call 42e310 1320->1329 1330 46ff19-46ff42 call 403738 call 42e234 1320->1330 1321->1320 1322->1319 1322->1321 1329->1330 1338 46ff44-46ff4d call 46fb40 1330->1338 1339 46ff52-46ff7b call 46fc5c 1330->1339 1338->1339 1343 46ff8d-46ff90 call 403400 1339->1343 1344 46ff7d-46ff8b call 403494 1339->1344 1348 46ff95-46ffe0 call 46fc5c call 42c84c call 46fca4 call 46fc5c 1343->1348 1344->1348 1357 46fff6-470017 call 455d38 call 46fc5c 1348->1357 1358 46ffe2-46fff5 call 46fccc 1348->1358 1365 47006d-470074 1357->1365 1366 470019-47006c call 46fc5c call 4318a4 call 46fc5c call 4318a4 call 46fc5c 1357->1366 1358->1357 1367 470076-4700ae call 4318a4 call 46fc5c call 4318a4 call 46fc5c 1365->1367 1368 4700b4-4700bb 1365->1368 1366->1365 1403 4700b3 1367->1403 1370 4700bd-4700fb call 46fc5c * 3 1368->1370 1371 4700fc-470121 call 40b69c call 46fc5c 1368->1371 1370->1371 1392 470123-47012e call 47d578 1371->1392 1393 470130-470139 call 403494 1371->1393 1400 47013e-470149 call 47a04c 1392->1400 1393->1400 1407 470152 1400->1407 1408 47014b-470150 1400->1408 1403->1368 1409 470157-470321 call 403778 call 46fc5c call 47d578 call 46fca4 call 403494 call 40357c * 2 call 46fc5c call 403494 call 40357c * 2 call 46fc5c call 47d578 call 46fca4 call 47d578 call 46fca4 call 47d578 call 46fca4 call 47d578 call 46fca4 call 47d578 call 46fca4 call 47d578 call 46fca4 call 47d578 call 46fca4 call 47d578 call 46fca4 call 47d578 call 46fca4 call 47d578 1407->1409 1408->1409 1472 470337-470345 call 46fccc 1409->1472 1473 470323-470335 call 46fc5c 1409->1473 1477 47034a 1472->1477 1478 47034b-470394 call 46fccc call 46fd00 call 46fc5c call 47d578 call 46fd64 1473->1478 1477->1478 1489 470396-4703d8 call 46fccc * 4 1478->1489 1490 4703de-4703eb 1478->1490 1520 4703dd 1489->1520 1491 4703f1-4703f8 1490->1491 1492 4704ba-4704c1 1490->1492 1494 470465-470474 1491->1494 1495 4703fa-470401 1491->1495 1497 4704c3-4704f9 call 4965d4 1492->1497 1498 47051b-470531 RegCloseKey 1492->1498 1499 470477-470484 1494->1499 1495->1494 1500 470403-470427 call 43106c 1495->1500 1497->1498 1503 470486-470493 1499->1503 1504 47049b-4704b4 call 4310a8 call 46fccc 1499->1504 1500->1499 1513 470429-47042a 1500->1513 1503->1504 1508 470495-470499 1503->1508 1518 4704b9 1504->1518 1508->1492 1508->1504 1516 47042c-470452 call 40b69c call 47a8a8 1513->1516 1524 470454-47045a call 43106c 1516->1524 1525 47045f-470461 1516->1525 1518->1492 1520->1490 1524->1525 1525->1516 1527 470463 1525->1527 1527->1499
                                        APIs
                                          • Part of subcall function 0046FC5C: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,VtG,?,0049E1E4,?,0046FF73,?,00000000,00470532,?,_is1), ref: 0046FC7F
                                        • RegCloseKey.ADVAPI32(?,00470539,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,00470584,?,?,0049E1E4,00000000), ref: 0047052C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseValue
                                        • String ID: " /SILENT$5.5.9 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$VersionMajor$VersionMinor$_is1
                                        • API String ID: 3132538880-2925550972
                                        • Opcode ID: fdb3abc282401ddcde1fd324222dc74367cf93ffdb601943bdf46b8bae72a72a
                                        • Instruction ID: 8dffaa2781584bc6e947bd791be20880efee78ab32c439a28404737c84d0984c
                                        • Opcode Fuzzy Hash: fdb3abc282401ddcde1fd324222dc74367cf93ffdb601943bdf46b8bae72a72a
                                        • Instruction Fuzzy Hash: F8124F34A00108DBDB04EB55E991ADE77F5EF48304F60807BE804AB3A5EB79BD45CB59

                                        Control-flow Graph

                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,00000000,0040668E,?,?,?,?,00000000,?,0049A4A8), ref: 0040640F
                                        • GetVersion.KERNEL32(kernel32.dll,00000000,0040668E,?,?,?,?,00000000,?,0049A4A8), ref: 00406416
                                        • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0040642B
                                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406453
                                        • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406655
                                        • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040666B
                                        • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,kernel32.dll,00000000,0040668E,?,?,?,?,00000000,?,0049A4A8), ref: 00406676
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModulePolicyProcessVersion
                                        • String ID: SetDefaultDllDirectories$SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$apphelp.dll$clbcatq.dll$comres.dll$cryptbase.dll$dwmapi.dll$kernel32.dll$oleacc.dll$profapi.dll$propsys.dll$setupapi.dll$userenv.dll$uxtheme.dll$version.dll
                                        • API String ID: 3297890031-2388063882
                                        • Opcode ID: 7c5204fbbc2168c2f62eadc490ed385a4cfd672bd01c7cc457884a48157f0828
                                        • Instruction ID: 52ceb319b1b10a2745084cc2a18598c2ecefae742a63aceaaee3a2f28509b87b
                                        • Opcode Fuzzy Hash: 7c5204fbbc2168c2f62eadc490ed385a4cfd672bd01c7cc457884a48157f0828
                                        • Instruction Fuzzy Hash: 7061F130A00109EBCB01FBA6D982D8E77B9AB44709B214077B405772E6DB3DEF199B5D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2548 450994-4509b9 2549 450a8c-450ab0 call 403420 2548->2549 2550 4509bf-4509cc GetVersion 2548->2550 2550->2549 2551 4509d2-450a0c call 450964 call 42c84c call 40357c call 403738 LoadLibraryA 2550->2551 2551->2549 2562 450a0e-450a87 GetProcAddress * 6 2551->2562 2562->2549
                                        APIs
                                        • GetVersion.KERNEL32(00000000,00450AB1,?,?,?,?,00000000,00000000), ref: 004509BF
                                          • Part of subcall function 00450964: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0045097C
                                        • LoadLibraryA.KERNEL32(00000000,00000000,00450AB1,?,?,?,?,00000000,00000000), ref: 004509FB
                                        • GetProcAddress.KERNEL32(00000000,RmStartSession), ref: 00450A19
                                        • GetProcAddress.KERNEL32(00000000,RmRegisterResources), ref: 00450A2E
                                        • GetProcAddress.KERNEL32(00000000,RmGetList), ref: 00450A43
                                        • GetProcAddress.KERNEL32(00000000,RmShutdown), ref: 00450A58
                                        • GetProcAddress.KERNEL32(00000000,RmRestart), ref: 00450A6D
                                        • GetProcAddress.KERNEL32(00000000,RmEndSession), ref: 00450A82
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc$DirectoryLibraryLoadSystemVersion
                                        • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                        • API String ID: 2754715182-3419246398
                                        • Opcode ID: d8d5ff48d6aa38830af6a9e8a73036221bb65f2481768552fb853932befe92ab
                                        • Instruction ID: 7e76809d132c55fa29070b713de61cc7a3e08993567f6b48a797f9432d6667d5
                                        • Opcode Fuzzy Hash: d8d5ff48d6aa38830af6a9e8a73036221bb65f2481768552fb853932befe92ab
                                        • Instruction Fuzzy Hash: 58212AB4A00304AEE710FBA5EC86A6E77F8E764755F50053BB810A71A3D6789D49CB1C

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2563 484e68-484e8d GetModuleHandleA GetProcAddress 2564 484e8f-484ea5 GetNativeSystemInfo GetProcAddress 2563->2564 2565 484ef4-484ef9 GetSystemInfo 2563->2565 2566 484efe-484f07 2564->2566 2567 484ea7-484eb2 GetCurrentProcess 2564->2567 2565->2566 2568 484f09-484f0d 2566->2568 2569 484f17-484f1e 2566->2569 2567->2566 2576 484eb4-484eb8 2567->2576 2570 484f0f-484f13 2568->2570 2571 484f20-484f27 2568->2571 2572 484f39-484f3e 2569->2572 2574 484f29-484f30 2570->2574 2575 484f15-484f32 2570->2575 2571->2572 2574->2572 2575->2572 2576->2566 2578 484eba-484ec1 call 452e60 2576->2578 2578->2566 2581 484ec3-484ed0 GetProcAddress 2578->2581 2581->2566 2582 484ed2-484ee9 GetModuleHandleA GetProcAddress 2581->2582 2582->2566 2583 484eeb-484ef2 2582->2583 2583->2566
                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00484E79
                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00484E86
                                        • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00484E94
                                        • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00484E9C
                                        • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00484EA8
                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00484EC9
                                        • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00484EDC
                                        • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00484EE2
                                        • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00484EF9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                        • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                        • API String ID: 2230631259-2623177817
                                        • Opcode ID: cd68709e737b022a93ba3f5ff6983bcc42b0d1d8f8071fae57a82298f7546d18
                                        • Instruction ID: 19f93fc1e60286517b98713993879556ba5b021e510ed05db2a10d1898c9039d
                                        • Opcode Fuzzy Hash: cd68709e737b022a93ba3f5ff6983bcc42b0d1d8f8071fae57a82298f7546d18
                                        • Instruction Fuzzy Hash: E8110351109353A4E721B3796E46B7F25889B8031CF080C7F7B84666C6EA7CC845833F

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2584 469a0c-469a44 call 47d578 2587 469c26-469c40 call 403420 2584->2587 2588 469a4a-469a5a call 47a06c 2584->2588 2593 469a5f-469aa4 call 407d44 call 403738 call 42e26c 2588->2593 2599 469aa9-469aab 2593->2599 2600 469ab1-469ac6 2599->2600 2601 469c1c-469c20 2599->2601 2602 469adb-469ae2 2600->2602 2603 469ac8-469ad6 call 42e19c 2600->2603 2601->2587 2601->2593 2605 469ae4-469b06 call 42e19c call 42e1b4 2602->2605 2606 469b0f-469b16 2602->2606 2603->2602 2605->2606 2623 469b08 2605->2623 2607 469b6f-469b76 2606->2607 2608 469b18-469b3d call 42e19c * 2 2606->2608 2612 469bbc-469bc3 2607->2612 2613 469b78-469b8a call 42e19c 2607->2613 2630 469b3f-469b48 call 431998 2608->2630 2631 469b4d-469b5f call 42e19c 2608->2631 2616 469bc5-469bf9 call 42e19c * 3 2612->2616 2617 469bfe-469c14 RegCloseKey 2612->2617 2624 469b8c-469b95 call 431998 2613->2624 2625 469b9a-469bac call 42e19c 2613->2625 2616->2617 2623->2606 2624->2625 2625->2612 2637 469bae-469bb7 call 431998 2625->2637 2630->2631 2631->2607 2641 469b61-469b6a call 431998 2631->2641 2637->2612 2641->2607
                                        APIs
                                          • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                                        • RegCloseKey.ADVAPI32(?,00469C26,?,?,00000001,00000000,00000000,00469C41,?,00000000,00000000,?), ref: 00469C0F
                                        Strings
                                        • Inno Setup: No Icons, xrefs: 00469AF7
                                        • Inno Setup: Setup Type, xrefs: 00469B1E
                                        • %s\%s_is1, xrefs: 00469A89
                                        • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00469A6B
                                        • Inno Setup: App Path, xrefs: 00469ACE
                                        • Inno Setup: Selected Tasks, xrefs: 00469B7B
                                        • Inno Setup: User Info: Serial, xrefs: 00469BF1
                                        • Inno Setup: Deselected Tasks, xrefs: 00469B9D
                                        • Inno Setup: User Info: Organization, xrefs: 00469BDE
                                        • Inno Setup: User Info: Name, xrefs: 00469BCB
                                        • Inno Setup: Icon Group, xrefs: 00469AEA
                                        • Inno Setup: Deselected Components, xrefs: 00469B50
                                        • Inno Setup: Selected Components, xrefs: 00469B2E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseOpen
                                        • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                        • API String ID: 47109696-1093091907
                                        • Opcode ID: 7b5af505cdaee4b9995a13ec4fd6d8a32d5a0e4e315676c1a42935439103419e
                                        • Instruction ID: c7de7197f4a769c9e7c3cd52df4c64fbb683598124d789e1de9a85ab418445f9
                                        • Opcode Fuzzy Hash: 7b5af505cdaee4b9995a13ec4fd6d8a32d5a0e4e315676c1a42935439103419e
                                        • Instruction Fuzzy Hash: C4519430A006089BCB15DB66D941BEEB7F9EF49304F5084BAE84067395E7B8AF01CB5D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2643 473aa0-473b9c call 403728 call 403778 call 403684 call 47d578 call 403494 * 2 call 40357c call 42cc54 call 403494 call 40357c call 42cc54 call 403494 call 40357c call 42cc54 * 2 2674 473ba3-473ba7 2643->2674 2675 473b9e-473ba1 2643->2675 2676 473bac-473bb0 2674->2676 2677 473ba9 2674->2677 2675->2676 2678 473bc3-473bd1 call 473770 2676->2678 2679 473bb2-473bbd call 47a04c 2676->2679 2677->2676 2684 473bd3-473bde call 403494 2678->2684 2685 473be0-473be6 call 403494 2678->2685 2679->2678 2686 473bbf 2679->2686 2690 473beb-473c47 call 458718 call 46ef40 call 42ccf4 call 470938 call 4073a0 * 2 call 42d174 2684->2690 2685->2690 2686->2678 2705 473c5d-473c7b call 4073a0 call 473950 call 45850c 2690->2705 2706 473c49-473c58 call 403738 WritePrivateProfileStringA 2690->2706 2715 473c81-473cb3 call 456dd4 2705->2715 2716 473d2e-473d49 call 47380c call 403494 2705->2716 2706->2705 2719 473cb8-473cbc 2715->2719 2728 473d4d-473d62 call 45850c 2716->2728 2721 473cbe-473cc8 call 42d198 2719->2721 2722 473cca-473ccc 2719->2722 2721->2722 2730 473cce 2721->2730 2726 473cd0-473cd7 2722->2726 2726->2728 2729 473cd9-473cdd 2726->2729 2735 473d64-473d78 call 403738 SHChangeNotify 2728->2735 2736 473d7a-473d89 call 403738 SHChangeNotify 2728->2736 2729->2728 2732 473cdf-473cf9 call 42cd4c call 406f14 2729->2732 2730->2726 2732->2728 2745 473cfb-473d20 call 455c44 2732->2745 2744 473d8e-473db7 call 42ccf4 call 403738 SHChangeNotify 2735->2744 2736->2744 2752 473dbd-473dc1 2744->2752 2753 473ebb-473ec0 call 46f2dc 2744->2753 2745->2728 2754 473dc7-473e54 call 45aa00 call 42c84c call 40357c call 45aa00 call 42c84c call 40357c call 45aa00 2752->2754 2755 473e56-473e5a 2752->2755 2760 473ec5-473eef call 403400 call 403420 call 403400 2753->2760 2754->2753 2757 473e7d-473eb6 call 45aa00 * 2 2755->2757 2758 473e5c-473e7b call 45aa00 2755->2758 2757->2753 2758->2753
                                        APIs
                                          • Part of subcall function 0042CC54: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042CC78
                                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00473C58
                                        • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00473D73
                                        • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 00473D89
                                        • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00473DAE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                        • String ID: .lnk$.pif$.url$Creating the icon.$Desktop.ini$Dest filename: %s$Successfully created the icon.$target.lnk${group}\
                                        • API String ID: 971782779-2902529204
                                        • Opcode ID: b72f850a64bbc8f123dd4924d5b2584716dd07303dfbb896ee9ec9fc6b8b6bc3
                                        • Instruction ID: 9b31a6288a8d0ad81c732a29d19026b8086b57763a6276d7ac4447936d78ea7d
                                        • Opcode Fuzzy Hash: b72f850a64bbc8f123dd4924d5b2584716dd07303dfbb896ee9ec9fc6b8b6bc3
                                        • Instruction Fuzzy Hash: EBD11374A00148ABDB11DFA9D582BDDBBF4AF08305F50806AF804B7392D778AE45DB69

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 0042DCE8: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,0045451C,00000000,004547CE,?,?,00000000,0049D62C,00000004,00000000,00000000,00000000,?,00499C8D), ref: 0042DCFB
                                          • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                          • Part of subcall function 0042DD40: GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,004542C2,00000000,00454365,?,?,00000000,00000000,00000000,00000000,00000000,?,00454755,00000000), ref: 0042DD5A
                                          • Part of subcall function 0042DD40: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042DD60
                                        • SHGetKnownFolderPath.SHELL32(0049BD44,00008000,00000000,?,00000000,0047DC4C), ref: 0047DB52
                                        • CoTaskMemFree.OLE32(?,0047DB95), ref: 0047DB88
                                          • Part of subcall function 0042D658: GetEnvironmentVariableA.KERNEL32(00000000,00000000,00000000,?,?,00000000,0042DE8E,00000000,0042DF20,?,?,?,0049D62C,00000000,00000000), ref: 0042D683
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Directory$AddressEnvironmentFolderFreeHandleKnownModulePathProcSystemTaskVariableWindows
                                        • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                        • API String ID: 3771764029-544719455
                                        • Opcode ID: 6ec6ff986ef5dd5265772e09c3445ba75f4a3d0a7ec86f160005d9c17a7e769a
                                        • Instruction ID: 0fe7c2c5921331aa3b985ab989dbf77b3a087c61dea5e3792aec770f31e1cce1
                                        • Opcode Fuzzy Hash: 6ec6ff986ef5dd5265772e09c3445ba75f4a3d0a7ec86f160005d9c17a7e769a
                                        • Instruction Fuzzy Hash: A061B234E24204AFDB11EFA6D84269E7B78EF84318F51C57BE404AB391D77CAA41CA1D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3223 47e184-47e1d6 call 42dd14 call 42c84c call 4035c0 call 452d1c 3232 47e1f3-47e1fa 3223->3232 3233 47e1d8-47e1df 3223->3233 3236 47e205-47e207 3232->3236 3237 47e1fc-47e203 3232->3237 3234 47e1e1-47e1e8 3233->3234 3235 47e209 3233->3235 3234->3232 3238 47e1ea-47e1f1 3234->3238 3239 47e20b-47e20d 3235->3239 3236->3239 3237->3235 3237->3236 3238->3232 3238->3235 3240 47e20f-47e234 call 42c84c call 4035c0 call 47de48 3239->3240 3241 47e239-47e26e call 42dd14 call 42c84c call 40357c call 42e7e4 * 2 3239->3241 3240->3241 3256 47e273-47e27f 3241->3256 3257 47e2a6-47e2c0 GetProcAddress 3256->3257 3258 47e281-47e2a1 call 407d44 call 453aac 3256->3258 3260 47e2c2-47e2c7 call 453aac 3257->3260 3261 47e2cc-47e2ee call 403420 call 403400 3257->3261 3258->3257 3260->3261
                                        APIs
                                          • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                        • GetProcAddress.KERNEL32(00000000,SHGetFolderPathA), ref: 0047E2B1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressDirectoryProcSystem
                                        • String ID: 2$Failed to get address of SHGetFolderPath function$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                        • API String ID: 996212319-3422985891
                                        • Opcode ID: 2ee55fa07f5402e21f3b06f2d1869faf56609dd587cb054fbf2c8bfa1446e0f1
                                        • Instruction ID: 9758cc0716918fe71002c31ee1435c1447d2ac946059de1b269defc554b01a12
                                        • Opcode Fuzzy Hash: 2ee55fa07f5402e21f3b06f2d1869faf56609dd587cb054fbf2c8bfa1446e0f1
                                        • Instruction Fuzzy Hash: C9415830A00119DFDB10DFA6C9415DE77B8FB48309F50C9BBE414A7252D7389E05CB59

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3269 423cc4-423cce 3270 423df7-423dfb 3269->3270 3271 423cd4-423cf6 call 41f814 GetClassInfoA 3269->3271 3274 423d27-423d30 GetSystemMetrics 3271->3274 3275 423cf8-423d0f RegisterClassA 3271->3275 3277 423d32 3274->3277 3278 423d35-423d3f GetSystemMetrics 3274->3278 3275->3274 3276 423d11-423d22 call 40910c call 40311c 3275->3276 3276->3274 3277->3278 3280 423d41 3278->3280 3281 423d44-423da0 call 403738 call 4062f8 call 403400 call 423a9c SetWindowLongA 3278->3281 3280->3281 3292 423da2-423db5 call 4245c8 SendMessageA 3281->3292 3293 423dba-423de8 GetSystemMenu DeleteMenu * 2 3281->3293 3292->3293 3293->3270 3295 423dea-423df2 DeleteMenu 3293->3295 3295->3270
                                        APIs
                                          • Part of subcall function 0041F814: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041F1F4,?,00423CDF,0042405C,0041F1F4), ref: 0041F832
                                        • GetClassInfoA.USER32(00400000,00423ACC), ref: 00423CEF
                                        • RegisterClassA.USER32(0049B630), ref: 00423D07
                                        • GetSystemMetrics.USER32(00000000), ref: 00423D29
                                        • GetSystemMetrics.USER32(00000001), ref: 00423D38
                                        • SetWindowLongA.USER32(004108B0,000000FC,00423ADC), ref: 00423D94
                                        • SendMessageA.USER32(004108B0,00000080,00000001,00000000), ref: 00423DB5
                                        • GetSystemMenu.USER32(004108B0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042405C,0041F1F4), ref: 00423DC0
                                        • DeleteMenu.USER32(00000000,0000F030,00000000,004108B0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042405C,0041F1F4), ref: 00423DCF
                                        • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,004108B0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 00423DDC
                                        • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,004108B0,00000000,00000000,00400000,00000000,00000000,00000000), ref: 00423DF2
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                        • String ID:
                                        • API String ID: 183575631-0
                                        • Opcode ID: b1b7ab34adc4f0bdac85d35cd8319da5cc88f86eb62920a241cc02d958c0791e
                                        • Instruction ID: 7df3f4c256e16cf88ed5bb8a347b5b3a25df550de305930316ee8fcfc6e0617b
                                        • Opcode Fuzzy Hash: b1b7ab34adc4f0bdac85d35cd8319da5cc88f86eb62920a241cc02d958c0791e
                                        • Instruction Fuzzy Hash: 203164B17502106AEB10AF65DC86F6A3698D714709F60017AFA40EF2D7C6BDED40476D
                                        APIs
                                        • FreeLibrary.KERNEL32(00000000), ref: 00482DFD
                                        • FreeLibrary.KERNEL32(00000000), ref: 00482E11
                                        • SendNotifyMessageA.USER32(00020450,00000496,00002710,00000000), ref: 00482E83
                                        Strings
                                        • Not restarting Windows because Setup is being run from the debugger., xrefs: 00482E32
                                        • Deinitializing Setup., xrefs: 00482C5E
                                        • GetCustomSetupExitCode, xrefs: 00482C9D
                                        • Restarting Windows., xrefs: 00482E5E
                                        • DeinitializeSetup, xrefs: 00482CF9
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FreeLibrary$MessageNotifySend
                                        • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                        • API String ID: 3817813901-1884538726
                                        • Opcode ID: 9c2bbffa538aa2e5b055a523d915f2d38be36e5908d6c0a026212498e4b0fc52
                                        • Instruction ID: 87ca8a1097935e6c4637b022688acffdd958b69fb8a4991d3dc3ea9519d40e2c
                                        • Opcode Fuzzy Hash: 9c2bbffa538aa2e5b055a523d915f2d38be36e5908d6c0a026212498e4b0fc52
                                        • Instruction Fuzzy Hash: F851AA30600200EFD711EF6AD949B6E7BE4EB19718F51897BE800D72A1DBB89C45CB5D
                                        APIs
                                        • GetActiveWindow.USER32 ref: 0042FA2F
                                        • GetFocus.USER32 ref: 0042FA37
                                        • RegisterClassA.USER32(0049B7AC), ref: 0042FA58
                                        • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042FB2C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042FA96
                                        • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042FADC
                                        • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042FAED
                                        • SetFocus.USER32(00000000,00000000,0042FB0F,?,?,?,00000001,00000000,?,00458B4E,00000000,0049D62C), ref: 0042FAF4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                        • String ID: TWindowDisabler-Window
                                        • API String ID: 3167913817-1824977358
                                        • Opcode ID: fec87ca07d7290a4a57da710bc1ddf3081f88a8d4dfe440d170acd63eb0d43c3
                                        • Instruction ID: be32ada46e774ba6914a87ad40c025b2c9e25f6d11d521099bf08b28c91ad89a
                                        • Opcode Fuzzy Hash: fec87ca07d7290a4a57da710bc1ddf3081f88a8d4dfe440d170acd63eb0d43c3
                                        • Instruction Fuzzy Hash: E121B570B40720BAE210EB65EC03F1A76B4EB04B04FA1813BF504BB2D1D7B96C1487AD
                                        APIs
                                        • GetFileAttributesA.KERNEL32(00000000,00000000,00473A11,?,?,?,00000008,00000000,00000000,00000000,?,00473C6D,?,?,00000000,00473EF0), ref: 00473974
                                          • Part of subcall function 0042D1E4: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042D25A
                                          • Part of subcall function 004073A0: DeleteFileA.KERNEL32(00000000,0049D62C,00499FD9,00000000,0049A02E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 004073AB
                                        • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00473A11,?,?,?,00000008,00000000,00000000,00000000,?,00473C6D), ref: 004739EB
                                        • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00473A11,?,?,?,00000008,00000000,00000000,00000000), ref: 004739F1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                        • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                        • API String ID: 884541143-1710247218
                                        • Opcode ID: c5ee601f3e9953c735d8bf0a71158fe3e64be6cf92b19d5fab08f93ca351b12b
                                        • Instruction ID: bfb262a57c212aacfed1a05d1298e64af55acb3d3cb9d0523fd91374b550827c
                                        • Opcode Fuzzy Hash: c5ee601f3e9953c735d8bf0a71158fe3e64be6cf92b19d5fab08f93ca351b12b
                                        • Instruction Fuzzy Hash: 8F11D3B07006047BD701EA698C83AAE73ACDB48715F50813BB844A72C1DB3C9F02961D
                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004539F2,?,?,?,?,00000000,00000000,?,0049A4EE), ref: 00453956
                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045395C
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004539F2,?,?,?,?,00000000,00000000,?,0049A4EE), ref: 00453970
                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453976
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                        • API String ID: 1646373207-2130885113
                                        • Opcode ID: 82da2a28b5003144a588bfd6711196aeba7955ca25a5e24eec6645e80d453e72
                                        • Instruction ID: a193a4472c2853cf72940ff7690ab9972ac4b2f80f688c1a00737a0c34b4483d
                                        • Opcode Fuzzy Hash: 82da2a28b5003144a588bfd6711196aeba7955ca25a5e24eec6645e80d453e72
                                        • Instruction Fuzzy Hash: B211E3B0A00244BBDB00EF66DC03F5E7BA8D70475AF60447BF84166282D6BC9F088A2D
                                        APIs
                                        • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467EB3
                                        • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467ED9
                                          • Part of subcall function 00467D4C: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00467DE7
                                          • Part of subcall function 00467D4C: DestroyCursor.USER32(00000000), ref: 00467DFD
                                        • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 00467F30
                                        • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00467F91
                                        • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467FB7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                        • String ID: c:\directory$shell32.dll
                                        • API String ID: 3376378930-1375355148
                                        • Opcode ID: 5f39b0330533c07a7ed62396f03ad1b0497855389b17cb99d84a9eecbd47350c
                                        • Instruction ID: adf232676f9dc8545d434ff73a7213ff4163269ef5d9f53791e9b27a0c2465ea
                                        • Opcode Fuzzy Hash: 5f39b0330533c07a7ed62396f03ad1b0497855389b17cb99d84a9eecbd47350c
                                        • Instruction Fuzzy Hash: 64516D70644208AFD750EF65CC85FDEBBA8EB48308F1085A7F5089B391DA399E85CB59
                                        APIs
                                        • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430DE8
                                        • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430DF7
                                        • GetCurrentThreadId.KERNEL32 ref: 00430E11
                                        • GlobalAddAtomA.KERNEL32(00000000), ref: 00430E32
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                        • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                        • API String ID: 4130936913-2943970505
                                        • Opcode ID: 50811bd1b0b0bc88e10382fd261453b7235327efbd1eb80bce93881789032006
                                        • Instruction ID: dd09876b0f9c3184917b018614b917cdad608ae665b29eb2c15b2e3af62d5cdc
                                        • Opcode Fuzzy Hash: 50811bd1b0b0bc88e10382fd261453b7235327efbd1eb80bce93881789032006
                                        • Instruction Fuzzy Hash: 98F082B09483409ED300EF26890371A7AE0AB58708F404F3FB48CA2291D7399910CB1F
                                        APIs
                                        • GetCapture.USER32 ref: 004232F4
                                        • GetCapture.USER32 ref: 00423303
                                        • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00423309
                                        • ReleaseCapture.USER32 ref: 0042330E
                                        • GetActiveWindow.USER32 ref: 0042331D
                                        • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 0042339C
                                        • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00423400
                                        • GetActiveWindow.USER32 ref: 0042340F
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CaptureMessageSend$ActiveWindow$Release
                                        • String ID:
                                        • API String ID: 862346643-0
                                        • Opcode ID: bac6248c5c65b2a46f0a1d517af8b370a3a4e6cba25cb3140287781b4ccd40b9
                                        • Instruction ID: 3a9af59dda1f98e95100fec3f153a7acb7f05633bd4cd2eb2e4992da2b7770c9
                                        • Opcode Fuzzy Hash: bac6248c5c65b2a46f0a1d517af8b370a3a4e6cba25cb3140287781b4ccd40b9
                                        • Instruction Fuzzy Hash: 68414170B10258AFDB10EFAAD942B9DB7F1AF44704F5140BAE404AB292DB7C9F41CB18
                                        APIs
                                        • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00477EF1
                                        • SetWindowLongW.USER32(00000000,000000FC,Function_00077E4C), ref: 00477F18
                                        • GetACP.KERNEL32(00000000,00478130,?,00000000,0047815A), ref: 00477F55
                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00477F9B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ClassInfoLongMessageSendWindow
                                        • String ID: COMBOBOX$Inno Setup: Language
                                        • API String ID: 3391662889-4234151509
                                        • Opcode ID: ee73a32da0349862b0492f9267fac64247cda7a4a61a4b082aceda1c218f248c
                                        • Instruction ID: 81c94a85f2d0ae2d33cbd4ee74d6221623364a49e9b2571c8ba4411711431487
                                        • Opcode Fuzzy Hash: ee73a32da0349862b0492f9267fac64247cda7a4a61a4b082aceda1c218f248c
                                        • Instruction Fuzzy Hash: 65813C34A00205DFD710EF69C989AAAB7F0FB49304F55C1BAE848D7362DB38AD45CB59
                                        APIs
                                        • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,00455994,00455994,?,00455994,00000000), ref: 00455922
                                        • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,00455994,00455994,?,00455994), ref: 0045592F
                                          • Part of subcall function 004556E4: WaitForInputIdle.USER32(?,00000032), ref: 00455710
                                          • Part of subcall function 004556E4: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00455732
                                          • Part of subcall function 004556E4: GetExitCodeProcess.KERNEL32(?,?), ref: 00455741
                                          • Part of subcall function 004556E4: CloseHandle.KERNEL32(?,0045576E,00455767,?,?,?,00000000,?,?,00455943,?,?,?,00000044,00000000,00000000), ref: 00455761
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                        • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                        • API String ID: 854858120-615399546
                                        • Opcode ID: 3aef928493a85a336b4fdc45b2ef872796c76b537a4fe3cf952342f788ba9a48
                                        • Instruction ID: 19165e213e9236b89a5b086241af4e71530f18fc7e42ed674525c8849c01d6f6
                                        • Opcode Fuzzy Hash: 3aef928493a85a336b4fdc45b2ef872796c76b537a4fe3cf952342f788ba9a48
                                        • Instruction Fuzzy Hash: F4514A7060074DABDB11EF96C892BEEBBB9AF44315F50403BF804BB282D77C99198759
                                        APIs
                                        • LoadIconA.USER32(00400000,MAINICON), ref: 00423B6C
                                        • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00419436,00000000,?,?,?,00000001), ref: 00423B99
                                        • OemToCharA.USER32(?,?), ref: 00423BAC
                                        • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00419436,00000000,?,?,?,00000001), ref: 00423BEC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Char$FileIconLoadLowerModuleName
                                        • String ID: 2$MAINICON
                                        • API String ID: 3935243913-3181700818
                                        • Opcode ID: 5bb029359a14fe80b98f3d31a1bddee7a09f53b94ef6d4528e1ea31487fdaa44
                                        • Instruction ID: e5d3831d9b5483d4bbbd2f836839ca6b10e9aa02fde8f17f2ef2fb4492c3d901
                                        • Opcode Fuzzy Hash: 5bb029359a14fe80b98f3d31a1bddee7a09f53b94ef6d4528e1ea31487fdaa44
                                        • Instruction Fuzzy Hash: 6031A271A042549ADB10EF29C8C57C67BE8AF14308F4045BAE844DB383D7BED988CB59
                                        APIs
                                        • GetCurrentProcessId.KERNEL32(00000000), ref: 0041938D
                                        • GlobalAddAtomA.KERNEL32(00000000), ref: 004193AE
                                        • GetCurrentThreadId.KERNEL32 ref: 004193C9
                                        • GlobalAddAtomA.KERNEL32(00000000), ref: 004193EA
                                          • Part of subcall function 00423518: GetDC.USER32(00000000), ref: 0042356E
                                          • Part of subcall function 00423518: EnumFontsA.GDI32(00000000,00000000,004234B8,004108B0,00000000,?,?,00000000,?,00419423,00000000,?,?,?,00000001), ref: 00423581
                                          • Part of subcall function 00423518: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423589
                                          • Part of subcall function 00423518: ReleaseDC.USER32(00000000,00000000), ref: 00423594
                                          • Part of subcall function 00423ADC: LoadIconA.USER32(00400000,MAINICON), ref: 00423B6C
                                          • Part of subcall function 00423ADC: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00419436,00000000,?,?,?,00000001), ref: 00423B99
                                          • Part of subcall function 00423ADC: OemToCharA.USER32(?,?), ref: 00423BAC
                                          • Part of subcall function 00423ADC: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00419436,00000000,?,?,?,00000001), ref: 00423BEC
                                          • Part of subcall function 0041F568: GetVersion.KERNEL32(?,00419440,00000000,?,?,?,00000001), ref: 0041F576
                                          • Part of subcall function 0041F568: SetErrorMode.KERNEL32(00008000,?,00419440,00000000,?,?,?,00000001), ref: 0041F592
                                          • Part of subcall function 0041F568: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419440,00000000,?,?,?,00000001), ref: 0041F59E
                                          • Part of subcall function 0041F568: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419440,00000000,?,?,?,00000001), ref: 0041F5AC
                                          • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F5DC
                                          • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F605
                                          • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F61A
                                          • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F62F
                                          • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F644
                                          • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F659
                                          • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F66E
                                          • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F683
                                          • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F698
                                          • Part of subcall function 0041F568: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F6AD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$CapsDeviceEnumFileFontsIconLibraryLowerModuleNameProcessReleaseThreadVersion
                                        • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                        • API String ID: 316262546-2767913252
                                        • Opcode ID: e4565b8fba9480968b1ec32b488455297d6f31b702462cc9ec0cccc8cb2a2db4
                                        • Instruction ID: 7870b9ea93aa7f75565cd31cdf92f475c288cd9ab0443d66b722f1effdfa130a
                                        • Opcode Fuzzy Hash: e4565b8fba9480968b1ec32b488455297d6f31b702462cc9ec0cccc8cb2a2db4
                                        • Instruction Fuzzy Hash: 8D112C70A182419AC300FF36D44279A7AE09BA430CF50893FF488AB3A1DB3D9D458B5E
                                        APIs
                                        • SetWindowLongA.USER32(?,000000FC,?), ref: 00413AB4
                                        • GetWindowLongA.USER32(?,000000F0), ref: 00413ABF
                                        • GetWindowLongA.USER32(?,000000F4), ref: 00413AD1
                                        • SetWindowLongA.USER32(?,000000F4,?), ref: 00413AE4
                                        • SetPropA.USER32(?,00000000,00000000), ref: 00413AFB
                                        • SetPropA.USER32(?,00000000,00000000), ref: 00413B12
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: LongWindow$Prop
                                        • String ID:
                                        • API String ID: 3887896539-0
                                        • Opcode ID: a72ee32d6cac1f66b8d23ea34dc7313db56b2b1373a44c7e0100784739caab29
                                        • Instruction ID: a594f7604add2a8bfce9427623ad02c9736cb33a5a72341fbb506abd62de3718
                                        • Opcode Fuzzy Hash: a72ee32d6cac1f66b8d23ea34dc7313db56b2b1373a44c7e0100784739caab29
                                        • Instruction Fuzzy Hash: 0811CC75500244BFDF00DF99ED88E9A3BE8EB09364F104276B914DB2E1D739D990CB94
                                        APIs
                                        • RtlEnterCriticalSection.KERNEL32(0049D420,00000000,00401B68), ref: 00401ABD
                                        • LocalFree.KERNEL32(00000000,00000000,00401B68), ref: 00401ACF
                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,00401B68), ref: 00401AEE
                                        • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00401B68), ref: 00401B2D
                                        • RtlLeaveCriticalSection.KERNEL32(0049D420,00401B6F), ref: 00401B58
                                        • RtlDeleteCriticalSection.KERNEL32(0049D420,00401B6F), ref: 00401B62
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                        • String ID:
                                        • API String ID: 3782394904-0
                                        • Opcode ID: a09964db7d5e1398f2afb7250b5a8c8ddfedb2b5ecba3fe18733cc428a63f314
                                        • Instruction ID: 86217af8f0c65890f5da76d4fe10d609cc5e2f7049d93a5e71f2b830536aceac
                                        • Opcode Fuzzy Hash: a09964db7d5e1398f2afb7250b5a8c8ddfedb2b5ecba3fe18733cc428a63f314
                                        • Instruction Fuzzy Hash: 7A11BF70E003405AEB15AB659D82B267BE4976570CF44007BF50067AF1D77CB840C76E
                                        APIs
                                        • FindNextFileA.KERNEL32(000000FF,00000000,00000000,0047327D,I,?,?,I,00000000,0047346D,?,00000000,?,00000000,?,00473639), ref: 00473259
                                        • FindClose.KERNEL32(000000FF,00473284,0047327D,I,?,?,I,00000000,0047346D,?,00000000,?,00000000,?,00473639,?), ref: 00473277
                                        • FindNextFileA.KERNEL32(000000FF,00000000,00000000,0047339F,I,?,?,I,00000000,0047346D,?,00000000,?,00000000,?,00473639), ref: 0047337B
                                        • FindClose.KERNEL32(000000FF,004733A6,0047339F,I,?,?,I,00000000,0047346D,?,00000000,?,00000000,?,00473639,?), ref: 00473399
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileNext
                                        • String ID: I
                                        • API String ID: 2066263336-1966777607
                                        • Opcode ID: 7ae4657df78877419f84db4ef8cd88fe7811264cd645d327851c1e60eb28fa9b
                                        • Instruction ID: 1af051264105f0c3ac5173717805306f181c97d1b343904b0a5707565e1f6f82
                                        • Opcode Fuzzy Hash: 7ae4657df78877419f84db4ef8cd88fe7811264cd645d327851c1e60eb28fa9b
                                        • Instruction Fuzzy Hash: F2C13C7490425DAFCF11DFA5C881ADEBBB9FF49304F5081AAE808A3351D7399A46CF54
                                        APIs
                                          • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045600B,?,00000000,0045604B), ref: 00455F51
                                        Strings
                                        • WININIT.INI, xrefs: 00455F80
                                        • PendingFileRenameOperations, xrefs: 00455EF0
                                        • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455ED4
                                        • PendingFileRenameOperations2, xrefs: 00455F20
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseOpen
                                        • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                        • API String ID: 47109696-2199428270
                                        • Opcode ID: 8be7122c243ce20522057dc2e2531da27295be9a62d17f0d53ccadd57aa7aa50
                                        • Instruction ID: cd3286cbb97796e9ecd700c4ab963dac99c65abdd87cbf21601b40f17af9d083
                                        • Opcode Fuzzy Hash: 8be7122c243ce20522057dc2e2531da27295be9a62d17f0d53ccadd57aa7aa50
                                        • Instruction Fuzzy Hash: 1551B930E001089FDB11EF61DC51ADEB7B9EF44705F5085BBE804A72D2DB39AE45CA58
                                        APIs
                                        • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047DFF6,?,?,00000000,0049D62C,00000000,00000000,?,00499E21,00000000,00499FCA,?,00000000), ref: 0047DF33
                                        • GetLastError.KERNEL32(00000000,00000000,00000000,0047DFF6,?,?,00000000,0049D62C,00000000,00000000,?,00499E21,00000000,00499FCA,?,00000000), ref: 0047DF3C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID: Created temporary directory: $\_setup64.tmp$_isetup
                                        • API String ID: 1375471231-2952887711
                                        • Opcode ID: 11c41cff4b2e26d29b59e317b5d01f68a09a239768e9d902b03435ecaad13ccb
                                        • Instruction ID: ecaa8d991a706e785fb0a456308ec2ceb04ba6e672c042181299f5b248b5f278
                                        • Opcode Fuzzy Hash: 11c41cff4b2e26d29b59e317b5d01f68a09a239768e9d902b03435ecaad13ccb
                                        • Instruction Fuzzy Hash: A2414634A101099BCB01EF95DC81ADEB7B9EF44309F50847BE901B7392DB38AE05CB69
                                        APIs
                                        • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042E2A0
                                        • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042E43B,00000000,0042E453,?,?,?,?,00000006,?,00000000,00499145), ref: 0042E2BB
                                        • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E2C1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressDeleteHandleModuleProc
                                        • String ID: RegDeleteKeyExA$advapi32.dll
                                        • API String ID: 588496660-1846899949
                                        • Opcode ID: ec6d5e68239a8fd64e2f61c23397c604527ea817bc29ae7d62183104243c5598
                                        • Instruction ID: a3ecee3a08e4bdafa542c89306e26d0a5ab5c090d3d5ae483566a3001d088d92
                                        • Opcode Fuzzy Hash: ec6d5e68239a8fd64e2f61c23397c604527ea817bc29ae7d62183104243c5598
                                        • Instruction Fuzzy Hash: B8E065B0740234EAD7142A66BC4AFA7260CEB54726F940877F10A661D187BC1C40D66C
                                        Strings
                                        • NextButtonClick, xrefs: 0046C90C
                                        • Need to restart Windows? %s, xrefs: 0046CB55
                                        • PrepareToInstall failed: %s, xrefs: 0046CB2E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                        • API String ID: 0-2329492092
                                        • Opcode ID: 48a18cf3e4ece820da987a55bd90d53010171917ae2cdbfb89dc97ba6e259d38
                                        • Instruction ID: 93777efb9077a0228fe374709ad1741880755db4a3f7640889f56f3bdeecc4c5
                                        • Opcode Fuzzy Hash: 48a18cf3e4ece820da987a55bd90d53010171917ae2cdbfb89dc97ba6e259d38
                                        • Instruction Fuzzy Hash: 9CD17F34A00108DFCB10EFA9C585AED7BF5EF49304F6444BAE444AB352E738AE45DB5A
                                        APIs
                                        • SetActiveWindow.USER32(?,?,00000000,004847C1), ref: 00484594
                                        • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00484632
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ActiveChangeNotifyWindow
                                        • String ID: $Need to restart Windows? %s
                                        • API String ID: 1160245247-4200181552
                                        • Opcode ID: a36d4d2325aca11e50613c3baf634984259e2acab097e48e72a037015c38f916
                                        • Instruction ID: cbf7044c9224e5df34f4324165486d78489046a6efa1a602e4c0c9b5677eb74d
                                        • Opcode Fuzzy Hash: a36d4d2325aca11e50613c3baf634984259e2acab097e48e72a037015c38f916
                                        • Instruction Fuzzy Hash: C591A334A042459FDB10FB66D885B9D77E0AF5A308F1444BBE800973A2D77CAD45CB5E
                                        APIs
                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00454AAE,?,00000000,00454B22,?,?,-00000001,00000000,?,0047E107,00000000,0047E054,00000000), ref: 00454A8A
                                        • FindClose.KERNEL32(000000FF,00454AB5,00454AAE,?,00000000,00454B22,?,?,-00000001,00000000,?,0047E107,00000000,0047E054,00000000,00000000), ref: 00454AA8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileNext
                                        • String ID: .H$ .H
                                        • API String ID: 2066263336-1676226347
                                        • Opcode ID: b812543ddd1e95e384549bb7c1e7a692720bc7ce5864c938cf5b8a0bd1faa7d1
                                        • Instruction ID: 86a97b531f1ad2b4b7463d4220b8e0547854eedc1a857b6a9afda59406c2b972
                                        • Opcode Fuzzy Hash: b812543ddd1e95e384549bb7c1e7a692720bc7ce5864c938cf5b8a0bd1faa7d1
                                        • Instruction Fuzzy Hash: CF81A43490428DAFCF11DF65C8417EFBBB4AF89309F1440A6D8546B392C3399E8ACB58
                                        APIs
                                          • Part of subcall function 0042CC54: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042CC78
                                        • GetLastError.KERNEL32(00000000,00470B35,?,?,0049E1E4,00000000), ref: 00470A12
                                        • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00470A8C
                                        • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00470AB1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ChangeNotify$ErrorFullLastNamePath
                                        • String ID: Creating directory: %s
                                        • API String ID: 2451617938-483064649
                                        • Opcode ID: 31f421efa52e9648699e9d56291a46ed9d117f369a17eb341c08600e821ce678
                                        • Instruction ID: 27f0dcb835b35bf1686b0556d16ec1317b7bae4cbab61287d01ee882f408922b
                                        • Opcode Fuzzy Hash: 31f421efa52e9648699e9d56291a46ed9d117f369a17eb341c08600e821ce678
                                        • Instruction Fuzzy Hash: 0251FE74E01248ABDB01DFA5C982BDEB7F5AF48308F50856AE844B7382D7785F04CB59
                                        APIs
                                        • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 004555EA
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,004556B0), ref: 00455654
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressByteCharMultiProcWide
                                        • String ID: SfcIsFileProtected$sfc.dll
                                        • API String ID: 2508298434-591603554
                                        • Opcode ID: f7e58a0fd106200e4f3bc04200b2cacc58717943215cb6059fe45d01fbc32bb5
                                        • Instruction ID: f46810b5b314b431af4f43299c3fabe32507941823b9175d405aae5aeba4d308
                                        • Opcode Fuzzy Hash: f7e58a0fd106200e4f3bc04200b2cacc58717943215cb6059fe45d01fbc32bb5
                                        • Instruction Fuzzy Hash: 9141A470A00618AFEB20DF55DC95BAD77B8AB04319F5080B7E90CA7292D7789F48CE1D
                                        APIs
                                        • 74D41520.VERSION(00000000,?,?,?,?), ref: 00452C74
                                        • 74D41500.VERSION(00000000,?,00000000,?,00000000,00452CEF,?,00000000,?,?,?,?), ref: 00452CA1
                                        • 74D41540.VERSION(?,00452D18,?,?,00000000,?,00000000,?,00000000,00452CEF,?,00000000,?,?,?,?), ref: 00452CBB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: D41500D41520D41540
                                        • String ID: )-E
                                        • API String ID: 2153611984-3997256589
                                        • Opcode ID: 1e3fa64680b4daa2d15fd70f35a4d6916cc241641b57064dc1621c371eabb0d9
                                        • Instruction ID: 50707f88950aac898d8c4389756beb7c92bb5193b179b1fc1fca76f0aa7be7f8
                                        • Opcode Fuzzy Hash: 1e3fa64680b4daa2d15fd70f35a4d6916cc241641b57064dc1621c371eabb0d9
                                        • Instruction Fuzzy Hash: 2B219275A00648AFDB01DAA99D419AFB7FCEB4A301F554077FC00E3282D6B99E088769
                                        APIs
                                        • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                        • ExitProcess.KERNEL32 ref: 00404E0D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ExitMessageProcess
                                        • String ID: Error$Runtime error at 00000000
                                        • API String ID: 1220098344-2970929446
                                        • Opcode ID: 6146da9580bef9965da9cda28fdf8b1f09917d9546c5f1af2fde060953d626be
                                        • Instruction ID: c00c8b1b907268fe45c84c5108a6570d36dd98a08fca56cdb76ff5d345661702
                                        • Opcode Fuzzy Hash: 6146da9580bef9965da9cda28fdf8b1f09917d9546c5f1af2fde060953d626be
                                        • Instruction Fuzzy Hash: 8F21D360E452418ADB10AB75ED8171A3B8097F930CF04817BE700B73E2C67CD84687AE
                                        APIs
                                        • LoadLibraryA.KERNEL32(00000000,00000000,00450469,?,?,?,?,00000000,00000000), ref: 004503F8
                                        • LoadLibraryA.KERNEL32(00000000,00000000,00450469,?,?,?,?,00000000,00000000), ref: 0045043E
                                          • Part of subcall function 00450360: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00450378
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: LibraryLoad$DirectorySystem
                                        • String ID: RICHED20.DLL$RICHED32.DLL
                                        • API String ID: 2630572097-740611112
                                        • Opcode ID: 9fcc27b6184eb67fa55648afaa4eab07c2ec715cb05f6099bae96d6f0231ec87
                                        • Instruction ID: 45d93e0d121fe09c7a50066aca23a685df4873c559958f5edeb39e7b45036801
                                        • Opcode Fuzzy Hash: 9fcc27b6184eb67fa55648afaa4eab07c2ec715cb05f6099bae96d6f0231ec87
                                        • Instruction Fuzzy Hash: EB216374900108EFDB10FF61E846B5D77F8EB55319F50447BE500A6162D7785A49CF5C
                                        APIs
                                        • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042F201
                                          • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                          • Part of subcall function 0042E7E4: SetErrorMode.KERNEL32(00008000), ref: 0042E7EE
                                          • Part of subcall function 0042E7E4: LoadLibraryA.KERNEL32(00000000,00000000,0042E838,?,00000000,0042E856,?,00008000), ref: 0042E81D
                                        • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042F1E4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                        • String ID: SHAutoComplete$shlwapi.dll
                                        • API String ID: 395431579-1506664499
                                        • Opcode ID: ef2fe5795da2c79bebcfc8bc045bc88b8cffcc678c25b10b165038ef52182f9f
                                        • Instruction ID: f8fd25663858203a515409cfb2833324ac242db414aae85ffba9c986139a78a3
                                        • Opcode Fuzzy Hash: ef2fe5795da2c79bebcfc8bc045bc88b8cffcc678c25b10b165038ef52182f9f
                                        • Instruction Fuzzy Hash: 9701D274B00718EBE711DB65EC42B5E7BFCDB99704FE000B7B404A2291DAB99E48C62C
                                        APIs
                                          • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                                        • RegCloseKey.ADVAPI32(?,00456217,?,00000001,00000000), ref: 0045620A
                                        Strings
                                        • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 004561B8
                                        • PendingFileRenameOperations2, xrefs: 004561EB
                                        • PendingFileRenameOperations, xrefs: 004561DC
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseOpen
                                        • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                        • API String ID: 47109696-2115312317
                                        • Opcode ID: 26aed6e5fe3ea03506abb76c46215ae559a4fd81786fee60218c8c29e953e84b
                                        • Instruction ID: 13f9a8dc2762523c9d5034016e8e0e4cf56d15ba7b570f5b98feacd54ef34b89
                                        • Opcode Fuzzy Hash: 26aed6e5fe3ea03506abb76c46215ae559a4fd81786fee60218c8c29e953e84b
                                        • Instruction Fuzzy Hash: F2F06271348204ABD714E6E69C13B5B739CD784B15FE284A6F80487982EA79AD14962C
                                        APIs
                                        • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,VtG,?,0049E1E4,?,0046FF73,?,00000000,00470532,?,_is1), ref: 0046FC7F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Value
                                        • String ID: Inno Setup: Setup Version$VtG$I
                                        • API String ID: 3702945584-29442299
                                        • Opcode ID: 01fe2595a91c979785a9f0a3cbfdcbab837408d87d7a81537bd7bc401ac7c2bc
                                        • Instruction ID: 298cf4f1533d54ab550fd3d15e19e6a926ba71f9f01c0afe6301adb1283b93e4
                                        • Opcode Fuzzy Hash: 01fe2595a91c979785a9f0a3cbfdcbab837408d87d7a81537bd7bc401ac7c2bc
                                        • Instruction Fuzzy Hash: E7E06D713013043BD710AA2BAC85F5BAADCDF987A5F00403AB948DB392D578ED0542A8
                                        APIs
                                        • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,00481201), ref: 004810AE
                                        • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,00481201), ref: 004810BB
                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,004811D4,?,?,?,?,00000000,00481201), ref: 004811B0
                                        • FindClose.KERNEL32(000000FF,004811DB,004811D4,?,?,?,?,00000000,00481201), ref: 004811CE
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileNext
                                        • String ID:
                                        • API String ID: 2066263336-0
                                        • Opcode ID: 56954df4aa532027655ea9e87aeadb7b453aeb4eaad063717caa07a8ffbd252c
                                        • Instruction ID: 32ce0b593b226a8a495a7b16ec3f8c392e3281c2b0d16565a73bd1b48714ff7d
                                        • Opcode Fuzzy Hash: 56954df4aa532027655ea9e87aeadb7b453aeb4eaad063717caa07a8ffbd252c
                                        • Instruction Fuzzy Hash: 95515E75A006489FCB10EF65CC45ADEB7BCEB89315F1045ABA808E7351D6389F86CF58
                                        APIs
                                        • GetMenu.USER32(00000000), ref: 004217B1
                                        • SetMenu.USER32(00000000,00000000), ref: 004217CE
                                        • SetMenu.USER32(00000000,00000000), ref: 00421803
                                        • SetMenu.USER32(00000000,00000000), ref: 0042181F
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Menu
                                        • String ID:
                                        • API String ID: 3711407533-0
                                        • Opcode ID: a1d2f4484655de1d3fd0847b2328f430e3f40ab88dcc203f2c43afec94015a70
                                        • Instruction ID: 73b485f7b17ee0b128820b03b0310e3fef403fa1ec291b42cca88d6787b8c394
                                        • Opcode Fuzzy Hash: a1d2f4484655de1d3fd0847b2328f430e3f40ab88dcc203f2c43afec94015a70
                                        • Instruction Fuzzy Hash: 44419E3070426407DB21BF3AA98579B66D55FA0308F4811BFE8458F3A3CA7CCC4A82AD
                                        APIs
                                        • SendMessageA.USER32(?,?,?,?), ref: 00416FD4
                                        • SetTextColor.GDI32(?,00000000), ref: 00416FEE
                                        • SetBkColor.GDI32(?,00000000), ref: 00417008
                                        • CallWindowProcA.USER32(?,?,?,?,?), ref: 00417030
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Color$CallMessageProcSendTextWindow
                                        • String ID:
                                        • API String ID: 601730667-0
                                        • Opcode ID: 2663e636a10a516644b319dd38bd24ec26a11bbb7cdbebd148a82c02926d9cca
                                        • Instruction ID: 97657bf4431c68cea31458eff6611b8cbcc4ca9acdd3171e17da9912607f4e93
                                        • Opcode Fuzzy Hash: 2663e636a10a516644b319dd38bd24ec26a11bbb7cdbebd148a82c02926d9cca
                                        • Instruction Fuzzy Hash: CE114CB1604600AFD710EE6ECD84E87B7ECDF48310B14882AB55ADB612C62CE8818B69
                                        APIs
                                        • EnumWindows.USER32(00423E6C), ref: 00423EF8
                                        • GetWindow.USER32(?,00000003), ref: 00423F0D
                                        • GetWindowLongA.USER32(?,000000EC), ref: 00423F1C
                                        • SetWindowPos.USER32(00000000,004245AC,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004245FB,?,?,004241C3), ref: 00423F52
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$EnumLongWindows
                                        • String ID:
                                        • API String ID: 4191631535-0
                                        • Opcode ID: da7c6a1f1adb1243b5fa3636d4e877867cfe7b0e5d1887425f7f41af5dac74a2
                                        • Instruction ID: 800f3c7d6b650a9444741cf3b456662361ea129bec99247a5177c247b1bc03b7
                                        • Opcode Fuzzy Hash: da7c6a1f1adb1243b5fa3636d4e877867cfe7b0e5d1887425f7f41af5dac74a2
                                        • Instruction Fuzzy Hash: 5B117071B04610ABDB109F28ED85F5673F4EB08715F12026AF9649B2E2C37CDD40CB58
                                        APIs
                                        • GetDC.USER32(00000000), ref: 0042356E
                                        • EnumFontsA.GDI32(00000000,00000000,004234B8,004108B0,00000000,?,?,00000000,?,00419423,00000000,?,?,?,00000001), ref: 00423581
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423589
                                        • ReleaseDC.USER32(00000000,00000000), ref: 00423594
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CapsDeviceEnumFontsRelease
                                        • String ID:
                                        • API String ID: 2698912916-0
                                        • Opcode ID: bb643e78eddffdc26f40f16d9b8672dcc85dc1c54bcbb46a45d6df83db9bb269
                                        • Instruction ID: 3e91f746c00fb2f600ae5fc17e333cd129bb14a9c5a67b8d5949c9a763c02f3d
                                        • Opcode Fuzzy Hash: bb643e78eddffdc26f40f16d9b8672dcc85dc1c54bcbb46a45d6df83db9bb269
                                        • Instruction Fuzzy Hash: 5C019EB17457102AE710BF6A5C82B9B37A49F0531DF40427FF908AB3C2DA7E990547AE
                                        APIs
                                        • WaitForInputIdle.USER32(?,00000032), ref: 00455710
                                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00455732
                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00455741
                                        • CloseHandle.KERNEL32(?,0045576E,00455767,?,?,?,00000000,?,?,00455943,?,?,?,00000044,00000000,00000000), ref: 00455761
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                        • String ID:
                                        • API String ID: 4071923889-0
                                        • Opcode ID: 0e2e22314dae304e5bf22728ddaa36dde328adca970e968fdbe7b68800f3fe31
                                        • Instruction ID: d914ecb4f604d225e93de076450c6742835d04a0b91abb11bcb899d5d614385b
                                        • Opcode Fuzzy Hash: 0e2e22314dae304e5bf22728ddaa36dde328adca970e968fdbe7b68800f3fe31
                                        • Instruction Fuzzy Hash: 6101B570A40A09FEEB20A7A58D16F7F7BADDB49760F610167F904D32C2C6789D00CA68
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLast$CountSleepTick
                                        • String ID:
                                        • API String ID: 2227064392-0
                                        • Opcode ID: 22ddb9d6ab121fa8b7aad317e9abd2d9173961abc661a66fb327fe759d7b9ec5
                                        • Instruction ID: 9be5390d37519caeffefa09d8943b7800c28e667e42796fceef54f4227176e6c
                                        • Opcode Fuzzy Hash: 22ddb9d6ab121fa8b7aad317e9abd2d9173961abc661a66fb327fe759d7b9ec5
                                        • Instruction Fuzzy Hash: 28E0E5213092A855C63035BB58C26AF45C9DA89768B244ABFE088D6283C89C4C05652E
                                        APIs
                                        • GlobalHandle.KERNEL32 ref: 0040627F
                                        • GlobalUnlock.KERNEL32(00000000), ref: 00406286
                                        • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 0040628B
                                        • GlobalLock.KERNEL32(00000000), ref: 00406291
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Global$AllocHandleLockUnlock
                                        • String ID:
                                        • API String ID: 2167344118-0
                                        • Opcode ID: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                        • Instruction ID: 024a49765fc045a09389489d8ed5919b86daafa6bea6a005e9f609907830066e
                                        • Opcode Fuzzy Hash: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                        • Instruction Fuzzy Hash: 64B009C6925A46B8EC0473B24C4BD3F041CE88472C3809A6E7554BA0839C7C9C002E3A
                                        APIs
                                          • Part of subcall function 00451070: SetEndOfFile.KERNEL32(?,?,0045CB3E,00000000,0045CCC9,?,00000000,00000002,00000002), ref: 00451077
                                        • FlushFileBuffers.KERNEL32(?), ref: 0045CC95
                                        Strings
                                        • EndOffset range exceeded, xrefs: 0045CBC9
                                        • NumRecs range exceeded, xrefs: 0045CB92
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: File$BuffersFlush
                                        • String ID: EndOffset range exceeded$NumRecs range exceeded
                                        • API String ID: 3593489403-659731555
                                        • Opcode ID: 2260f6877304dea45ba359fb37d430195bc0a3511ff8112a2360352fa9564334
                                        • Instruction ID: 609741d3f79eabe780872f94ce4b5bf90fe53003262008b9b2f446b63576a9fa
                                        • Opcode Fuzzy Hash: 2260f6877304dea45ba359fb37d430195bc0a3511ff8112a2360352fa9564334
                                        • Instruction Fuzzy Hash: 6E615234A002588FDB25DF25D881BDAB7B5EF49305F0084DAED899B352D6B4AEC8CF54
                                        APIs
                                        • GetForegroundWindow.USER32(00000000,00484B02,?,00000000,00484B43,?,?,?,?,00000000,00000000,00000000,?,0046CA59), ref: 004849B1
                                        • SetActiveWindow.USER32(?,00000000,00484B02,?,00000000,00484B43,?,?,?,?,00000000,00000000,00000000,?,0046CA59), ref: 004849C3
                                        Strings
                                        • Will not restart Windows automatically., xrefs: 00484AE2
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$ActiveForeground
                                        • String ID: Will not restart Windows automatically.
                                        • API String ID: 307657957-4169339592
                                        • Opcode ID: e9fd9b813b1150c3656dd19ef81cb097417f0f4d1130d5c98022cf40aa9a9c5d
                                        • Instruction ID: e3ffbfa0a86cb08642d5b37a1a1eca219a4b332c0ee086946791bcc458de558f
                                        • Opcode Fuzzy Hash: e9fd9b813b1150c3656dd19ef81cb097417f0f4d1130d5c98022cf40aa9a9c5d
                                        • Instruction Fuzzy Hash: 64415930644245EFD714FFA6EC05B6E7BE4D795308F1948B7E8405B392E2BC9800971E
                                        APIs
                                          • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,0049A49E), ref: 0040334B
                                          • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,0049A49E), ref: 00403356
                                          • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(kernel32.dll,00000000,0040668E,?,?,?,?,00000000,?,0049A4A8), ref: 0040640F
                                          • Part of subcall function 004063F4: GetVersion.KERNEL32(kernel32.dll,00000000,0040668E,?,?,?,?,00000000,?,0049A4A8), ref: 00406416
                                          • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0040642B
                                          • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406453
                                          • Part of subcall function 00406814: 6F551CD0.COMCTL32(0049A4AD), ref: 00406814
                                          • Part of subcall function 00410BB4: GetCurrentThreadId.KERNEL32 ref: 00410C02
                                          • Part of subcall function 00419490: GetVersion.KERNEL32(0049A4C6), ref: 00419490
                                          • Part of subcall function 0044FD1C: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,0049A4DA), ref: 0044FD57
                                          • Part of subcall function 0044FD1C: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044FD5D
                                          • Part of subcall function 004501E8: GetVersionExA.KERNEL32(0049D794,0049A4DF), ref: 004501F7
                                          • Part of subcall function 00453934: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004539F2,?,?,?,?,00000000,00000000,?,0049A4EE), ref: 00453956
                                          • Part of subcall function 00453934: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045395C
                                          • Part of subcall function 00453934: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004539F2,?,?,?,?,00000000,00000000,?,0049A4EE), ref: 00453970
                                          • Part of subcall function 00453934: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453976
                                          • Part of subcall function 00457850: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004578AA
                                          • Part of subcall function 00465214: LoadLibraryA.KERNEL32(00000000,SHPathPrepareForWriteA,00000000,0046528A,?,?,?,?,00000000,00000000,?,0049A502), ref: 0046525F
                                          • Part of subcall function 00465214: GetProcAddress.KERNEL32(00000000,00000000), ref: 00465265
                                          • Part of subcall function 0046DAB0: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046DAFB
                                          • Part of subcall function 00479E68: GetModuleHandleA.KERNEL32(kernel32.dll,?,0049A50C), ref: 00479E6E
                                          • Part of subcall function 00479E68: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00479E7B
                                          • Part of subcall function 00479E68: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00479E8B
                                          • Part of subcall function 00485374: GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00485485
                                          • Part of subcall function 0049749C: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 004974B5
                                        • SetErrorMode.KERNEL32(00000001,00000000,0049A554), ref: 0049A526
                                          • Part of subcall function 0049A250: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,0049A530,00000001,00000000,0049A554), ref: 0049A25A
                                          • Part of subcall function 0049A250: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0049A260
                                          • Part of subcall function 00424924: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424943
                                          • Part of subcall function 00424714: SetWindowTextA.USER32(?,00000000), ref: 0042472C
                                        • ShowWindow.USER32(?,00000005,00000000,0049A554), ref: 0049A587
                                          • Part of subcall function 004839B4: SetActiveWindow.USER32(?), ref: 00483A62
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModule$VersionWindow$ActiveClipboardCommandCurrentErrorF551FormatLibraryLineLoadMessageModeRegisterSendShowTextThread
                                        • String ID: Setup
                                        • API String ID: 2300352135-3839654196
                                        • Opcode ID: cdfde2e51fe0698aa6b85e30c0a1c237bbea7d7fd99d79f8e074734ecee56c62
                                        • Instruction ID: 2627a5300f3eb19f067de96b875d46ae0be93d5911e26a22e66c9acfb87dca20
                                        • Opcode Fuzzy Hash: cdfde2e51fe0698aa6b85e30c0a1c237bbea7d7fd99d79f8e074734ecee56c62
                                        • Instruction Fuzzy Hash: AA31B3712046409EDB01BBB7AC1391D3BA8EB8971CB62487FF90486563DE3D5C24867F
                                        APIs
                                        • LocalFileTimeToFileTime.KERNEL32(?,?,?,00000000,00000000,00477727,?,00000000,00477738,?,00000000,00477781), ref: 004776F8
                                        • SetFileTime.KERNEL32(?,00000000,00000000,?,?,?,?,00000000,00000000,00477727,?,00000000,00477738,?,00000000,00477781), ref: 0047770C
                                        Strings
                                        • Extracting temporary file: , xrefs: 00477634
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FileTime$Local
                                        • String ID: Extracting temporary file:
                                        • API String ID: 791338737-4171118009
                                        • Opcode ID: 8d8d29b45fb9742880719863d89589a4356bfd1e7f13b2e05d84abbcd72ab195
                                        • Instruction ID: 13e9f88ccb8282ea38195536ff5c63a907cbb836f3d7a61bc1ee4cb3f854d839
                                        • Opcode Fuzzy Hash: 8d8d29b45fb9742880719863d89589a4356bfd1e7f13b2e05d84abbcd72ab195
                                        • Instruction Fuzzy Hash: 4041B774A04649AFCB01DF65CC91AEFBBB8EB09304F51847AF910A7391D678A901CB98
                                        APIs
                                          • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                                        • RegCloseKey.ADVAPI32(?,0047A1C6,?,?,00000001,00000000,00000000,0047A1E1), ref: 0047A1AF
                                        Strings
                                        • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0047A13A
                                        • %s\%s_is1, xrefs: 0047A158
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseOpen
                                        • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                        • API String ID: 47109696-1598650737
                                        • Opcode ID: ed3c9ed544e9992b8fac624f4914d5ae006c7f9a390fec7504e0c8a2c970f41f
                                        • Instruction ID: 0d63d1a050f55a8da938840af3d9f6bfa62d29ba12cdbe4796c61ae60ad15f2e
                                        • Opcode Fuzzy Hash: ed3c9ed544e9992b8fac624f4914d5ae006c7f9a390fec7504e0c8a2c970f41f
                                        • Instruction Fuzzy Hash: 8E216474B042449FEB01DFA9CC516EEBBF8EB89704F90847AE404E7381D7789E158B59
                                        APIs
                                        • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0045427B,?,?,00000000,0049D62C,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004541D2
                                        • GetLastError.KERNEL32(00000000,00000000,?,00000000,0045427B,?,?,00000000,0049D62C,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004541DB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID: .tmp
                                        • API String ID: 1375471231-2986845003
                                        • Opcode ID: 6f4460bb771477b2532cc418dcf8c2749320d1c4241bb26b34006b525e4e1938
                                        • Instruction ID: f8da180511d522ff1cc3db6e91f047bd7ddaecfb92c8c1642a91e8309ff3a61b
                                        • Opcode Fuzzy Hash: 6f4460bb771477b2532cc418dcf8c2749320d1c4241bb26b34006b525e4e1938
                                        • Instruction Fuzzy Hash: 19214E75A002189BDB01EFA1C8465DEB7BDEF44305F50457BF801B7382D67C5E458BA9
                                        APIs
                                          • Part of subcall function 00484E68: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00484E79
                                          • Part of subcall function 00484E68: GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00484E86
                                          • Part of subcall function 00484E68: GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00484E94
                                          • Part of subcall function 00484E68: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00484E9C
                                          • Part of subcall function 00484E68: GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00484EA8
                                          • Part of subcall function 00484E68: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00484EC9
                                          • Part of subcall function 00484E68: GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00484EDC
                                          • Part of subcall function 00484E68: GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00484EE2
                                          • Part of subcall function 00485194: GetVersionExA.KERNEL32(?,004853AA,00000000,004854AA,?,?,?,?,00000000,00000000,?,0049A511), ref: 004851A2
                                          • Part of subcall function 00485194: GetVersionExA.KERNEL32(0000009C,?,004853AA,00000000,004854AA,?,?,?,?,00000000,00000000,?,0049A511), ref: 004851F4
                                          • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                          • Part of subcall function 0042E7E4: SetErrorMode.KERNEL32(00008000), ref: 0042E7EE
                                          • Part of subcall function 0042E7E4: LoadLibraryA.KERNEL32(00000000,00000000,0042E838,?,00000000,0042E856,?,00008000), ref: 0042E81D
                                        • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00485485
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModuleSystemVersion$CurrentDirectoryErrorInfoLibraryLoadModeNativeProcess
                                        • String ID: SHGetKnownFolderPath$shell32.dll
                                        • API String ID: 1303913335-2936008475
                                        • Opcode ID: 8d9af6f5cb47815f3ef02b670df531d4aca205f4dd503ff5ab0741a2b0aad5e0
                                        • Instruction ID: 7070cd684f6103364e9f8a31a7d8965128adaac247882cc77746aeeddc076857
                                        • Opcode Fuzzy Hash: 8d9af6f5cb47815f3ef02b670df531d4aca205f4dd503ff5ab0741a2b0aad5e0
                                        • Instruction Fuzzy Hash: F9215E70600200ABC711FFAF995674E37A4EB9570CB51993FF400AB2D1D77DA8059B6E
                                        APIs
                                        • DeleteFileA.KERNEL32(00000000,00000000,004530A9,?,-00000001,?), ref: 00453083
                                        • GetLastError.KERNEL32(00000000,00000000,004530A9,?,-00000001,?), ref: 0045308B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: DeleteErrorFileLast
                                        • String ID: @8H
                                        • API String ID: 2018770650-3762495883
                                        • Opcode ID: a1fb3666b45fe32249cf4b68f1752c0b17d8b18f48336da527a90bea16c05efb
                                        • Instruction ID: 483a50349848f844724b37c9089874c2f5155cc8dca7ffd3c90c1c5b4081c312
                                        • Opcode Fuzzy Hash: a1fb3666b45fe32249cf4b68f1752c0b17d8b18f48336da527a90bea16c05efb
                                        • Instruction Fuzzy Hash: 74F0C871A04708AFCB01DFB9AC4249EB7ECDB0975675045B7FC04E3282EB785F188599
                                        APIs
                                        • RemoveDirectoryA.KERNEL32(00000000,00000000,004535B1,?,-00000001,00000000), ref: 0045358B
                                        • GetLastError.KERNEL32(00000000,00000000,004535B1,?,-00000001,00000000), ref: 00453593
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: DirectoryErrorLastRemove
                                        • String ID: @8H
                                        • API String ID: 377330604-3762495883
                                        • Opcode ID: ed9ee3e2dc24464d0c236720d007919d28e5762e289691b171a35ab4808c6178
                                        • Instruction ID: 7fd71ab76445d730fbf8dcc8275d2678ef65a3f2b88ec35f2c7a4b5c8e56db9b
                                        • Opcode Fuzzy Hash: ed9ee3e2dc24464d0c236720d007919d28e5762e289691b171a35ab4808c6178
                                        • Instruction Fuzzy Hash: B2F0C271A04608BBCB01EFB9AC4249EB7E8EB0975675049BBFC04E3242F7785F088598
                                        APIs
                                          • Part of subcall function 004577E0: CoInitialize.OLE32(00000000), ref: 004577E6
                                          • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                          • Part of subcall function 0042E7E4: SetErrorMode.KERNEL32(00008000), ref: 0042E7EE
                                          • Part of subcall function 0042E7E4: LoadLibraryA.KERNEL32(00000000,00000000,0042E838,?,00000000,0042E856,?,00008000), ref: 0042E81D
                                        • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004578AA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressDirectoryErrorInitializeLibraryLoadModeProcSystem
                                        • String ID: SHCreateItemFromParsingName$shell32.dll
                                        • API String ID: 1013667774-2320870614
                                        • Opcode ID: f768b6972bd4a9b7486ce10d9acfcd5e81d127b13faf4c2cc7ed9affc27adf63
                                        • Instruction ID: 9566a5db5de29e1f96e1247fa15de811f0c6c8f84fbefe9709ba2c3b4718617c
                                        • Opcode Fuzzy Hash: f768b6972bd4a9b7486ce10d9acfcd5e81d127b13faf4c2cc7ed9affc27adf63
                                        • Instruction Fuzzy Hash: 4DF03670604608BBE701FBA6E842F5D7BACDB45759F604477B800A6592D67CAE04C92D
                                        APIs
                                          • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                          • Part of subcall function 0042E7E4: SetErrorMode.KERNEL32(00008000), ref: 0042E7EE
                                          • Part of subcall function 0042E7E4: LoadLibraryA.KERNEL32(00000000,00000000,0042E838,?,00000000,0042E856,?,00008000), ref: 0042E81D
                                        • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046DAFB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressDirectoryErrorLibraryLoadModeProcSystem
                                        • String ID: SHPathPrepareForWriteA$shell32.dll
                                        • API String ID: 2552568031-2683653824
                                        • Opcode ID: d5f4c7af768d16b3b5c6a86f87ef45a876fa3cc5c322967070caf22bd86c78e1
                                        • Instruction ID: 91b75a77547c13e1772f921c750cf7bd45708da1ec0dc58a0f4cb33c0377533c
                                        • Opcode Fuzzy Hash: d5f4c7af768d16b3b5c6a86f87ef45a876fa3cc5c322967070caf22bd86c78e1
                                        • Instruction Fuzzy Hash: B5F04430B04608BBD700EF52DC52F5DBBACEB45B14FA14076B40067595E678AE048A2D
                                        APIs
                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047DC36,00000000,0047DC4C), ref: 0047D946
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Close
                                        • String ID: RegisteredOrganization$RegisteredOwner
                                        • API String ID: 3535843008-1113070880
                                        • Opcode ID: d4927c1d3794e351f7864a9843da2db15e63a7a3432c113007369929f19e5816
                                        • Instruction ID: 03cfcff152a519ea80d4f5543ba1c5a79f91faf414c5488bd5ec988fdc31f9f9
                                        • Opcode Fuzzy Hash: d4927c1d3794e351f7864a9843da2db15e63a7a3432c113007369929f19e5816
                                        • Instruction Fuzzy Hash: B6F0BBB0B042449BDB04D667AC93BDB37B9CB41308F24847BA2459B392D67C9D00D75D
                                        APIs
                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0047661B), ref: 00476409
                                        • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0047661B), ref: 00476420
                                          • Part of subcall function 00453C04: GetLastError.KERNEL32(00000000,00454799,00000005,00000000,004547CE,?,?,00000000,0049D62C,00000004,00000000,00000000,00000000,?,00499C8D,00000000), ref: 00453C07
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseCreateErrorFileHandleLast
                                        • String ID: CreateFile
                                        • API String ID: 2528220319-823142352
                                        • Opcode ID: dfe37b7c2a5045629fd8e0b2a77d405f8cad1a2ae405d18a87ba2f0597c9e29b
                                        • Instruction ID: 7bcc5fcb2fff494360280e2963ad1350d0a4ff74aab44489db68ce07f01780cc
                                        • Opcode Fuzzy Hash: dfe37b7c2a5045629fd8e0b2a77d405f8cad1a2ae405d18a87ba2f0597c9e29b
                                        • Instruction Fuzzy Hash: CDE06D302403447BEA20EB69DCC6F4A77D89B04738F108161FA48AF3E2C6B9EC408A5C
                                        APIs
                                        • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0047034A,?,?,00000000,00470532,?,_is1,?), ref: 0046FCDF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Value
                                        • String ID: NoModify$I
                                        • API String ID: 3702945584-1047506205
                                        • Opcode ID: 3b8341a2778ff8ba3f6fd97ccb953c8a619a9620ee14e4a078d82245842b3605
                                        • Instruction ID: 74656710be1799963dacf24c43606be2f52e229709c8467fcc2139d849b5a3c3
                                        • Opcode Fuzzy Hash: 3b8341a2778ff8ba3f6fd97ccb953c8a619a9620ee14e4a078d82245842b3605
                                        • Instruction Fuzzy Hash: 1AE04FB0640308BFEB04DB55DD4AF6BB7ACDB48750F104059BA44DB381EA74FE008658
                                        APIs
                                        • GetSystemMenu.USER32(00000000,00000000,00000000,004831A0), ref: 00483138
                                        • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00483149
                                        • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00483161
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Menu$Append$System
                                        • String ID:
                                        • API String ID: 1489644407-0
                                        • Opcode ID: b1581a0f06f3993262020228058a878573e1761b052ad4db3e08fed4fbd829c7
                                        • Instruction ID: 62bbcf7b8eda1c1d1fe504de26200215c04982407344b62899e0b3f82f18d8db
                                        • Opcode Fuzzy Hash: b1581a0f06f3993262020228058a878573e1761b052ad4db3e08fed4fbd829c7
                                        • Instruction Fuzzy Hash: 6431B0707083445AD710FF368C86B9E7A945B55B08F44593FB9009B3E3CA7D9E09876D
                                        APIs
                                        • GetDC.USER32(00000000), ref: 0044B8A1
                                        • SelectObject.GDI32(?,00000000), ref: 0044B8C4
                                        • ReleaseDC.USER32(00000000,?), ref: 0044B8F7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ObjectReleaseSelect
                                        • String ID:
                                        • API String ID: 1831053106-0
                                        • Opcode ID: aebefea9080a2ffce71cc44d900bb6067fbd40711943de4e6aa6f899a124bbe5
                                        • Instruction ID: 488fbe92d3dbd6553530e1f28a7071e145c326c324a604cd7e83169de99d3e99
                                        • Opcode Fuzzy Hash: aebefea9080a2ffce71cc44d900bb6067fbd40711943de4e6aa6f899a124bbe5
                                        • Instruction Fuzzy Hash: B321A470E043086FEB05EFA5C841B9EBBB8EB48304F0184BAF504A6292D73CD940CB58
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B5EC,?,004839CF,?,?), ref: 0044B5BE
                                        • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B5D1
                                        • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B605
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: DrawText$ByteCharMultiWide
                                        • String ID:
                                        • API String ID: 65125430-0
                                        • Opcode ID: 220ba5cac8d50b27136c7947ff428b4d5b30f8bb344e0136b885afe7086c5f85
                                        • Instruction ID: c4c5e2dbcf53f363daa0ac06871d419456bbfc1076f0fbe0a6f7c1d9791685bd
                                        • Opcode Fuzzy Hash: 220ba5cac8d50b27136c7947ff428b4d5b30f8bb344e0136b885afe7086c5f85
                                        • Instruction Fuzzy Hash: 1011CBB27045047FE711DB5A9C81D6FB7ECEB89714F10417BF514D72D0D6389E018669
                                        APIs
                                        • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424862
                                        • TranslateMessage.USER32(?), ref: 004248DF
                                        • DispatchMessageA.USER32(?), ref: 004248E9
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Message$DispatchPeekTranslate
                                        • String ID:
                                        • API String ID: 4217535847-0
                                        • Opcode ID: 1d5f45652bc976909b78a8fda5e55899e4ac3f100e933d79a059951e0026f3ac
                                        • Instruction ID: c7af1bd1b10d32b98fa997e15213bd70182e4a6faef26a56c53dd2d0e562e7a0
                                        • Opcode Fuzzy Hash: 1d5f45652bc976909b78a8fda5e55899e4ac3f100e933d79a059951e0026f3ac
                                        • Instruction Fuzzy Hash: 7111C4343143905AEA20F664A94179B73D4DFD1B04F81481FF8D947382D3BD9D49876B
                                        APIs
                                        • SetPropA.USER32(00000000,00000000), ref: 00416ABA
                                        • SetPropA.USER32(00000000,00000000), ref: 00416ACF
                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 00416AF6
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Prop$Window
                                        • String ID:
                                        • API String ID: 3363284559-0
                                        • Opcode ID: 120d831fd0e7c0f5eedd88e24305ab6ef8b5e2b9243d669fe5121d0f27645725
                                        • Instruction ID: ba7ff3a79511e9fd345c6eb2e7309737472e1a66b8435aad7f351e84ed883601
                                        • Opcode Fuzzy Hash: 120d831fd0e7c0f5eedd88e24305ab6ef8b5e2b9243d669fe5121d0f27645725
                                        • Instruction Fuzzy Hash: 24F0B271701210ABD710AB698C85FA636ECAF0D755F16417ABA05EF286C679DC4087A8
                                        APIs
                                        • IsWindowVisible.USER32(?), ref: 0041F2B4
                                        • IsWindowEnabled.USER32(?), ref: 0041F2BE
                                        • EnableWindow.USER32(?,00000000), ref: 0041F2E4
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$EnableEnabledVisible
                                        • String ID:
                                        • API String ID: 3234591441-0
                                        • Opcode ID: f8c63cb9eb03fe3057432f7fc847cbb230a844cb3caf0d06e376941515be7c19
                                        • Instruction ID: f88b3158499dd9289c75302ad3040ea965d59b676cda83e5cbf87f6be83bac28
                                        • Opcode Fuzzy Hash: f8c63cb9eb03fe3057432f7fc847cbb230a844cb3caf0d06e376941515be7c19
                                        • Instruction Fuzzy Hash: 56E06D74200200ABE310AB26ED81A56779CEB10314F118437A849AB293D63AD8458ABC
                                        APIs
                                        • GetForegroundWindow.USER32(00000000,00000000,?,?,0048486D,?,00484952,?,?,00000000), ref: 0048480E
                                        • GetWindowThreadProcessId.USER32(00000000,?), ref: 00484820
                                        • GetCurrentProcessId.KERNEL32(00000000,?,00000000,00000000,?,?,0048486D,?,00484952,?,?,00000000), ref: 00484829
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ProcessWindow$CurrentForegroundThread
                                        • String ID:
                                        • API String ID: 3477312055-0
                                        • Opcode ID: 9f51dd0a086dfbcb1114822517b22dcc69f79606d1d2df2038485f7abb79e1d8
                                        • Instruction ID: 1f5535e564554d04b279d15e2d0f53a7c3fa56dd59ea92930bb6cd4aac111565
                                        • Opcode Fuzzy Hash: 9f51dd0a086dfbcb1114822517b22dcc69f79606d1d2df2038485f7abb79e1d8
                                        • Instruction Fuzzy Hash: 79D01273506A2A7E6610F5E96D81CAFB39CD900758714017BF904A2241EA299E0486BD
                                        APIs
                                        • SetActiveWindow.USER32(?), ref: 0046ACB1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ActiveWindow
                                        • String ID: PrepareToInstall
                                        • API String ID: 2558294473-1101760603
                                        • Opcode ID: cd5b1a0b912d67a437e6bbd69532862deafe0fefe239bb55885b848769b7218e
                                        • Instruction ID: fdee18710babf5e336c1910aeb408bf0e6a903f892d838ad66a8bf575b9628a0
                                        • Opcode Fuzzy Hash: cd5b1a0b912d67a437e6bbd69532862deafe0fefe239bb55885b848769b7218e
                                        • Instruction Fuzzy Hash: 90A10C74A00109DFCB00EF99D886E9EB7F5AF48304F5540B6E404AB366D738AE45DB5A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: /:*?"<>|
                                        • API String ID: 0-4078764451
                                        • Opcode ID: ceb3f76dddb8c4f3c05b9d1c15b0c50ece1c75124130fc1418fa8c0e44e40a18
                                        • Instruction ID: f677315d7a897bddb44220e636167c4a4d5a92338f94b0a6c85659efeb8beb4e
                                        • Opcode Fuzzy Hash: ceb3f76dddb8c4f3c05b9d1c15b0c50ece1c75124130fc1418fa8c0e44e40a18
                                        • Instruction Fuzzy Hash: 95719770F04208ABDB10EB66DC92F9E77A15B41308F1480A7F900BB392E6B99D45875F
                                        APIs
                                        • SetActiveWindow.USER32(?), ref: 00483A62
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ActiveWindow
                                        • String ID: InitializeWizard
                                        • API String ID: 2558294473-2356795471
                                        • Opcode ID: a861e86f873b0b524708e3a991eb87abaee121498e86a8c8c1a9999c172b55c2
                                        • Instruction ID: 9a8fbe648e99d25b3c1ebd2b051959da3f81131ff902f8f70686133b91dd172c
                                        • Opcode Fuzzy Hash: a861e86f873b0b524708e3a991eb87abaee121498e86a8c8c1a9999c172b55c2
                                        • Instruction Fuzzy Hash: BD119170608104DFD704EF2AFC85B597BE8E714718F22847BE544872A2EBB96D00DB6D
                                        APIs
                                        Strings
                                        • Failed to remove temporary directory: , xrefs: 0047E10B
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CountTick
                                        • String ID: Failed to remove temporary directory:
                                        • API String ID: 536389180-3544197614
                                        • Opcode ID: 9feb2f6085af5a8b024ba5244f206146ce975ac7a9d5adcf9a00534459b24a1c
                                        • Instruction ID: ac5e1a37918f7d070e72ace47ef54387b1d6805ebc6ff4ed15476670fa48ed12
                                        • Opcode Fuzzy Hash: 9feb2f6085af5a8b024ba5244f206146ce975ac7a9d5adcf9a00534459b24a1c
                                        • Instruction Fuzzy Hash: 5A017930604204AADB11EB73DC47FDA3798DB49709F6089BBB504B62E2DBBC9D04D55C
                                        APIs
                                          • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047DA4C,00000000,0047DC4C), ref: 0047D845
                                        Strings
                                        • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047D815
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseOpen
                                        • String ID: Software\Microsoft\Windows\CurrentVersion
                                        • API String ID: 47109696-1019749484
                                        • Opcode ID: 53df27f75c1619b18280fce424738c59cd53f5d3a215a116b7eac3c2b38ec33c
                                        • Instruction ID: 9e1ac37bc360ea69ca44dde089ba04ba4b826bb97de6a423fadd5e819c649f8f
                                        • Opcode Fuzzy Hash: 53df27f75c1619b18280fce424738c59cd53f5d3a215a116b7eac3c2b38ec33c
                                        • Instruction Fuzzy Hash: 09F08231B04114A7DB00B69A9C42BAEA7AC8F84758F20807BF519EB242D9B99E0143AD
                                        APIs
                                        • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                                        Strings
                                        • System\CurrentControlSet\Control\Windows, xrefs: 0042E286
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Open
                                        • String ID: System\CurrentControlSet\Control\Windows
                                        • API String ID: 71445658-1109719901
                                        • Opcode ID: ba599b357b8d4751e1ab922ebb55064d8a8854d38c942fc45e646e4ab9ecaa7b
                                        • Instruction ID: 65e6a506820a5022674633d18044d67bbd02e357da0c4a821f6ebd0b5300d4b8
                                        • Opcode Fuzzy Hash: ba599b357b8d4751e1ab922ebb55064d8a8854d38c942fc45e646e4ab9ecaa7b
                                        • Instruction Fuzzy Hash: B7D09272910228BBAB009A89DC41DFB77ADDB1A760F80806AF91897241D2B4AC519BF4
                                        APIs
                                        • GetACP.KERNEL32(?,?,00000001,00000000,0047FA57,?,-0000001A,00481956,-00000010,?,00000004,0000001C,00000000,00481CA3,?,0045E364), ref: 0047F7EE
                                          • Part of subcall function 0042E76C: GetDC.USER32(00000000), ref: 0042E77B
                                          • Part of subcall function 0042E76C: EnumFontsA.GDI32(?,00000000,0042E758,00000000,00000000,0042E7C4,?,00000000,00000000,?,?,00000001,00000000,00000002,00000000,00482671), ref: 0042E7A6
                                          • Part of subcall function 0042E76C: ReleaseDC.USER32(00000000,?), ref: 0042E7BE
                                        • SendNotifyMessageA.USER32(00020450,00000496,00002711,-00000001), ref: 0047F9BE
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: EnumFontsMessageNotifyReleaseSend
                                        • String ID:
                                        • API String ID: 2649214853-0
                                        • Opcode ID: f63ddfb2871cf1e66e6cb65ad1930d9627398cbe91e727e5a4f1e93d11453290
                                        • Instruction ID: 2351f95844d6f0f86e4a4553bb1ee5652cba21286aa46acec5315b7e6dd2a420
                                        • Opcode Fuzzy Hash: f63ddfb2871cf1e66e6cb65ad1930d9627398cbe91e727e5a4f1e93d11453290
                                        • Instruction Fuzzy Hash: 865196B46001009BD710FF26D98179A37A9EB54309B50C53BA4099F3A7CB3CED4ACB9E
                                        APIs
                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042E188), ref: 0042E08C
                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042E188), ref: 0042E0FC
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: QueryValue
                                        • String ID:
                                        • API String ID: 3660427363-0
                                        • Opcode ID: fb659fd4e3abd397cfb8b0300bb5eb5c22831bf077ba98013b241e0a6da047f3
                                        • Instruction ID: f9a1da9ca9b7937b0bb3d9b331acc3eaa2fb365deabda7ea02547e95fe34f262
                                        • Opcode Fuzzy Hash: fb659fd4e3abd397cfb8b0300bb5eb5c22831bf077ba98013b241e0a6da047f3
                                        • Instruction Fuzzy Hash: 77415E71E00129ABDB11DF92D881BBFB7B9EB01704F944576E814F7281D778AE01CBA9
                                        APIs
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042E426,?,?,00000008,00000000,00000000,0042E453), ref: 0042E3BC
                                        • RegCloseKey.ADVAPI32(?,0042E42D,?,00000000,00000000,00000000,00000000,00000000,0042E426,?,?,00000008,00000000,00000000,0042E453), ref: 0042E420
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseEnum
                                        • String ID:
                                        • API String ID: 2818636725-0
                                        • Opcode ID: ba9fca61959f2a1fd28644f420a32ef2aa2387f9cea893e540c804915765ba19
                                        • Instruction ID: a18f9d464683a8b418f1d9d9c182c699679c3713f239d59a614a00dbe2042668
                                        • Opcode Fuzzy Hash: ba9fca61959f2a1fd28644f420a32ef2aa2387f9cea893e540c804915765ba19
                                        • Instruction Fuzzy Hash: 3E318670B04254AFDB11EBA3EC52BBFBBB9EB45305F90447BE500B3291D6785E01CA29
                                        APIs
                                        • CreateProcessA.KERNEL32(00000000,00000000,?,?,00458A74,00000000,00458A5C,?,?,?,00000000,00452FA6,?,?,?,00000001), ref: 00452F80
                                        • GetLastError.KERNEL32(00000000,00000000,?,?,00458A74,00000000,00458A5C,?,?,?,00000000,00452FA6,?,?,?,00000001), ref: 00452F88
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CreateErrorLastProcess
                                        • String ID:
                                        • API String ID: 2919029540-0
                                        • Opcode ID: 1398244007b20135f5cbcb84ec70d62da1e947103cbbdaeddf7845a69a56a8f1
                                        • Instruction ID: 1642ece03f316e66375c060ca7626bc18a341a32778e3b1f8c5ba0bc81bd916e
                                        • Opcode Fuzzy Hash: 1398244007b20135f5cbcb84ec70d62da1e947103cbbdaeddf7845a69a56a8f1
                                        • Instruction Fuzzy Hash: E7112772A04208AF8B40DEA9ED41D9FB7ECEB4E310B11456BBD08D3241D678AD159B68
                                        APIs
                                        • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040B242
                                        • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B39F,00000000,0040B3B7,?,?,?,00000000), ref: 0040B253
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Resource$FindFree
                                        • String ID:
                                        • API String ID: 4097029671-0
                                        • Opcode ID: ccfb53ccaaecadb89aef38a6b87b21aaaa45f6b87b20848e9e6dd1c8ee0e0d8f
                                        • Instruction ID: 99f6b945ddddc3ffa7954b5b99b0f089effa67c77682540e1bcd22500dccd1d0
                                        • Opcode Fuzzy Hash: ccfb53ccaaecadb89aef38a6b87b21aaaa45f6b87b20848e9e6dd1c8ee0e0d8f
                                        • Instruction Fuzzy Hash: 9101F7717043006FE700EF69DC52D1A77ADDB89718711807AF500EB2D0D63D9C0196AD
                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 0041F343
                                        • EnumThreadWindows.USER32(00000000,0041F2A4,00000000), ref: 0041F349
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Thread$CurrentEnumWindows
                                        • String ID:
                                        • API String ID: 2396873506-0
                                        • Opcode ID: 26a01034718a754fac2428515d88d868d648ddf0343dd67eaafc6563d075de98
                                        • Instruction ID: ded2603fe903b3ccb75c053802ed51acc4a1ef0e0cc57bb05547c7342bcbb188
                                        • Opcode Fuzzy Hash: 26a01034718a754fac2428515d88d868d648ddf0343dd67eaafc6563d075de98
                                        • Instruction Fuzzy Hash: B2016D74A04B08BFD301CF66ED1195ABBF8F749724B22C877E854D3AA0E73459119E58
                                        APIs
                                        • MoveFileA.KERNEL32(00000000,00000000), ref: 00453406
                                        • GetLastError.KERNEL32(00000000,00000000,00000000,0045342C), ref: 0045340E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorFileLastMove
                                        • String ID:
                                        • API String ID: 55378915-0
                                        • Opcode ID: 1548faf8a9677bd12e98f2e2d243f9d82652a592f520366f9bcd72908c48431c
                                        • Instruction ID: 0cc30b72992c59045a3cb8216ce3619e412531a307d766600c380e57d1775dbb
                                        • Opcode Fuzzy Hash: 1548faf8a9677bd12e98f2e2d243f9d82652a592f520366f9bcd72908c48431c
                                        • Instruction Fuzzy Hash: 6101D671B04204BB8701EFB9AC4249EB7ECDB49766760457BFC04E3242EA789F088558
                                        APIs
                                        • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00452F13), ref: 00452EED
                                        • GetLastError.KERNEL32(00000000,00000000,00000000,00452F13), ref: 00452EF5
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID:
                                        • API String ID: 1375471231-0
                                        • Opcode ID: 7cb2c570ac219d0ee22c88f96f5bf87a62d98c3fd0f6f1ca7cf3871b5df67843
                                        • Instruction ID: 89335b5e5455deb896f2d2efe83bb95299e3db0618b413de6719cdd134c6b725
                                        • Opcode Fuzzy Hash: 7cb2c570ac219d0ee22c88f96f5bf87a62d98c3fd0f6f1ca7cf3871b5df67843
                                        • Instruction Fuzzy Hash: CEF02872A04304BBCB01EF75AD0259EB3E8DB0A321B5045BBFC04E3282E7B94E049698
                                        APIs
                                        • GetFileAttributesA.KERNEL32(00000000,00000000,00453283,?,?,00000000), ref: 0045325D
                                        • GetLastError.KERNEL32(00000000,00000000,00453283,?,?,00000000), ref: 00453265
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AttributesErrorFileLast
                                        • String ID:
                                        • API String ID: 1799206407-0
                                        • Opcode ID: 93a4445a77e87f832db48cc37b7d9a5725dfb79c3c3b600bc74ddeadc40bd50e
                                        • Instruction ID: 5db4c9d18fff2c699384bf48158aad256892f70ed416b0cdc9347702aa33957f
                                        • Opcode Fuzzy Hash: 93a4445a77e87f832db48cc37b7d9a5725dfb79c3c3b600bc74ddeadc40bd50e
                                        • Instruction Fuzzy Hash: D5F0FC71A04B04ABCB10DFB9AD4249DB3A8DB49766B5046FBFC14E3682DB785F04859C
                                        APIs
                                        • LoadCursorA.USER32(00000000,00007F00), ref: 00423699
                                        • LoadCursorA.USER32(00000000,00000000), ref: 004236C3
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CursorLoad
                                        • String ID:
                                        • API String ID: 3238433803-0
                                        • Opcode ID: f140cec9cfa9b30dc2305244e4258a11cf30c4d8c1b352010c949b8b0dda8ca8
                                        • Instruction ID: 05fd857f6409e6a60644ea24615d01c87e42662e453bf4d6e4e1dfbb00014e4e
                                        • Opcode Fuzzy Hash: f140cec9cfa9b30dc2305244e4258a11cf30c4d8c1b352010c949b8b0dda8ca8
                                        • Instruction Fuzzy Hash: F2F0A7517002107ADA205E3E6CC0A2A72ADCBC1735B61437BFA2AE73D1C72D5D45556D
                                        APIs
                                        • SetErrorMode.KERNEL32(00008000), ref: 0042E7EE
                                        • LoadLibraryA.KERNEL32(00000000,00000000,0042E838,?,00000000,0042E856,?,00008000), ref: 0042E81D
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLibraryLoadMode
                                        • String ID:
                                        • API String ID: 2987862817-0
                                        • Opcode ID: 9b4fdb90dd8f6dfc429e23110810c204407b66d19ffb3595c1bc568b2ae7c347
                                        • Instruction ID: 76a16bdd6934cf9e499703eeb82aeaab1faf94a78ecb328ba4f7015bbedd62a6
                                        • Opcode Fuzzy Hash: 9b4fdb90dd8f6dfc429e23110810c204407b66d19ffb3595c1bc568b2ae7c347
                                        • Instruction Fuzzy Hash: 13F08270B14744BEDB116F779C6282BBBECE749B1079348B6F800A3A91E63C4C10C968
                                        APIs
                                        • CallWindowProcW.USER32(6F5127E0,?,?,?,?), ref: 00477E79
                                        • CallWindowProcW.USER32(FFFF0466,?,?,?,?), ref: 00477E8A
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CallProcWindow
                                        • String ID:
                                        • API String ID: 2714655100-0
                                        • Opcode ID: 3b3bcb1a515eb24d18246344862472c5999d5df4409f8f541189235709fabbb3
                                        • Instruction ID: e3cdc248f3d34916c976d05d9458007ce5e90364cfce0ac0a3cfd78eef4de0e7
                                        • Opcode Fuzzy Hash: 3b3bcb1a515eb24d18246344862472c5999d5df4409f8f541189235709fabbb3
                                        • Instruction Fuzzy Hash: 30F030B2114318BBDA00DA6ADC89CA777ACEF59360B00C637BD18933A0D178AD008678
                                        APIs
                                        • GetVersion.KERNEL32(?,0046EE9A), ref: 0046EE0E
                                        • CoCreateInstance.OLE32(0049BB9C,00000000,00000001,0049BBAC,?,?,0046EE9A), ref: 0046EE2A
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CreateInstanceVersion
                                        • String ID:
                                        • API String ID: 1462612201-0
                                        • Opcode ID: 780da2f8f06851a502736db72271cf8d77c3ee5523c6db3b3ed376e5da340fe9
                                        • Instruction ID: 784abeb2b863a263b0685f2ce256345c834679a9cfc70721c753cc97000ad865
                                        • Opcode Fuzzy Hash: 780da2f8f06851a502736db72271cf8d77c3ee5523c6db3b3ed376e5da340fe9
                                        • Instruction Fuzzy Hash: 2AF0E534241310EEFB11E72BDC4AB4A3BC4AB25714F14403BF144972A1E3EE94808B6F
                                        APIs
                                        • GetClassInfoA.USER32(00400000,?,?), ref: 00416731
                                        • GetClassInfoA.USER32(00000000,?,?), ref: 00416741
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ClassInfo
                                        • String ID:
                                        • API String ID: 3534257612-0
                                        • Opcode ID: d17345ab9950f68f1f104603a375dc2c5e22966700f41ddff89a6cf19b5b6da3
                                        • Instruction ID: fd9875a215ec353102ef76963993ed989aa11c6eeb2d05a4b237c4ae5cfc76fd
                                        • Opcode Fuzzy Hash: d17345ab9950f68f1f104603a375dc2c5e22966700f41ddff89a6cf19b5b6da3
                                        • Instruction Fuzzy Hash: 97E012B26115115AD710DB98CD81EE736DCDB08314B110163BE08CB145D364DD0047A8
                                        APIs
                                        • SHGetKnownFolderPath.SHELL32(0049BD54,00008000,00000000,?), ref: 0047DBA5
                                        • CoTaskMemFree.OLE32(?,0047DBE8), ref: 0047DBDB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FolderFreeKnownPathTask
                                        • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                        • API String ID: 969438705-544719455
                                        • Opcode ID: 40c9fceec1849ef55c2d9e9b165fa2d81ca6f89bfe3325e062340eef34f4dc70
                                        • Instruction ID: 547cb950fcd41f41a68947569da9652c82defc7c7397c5e87919afd81bca1a0c
                                        • Opcode Fuzzy Hash: 40c9fceec1849ef55c2d9e9b165fa2d81ca6f89bfe3325e062340eef34f4dc70
                                        • Instruction Fuzzy Hash: F5E06534714640BEEB119A619D12B5977B8EB85B04FB28476F50496690D678A9009A18
                                        APIs
                                        • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,00470FA5,?,00000000), ref: 00451052
                                        • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,00470FA5,?,00000000), ref: 0045105A
                                          • Part of subcall function 00450DF8: GetLastError.KERNEL32(00450C14,00450EBA,?,00000000,?,00499714,00000001,00000000,00000002,00000000,00499875,?,?,00000005,00000000,004998A9), ref: 00450DFB
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLast$FilePointer
                                        • String ID:
                                        • API String ID: 1156039329-0
                                        • Opcode ID: 57e3a47998fe8597b6042e5f5bf28c6be865df3206a1389c22972bb96d3862bd
                                        • Instruction ID: e16622de0e040581c0824a6ac5d1d77e375427595308dce999b5737054ed6bda
                                        • Opcode Fuzzy Hash: 57e3a47998fe8597b6042e5f5bf28c6be865df3206a1389c22972bb96d3862bd
                                        • Instruction Fuzzy Hash: 86E012B5344201ABE700FAB599C1F2B22DCDB44755F10846AF944DA187D674DC498B35
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00484846
                                        • GetTickCount.KERNEL32 ref: 0048483D
                                          • Part of subcall function 00484808: GetForegroundWindow.USER32(00000000,00000000,?,?,0048486D,?,00484952,?,?,00000000), ref: 0048480E
                                          • Part of subcall function 00484808: GetWindowThreadProcessId.USER32(00000000,?), ref: 00484820
                                          • Part of subcall function 00484808: GetCurrentProcessId.KERNEL32(00000000,?,00000000,00000000,?,?,0048486D,?,00484952,?,?,00000000), ref: 00484829
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CountProcessTickWindow$CurrentForegroundThread
                                        • String ID:
                                        • API String ID: 711787588-0
                                        • Opcode ID: b5012c5d5f67b50791137d02010e47c7c65d22dc99dd8034a83b9399e6e836ec
                                        • Instruction ID: 15379a2e01471303efff648884838df7c38ffaa6109914de87cf785516410688
                                        • Opcode Fuzzy Hash: b5012c5d5f67b50791137d02010e47c7c65d22dc99dd8034a83b9399e6e836ec
                                        • Instruction Fuzzy Hash: 76D0A94C61028305CD00BBB3828622D01409FC031DF000C3FB80A9B283DE1C8100833F
                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 0041F45E
                                        • EnumThreadWindows.USER32(00000000,0041F3E0,00000000), ref: 0041F464
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Thread$CurrentEnumWindows
                                        • String ID:
                                        • API String ID: 2396873506-0
                                        • Opcode ID: 714e2587f2e5118136e687c91d65361c8421099981035becec4dff953f00131f
                                        • Instruction ID: 68741bc32d62e3c0e2143af6d8bcd4559dc66fbf958b0e80957fbdef8d5f35d8
                                        • Opcode Fuzzy Hash: 714e2587f2e5118136e687c91d65361c8421099981035becec4dff953f00131f
                                        • Instruction Fuzzy Hash: 92E04CB1A00600AFDB10EF35FF4575A37E4E720718F16483BA884D21A1D3745844DA9C
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Global$AllocLock
                                        • String ID:
                                        • API String ID: 15508794-0
                                        • Opcode ID: 38fdb687bb69d238822be17628ba02d3430ff360103c12c92fad93c094244837
                                        • Instruction ID: 56019af84ea84d57b40f02c4528a45173e4f1cdf38a2be340d0d32551c2e1a06
                                        • Opcode Fuzzy Hash: 38fdb687bb69d238822be17628ba02d3430ff360103c12c92fad93c094244837
                                        • Instruction Fuzzy Hash: 699002C4C01A00A4DC0072B20C0BD3F101CD8C072C3D1486F7044B6483887C88000979
                                        APIs
                                        • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Virtual$AllocFree
                                        • String ID:
                                        • API String ID: 2087232378-0
                                        • Opcode ID: 7e62aa1badbe9b7bec7abb2084251aae76f03f49734707af951965b808a3b35c
                                        • Instruction ID: a6323659c4e3f22e280215c11bf30f87fcb27bed7f3312751ebcd43238c0638b
                                        • Opcode Fuzzy Hash: 7e62aa1badbe9b7bec7abb2084251aae76f03f49734707af951965b808a3b35c
                                        • Instruction Fuzzy Hash: CCF08272A0063067EB60596A4C81B5359849BC5794F154076FD09FF3E9D6B58C0142A9
                                        APIs
                                        • GetSystemDefaultLCID.KERNEL32(00000000,00408B62), ref: 00408A4B
                                          • Part of subcall function 0040723C: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00407259
                                          • Part of subcall function 004089B8: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049D4C4,00000001,?,00408A83,?,00000000,00408B62), ref: 004089D6
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: DefaultInfoLoadLocaleStringSystem
                                        • String ID:
                                        • API String ID: 1658689577-0
                                        • Opcode ID: bb57ecfbcf6c99401787c1e244de85808a7a992296f2a947b18206caa06ad51e
                                        • Instruction ID: 2280d21d464d6860fad4d2303e4b2489916fa30e512bd771d5ffef80d8a4ef38
                                        • Opcode Fuzzy Hash: bb57ecfbcf6c99401787c1e244de85808a7a992296f2a947b18206caa06ad51e
                                        • Instruction Fuzzy Hash: F6315275E001099BCF00EF95C8819EEB779EF84314F51857BE815BB385E738AE058B99
                                        APIs
                                        • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 00420089
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: InfoScroll
                                        • String ID:
                                        • API String ID: 629608716-0
                                        • Opcode ID: 3edf798da742a1a67383ead948891c4ca252191c32eeff7b634738f170ced4ea
                                        • Instruction ID: a69ccf46589f52d523cedfa5b555af8e95575bce60e7416ef6aeac4177a5bf43
                                        • Opcode Fuzzy Hash: 3edf798da742a1a67383ead948891c4ca252191c32eeff7b634738f170ced4ea
                                        • Instruction Fuzzy Hash: BA2151B1604755AFD340DF39A440767BBE4BB48344F04892EE098C3342E775E995CBD6
                                        APIs
                                          • Part of subcall function 0041F2F4: GetCurrentThreadId.KERNEL32 ref: 0041F343
                                          • Part of subcall function 0041F2F4: EnumThreadWindows.USER32(00000000,0041F2A4,00000000), ref: 0041F349
                                        • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046D16E,?,00000000,?,?,0046D380,?,00000000,0046D3F4), ref: 0046D152
                                          • Part of subcall function 0041F3A8: IsWindow.USER32(?), ref: 0041F3B6
                                          • Part of subcall function 0041F3A8: EnableWindow.USER32(?,00000001), ref: 0041F3C5
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ThreadWindow$CurrentEnableEnumPathPrepareWindowsWrite
                                        • String ID:
                                        • API String ID: 3319771486-0
                                        • Opcode ID: 9f032309dcde971134040d123568164e642ddd2cabc1e4735cf40f63c5ed8cf9
                                        • Instruction ID: b16b0b1c8f0f43ce2eded6e4310be42afa410753b2a581968e322ef2fdc8cd52
                                        • Opcode Fuzzy Hash: 9f032309dcde971134040d123568164e642ddd2cabc1e4735cf40f63c5ed8cf9
                                        • Instruction Fuzzy Hash: EFF0BEB1B08344BFFB05DB72EC56B6AB7A8E30A714F61447BF404861A0EAF95840852E
                                        APIs
                                        • GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042CC78
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FullNamePath
                                        • String ID:
                                        • API String ID: 608056474-0
                                        • Opcode ID: 428d784e0bfc7ea914628290b6176d02b3cebe94b5205d1ffc685c49e669826c
                                        • Instruction ID: a2a3468b7bc3cfdf25810f87908f7fe28db096dc5188f9b8c4dedd834d11342f
                                        • Opcode Fuzzy Hash: 428d784e0bfc7ea914628290b6176d02b3cebe94b5205d1ffc685c49e669826c
                                        • Instruction Fuzzy Hash: BFE0EC6170051023D611556F6CC15BF518C8BD4375F04013BB95CDB3D1DABDCE45019E
                                        APIs
                                        • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 004169D5
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: 055c9416affa8369aca5a52daf2b71abecd104a899c95fff13876bf4c34adbe4
                                        • Instruction ID: 76b9729045c620b17443a4bfae3f317f1f80b082859ffabd1d53e10c409eed5a
                                        • Opcode Fuzzy Hash: 055c9416affa8369aca5a52daf2b71abecd104a899c95fff13876bf4c34adbe4
                                        • Instruction Fuzzy Hash: FEF025B2600510AFDB84CF9CD8C0F9373ECEB0C210B0881A6FA08CF21AD220EC108BB0
                                        APIs
                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00414E3F
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CallbackDispatcherUser
                                        • String ID:
                                        • API String ID: 2492992576-0
                                        • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                        • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                        • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                        • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                        APIs
                                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00450F48
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID:
                                        • API String ID: 823142352-0
                                        • Opcode ID: 00d3b0e571f0f9799c9202ce425a31b8579894210baf7755ca9a5e27d392a7a4
                                        • Instruction ID: 8219f7e09200e9d280371fd8822ce49b3febf2e1364c7dcaf59ee2aef9f1cf3d
                                        • Opcode Fuzzy Hash: 00d3b0e571f0f9799c9202ce425a31b8579894210baf7755ca9a5e27d392a7a4
                                        • Instruction Fuzzy Hash: E2E0EDB53541483ED6809AAD7D42F9667DCD71A724F008033B998D7241D5619D158BE8
                                        APIs
                                        • GetFileAttributesA.KERNEL32(00000000,00000000,0042D164,?,00000001,?,?,00000000,?,0042D1B6,00000000,00453169,00000000,0045318A,?,00000000), ref: 0042D147
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: 52a97f63493a2405b18f7ceeeb4c5583b1fc3ffb9d272bcba16263c996160de7
                                        • Instruction ID: 9806b9c164805e7544688198397d180b04c1e4ca63c7d3d80aa3ce68cdb407ca
                                        • Opcode Fuzzy Hash: 52a97f63493a2405b18f7ceeeb4c5583b1fc3ffb9d272bcba16263c996160de7
                                        • Instruction Fuzzy Hash: 74E09271704704BFD701EF62DC53E6BBBECDB89B18BA14876B400E7692D6789E10D468
                                        APIs
                                        • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004539D7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042ED37
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FormatMessage
                                        • String ID:
                                        • API String ID: 1306739567-0
                                        • Opcode ID: 09ac2101c8e17b0b2705a927b8a5b1ff093a5eaf49e610a8aec8846a662564db
                                        • Instruction ID: 20bfa46e39afc277729b0f592bdc1926ad718625f52f7f76be7811270f12921f
                                        • Opcode Fuzzy Hash: 09ac2101c8e17b0b2705a927b8a5b1ff093a5eaf49e610a8aec8846a662564db
                                        • Instruction Fuzzy Hash: 0DE0206179471216F2351416AC47B77530E43C0704F944436BF50DD3E3D6AED906465E
                                        APIs
                                        • CreateWindowExA.USER32(00000000,00423ACC,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042405C), ref: 00406321
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: 9dc46ec25ca5ecaaaae1fbad39bdca196911fb58cef97937ba07dcb482697fa8
                                        • Instruction ID: 1e3b386673cc32b76f3712ab4659b14af7d7742474b1f2ca80afcc4f691b27f6
                                        • Opcode Fuzzy Hash: 9dc46ec25ca5ecaaaae1fbad39bdca196911fb58cef97937ba07dcb482697fa8
                                        • Instruction Fuzzy Hash: 26E002B221430DBFDB00DE8ADCC1DABB7ACFB4C654F808105BB1C972528675AC608B71
                                        APIs
                                        • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042E260
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 5347a797c781b98567e2e52ffd135a3f9820974f1ad95a252eafdff03c881ffc
                                        • Instruction ID: 1b6ad3e9ff9242377371a87229ab788a86a92e19cf0220c3a89558970fe9bf90
                                        • Opcode Fuzzy Hash: 5347a797c781b98567e2e52ffd135a3f9820974f1ad95a252eafdff03c881ffc
                                        • Instruction Fuzzy Hash: 58E07EB6600119AF9B40DE8DDC81EEB37ADAB5D360F444016FA48E7200C2B8EC519BB4
                                        APIs
                                        • FindClose.KERNEL32(00000000,000000FF,0047194C,00000000,00472768,?,00000000,004727B1,?,00000000,004728EA,?,00000000,?,00000000,I), ref: 00455376
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseFind
                                        • String ID:
                                        • API String ID: 1863332320-0
                                        • Opcode ID: 36cd9f84857256ac69cfb0465bd1e7b3074f7074ae305d1ba71a48d654773a12
                                        • Instruction ID: 8b71881552422ad0faea9fb58b8cbe3f8cf10286c40a53e64c89ff98b22cfa58
                                        • Opcode Fuzzy Hash: 36cd9f84857256ac69cfb0465bd1e7b3074f7074ae305d1ba71a48d654773a12
                                        • Instruction Fuzzy Hash: 74E09BB0504A004BC714DF7A848132A77D15F84321F04C96ABC9CCB7D7E67C84154667
                                        APIs
                                        • KiUserCallbackDispatcher.NTDLL(004972CE,?,004972F0,?,?,00000000,004972CE,?,?), ref: 00414AEB
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CallbackDispatcherUser
                                        • String ID:
                                        • API String ID: 2492992576-0
                                        • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                        • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                        • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                        • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                        APIs
                                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00407374
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FileWrite
                                        • String ID:
                                        • API String ID: 3934441357-0
                                        • Opcode ID: 3a95ec999e214528a4642a0263e4bef887c4bff4fae810559ecd64d74c978ed9
                                        • Instruction ID: 7137799a8a619894c36928dc497025c8ae4ce5b7c347e91e7b4e2a044eac2fb2
                                        • Opcode Fuzzy Hash: 3a95ec999e214528a4642a0263e4bef887c4bff4fae810559ecd64d74c978ed9
                                        • Instruction Fuzzy Hash: CFD05B723082507BE320A55B5C44EAB6BDCCBC5774F10063EF958D31C1D6349C01C675
                                        APIs
                                          • Part of subcall function 00423A48: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 00423A5D
                                        • ShowWindow.USER32(004108B0,00000009,?,00000000,0041F1F4,00423D8A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042405C), ref: 00423AB7
                                          • Part of subcall function 00423A78: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423A94
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: InfoParametersSystem$ShowWindow
                                        • String ID:
                                        • API String ID: 3202724764-0
                                        • Opcode ID: b1c2cd61143bf12a0bef37db47b635a6d3ef0f027e429c080d83374e888f6fa5
                                        • Instruction ID: b4979a057c5364df20928e0f8112b75834207fc47edce7a1cb621b48fadbe9ee
                                        • Opcode Fuzzy Hash: b1c2cd61143bf12a0bef37db47b635a6d3ef0f027e429c080d83374e888f6fa5
                                        • Instruction Fuzzy Hash: E4D0A7137811703143117BB738469BF46EC4DD26AB38808BBB5C0DB303E91E8E051278
                                        APIs
                                        • SetWindowTextA.USER32(?,00000000), ref: 0042472C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: TextWindow
                                        • String ID:
                                        • API String ID: 530164218-0
                                        • Opcode ID: 0f798d55b4a563aaf07053da431746ff1fcbe1b34a54896860b3a53b831deb59
                                        • Instruction ID: 0401e0c0b6f3d46f422729750133087b7afca2a32056b90ced50410e3746bfe3
                                        • Opcode Fuzzy Hash: 0f798d55b4a563aaf07053da431746ff1fcbe1b34a54896860b3a53b831deb59
                                        • Instruction Fuzzy Hash: 17D05EE27011602BCB01BAAD54C4ACA67CC8B8936AB1440BBF908EF257C638CE458398
                                        APIs
                                        • GetFileAttributesA.KERNEL32(00000000,?,00453399,00000000,004533B2,?,-00000001,00000000), ref: 0042D1C7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: 7c6ebe174506a89767f7ee592df00eb0c72a5955deab68b848f445c8102e14c6
                                        • Instruction ID: bf35e0695d646f252302ae8c05399a3b1551c06c76099583daea3b520eb86f7d
                                        • Opcode Fuzzy Hash: 7c6ebe174506a89767f7ee592df00eb0c72a5955deab68b848f445c8102e14c6
                                        • Instruction Fuzzy Hash: 3ED022D071121001DE10A0BC28C533711880B74336BA41A33BD69E26E3C33D8823542C
                                        APIs
                                        • GetFileAttributesA.KERNEL32(00000000,00000000,00451D0F,00000000), ref: 0042D17F
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: 176281895ea3e42f60d60676608de6346bb49bc8ae14b0fa01ac27964d7a3955
                                        • Instruction ID: 86baad2ceceaa6a85e65f17f0286784d9b66173697f2cc348ab0aa8737b1e759
                                        • Opcode Fuzzy Hash: 176281895ea3e42f60d60676608de6346bb49bc8ae14b0fa01ac27964d7a3955
                                        • Instruction Fuzzy Hash: C9C080D0711210155E10A5BD1CC556703C849543793540F37B068D66D2D13D8466202C
                                        APIs
                                        • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00468491,00000000,00000000,00000000,0000000C,00000000), ref: 004677E4
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CallbackDispatcherUser
                                        • String ID:
                                        • API String ID: 2492992576-0
                                        • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                        • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                        • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                        • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                        APIs
                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040AB24,0040D0D0,?,00000000,?), ref: 0040732D
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID:
                                        • API String ID: 823142352-0
                                        • Opcode ID: 209b0ba7fd8c5b4a24ef9a539f4d873392a5060120ce01350303422817e34c0d
                                        • Instruction ID: a78e408fffc15bc8d0ee8a54c686fbaa4e2694f5c3f88f37cecd524e454749ad
                                        • Opcode Fuzzy Hash: 209b0ba7fd8c5b4a24ef9a539f4d873392a5060120ce01350303422817e34c0d
                                        • Instruction Fuzzy Hash: ADC048B13C130032F93025A61C87F1604889714B1AE60943AB740BE1C2D8E9A818016C
                                        APIs
                                        • KiUserCallbackDispatcher.NTDLL(?,?,?,00000000), ref: 0041F800
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CallbackDispatcherUser
                                        • String ID:
                                        • API String ID: 2492992576-0
                                        • Opcode ID: aa2ab5d04534ce78fd06398472ac87fc8e200d4b6eb1d54961e47d4e7a3c3f50
                                        • Instruction ID: 48f25c4fc7afed193c39a16cc91a0304f94a1296cd048c63733264e3b5f0309e
                                        • Opcode Fuzzy Hash: aa2ab5d04534ce78fd06398472ac87fc8e200d4b6eb1d54961e47d4e7a3c3f50
                                        • Instruction Fuzzy Hash: D2D0C932100108AFDB018E94AC018677B69EB48210B148815FD0485221D633E831AA91
                                        APIs
                                        • FreeLibrary.KERNEL32(00000000,004506B4,00000000,?,00469063,0000000C,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?), ref: 004504C6
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FreeLibrary
                                        • String ID:
                                        • API String ID: 3664257935-0
                                        • Opcode ID: 26d24d78127bedaa8bd94fa6176c523188c8219f80ea813ea250164edc493aa3
                                        • Instruction ID: d31243997fce6a081680f754dd08e5339b9cfa2d37494deb9f472b2c5ff9ad0f
                                        • Opcode Fuzzy Hash: 26d24d78127bedaa8bd94fa6176c523188c8219f80ea813ea250164edc493aa3
                                        • Instruction Fuzzy Hash: 1AD092B1925244AECB10AB26EA0430232B0E364316F404037E60095163C33988958F8C
                                        APIs
                                        • SetEndOfFile.KERNEL32(?,?,0045CB3E,00000000,0045CCC9,?,00000000,00000002,00000002), ref: 00451077
                                          • Part of subcall function 00450DF8: GetLastError.KERNEL32(00450C14,00450EBA,?,00000000,?,00499714,00000001,00000000,00000002,00000000,00499875,?,?,00000005,00000000,004998A9), ref: 00450DFB
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorFileLast
                                        • String ID:
                                        • API String ID: 734332943-0
                                        • Opcode ID: 46bffcc4190b32f1737510e309765b0f9d847fb6a3bc417c92e668a4702f1f8e
                                        • Instruction ID: c64e7bd530bf7aca0fb3f38fdfe864b922b4b7832701085435935f337d1370ec
                                        • Opcode Fuzzy Hash: 46bffcc4190b32f1737510e309765b0f9d847fb6a3bc417c92e668a4702f1f8e
                                        • Instruction Fuzzy Hash: 0BC04CA5340140578F40A6AE85C1A1663DC9E193493504066B904DF657D669D8484A15
                                        APIs
                                        • DeleteFileA.KERNEL32(00000000,0049D62C,00499FD9,00000000,0049A02E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 004073AB
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: 591f449e1d77daae53b1a5aa43bd251db5a728a4dd1e5d8efdcf407e7d8efb90
                                        • Instruction ID: b32d93fc701aa1162a174406e7d11ef14f94d69b7075bb962530761d6eacc69a
                                        • Opcode Fuzzy Hash: 591f449e1d77daae53b1a5aa43bd251db5a728a4dd1e5d8efdcf407e7d8efb90
                                        • Instruction Fuzzy Hash: 5BB012E13D320A26CA0079FE4CC191B00CC46297063405A3A3406E71C3DC3CC8180414
                                        APIs
                                        • SetCurrentDirectoryA.KERNEL32(00000000,?,004996A2,00000000,00499875,?,?,00000005,00000000,004998A9,?,?,00000000), ref: 00407703
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CurrentDirectory
                                        • String ID:
                                        • API String ID: 1611563598-0
                                        • Opcode ID: f8e5bc84ed77a990345a18ebfce7b3b4d36d471a9523976a67f94f28f3ebd8b5
                                        • Instruction ID: c18bf430a4858a09d5fd0626d157798880aaaa8ea81a5298b6cf69089c3012d4
                                        • Opcode Fuzzy Hash: f8e5bc84ed77a990345a18ebfce7b3b4d36d471a9523976a67f94f28f3ebd8b5
                                        • Instruction Fuzzy Hash: B0B012E03D161B27CA0079FE4CC191A01CC46292163501B3A3006E71C3D83CC8080514
                                        APIs
                                        • FreeLibrary.KERNEL32(00000000,00482E1B), ref: 0047E3E6
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FreeLibrary
                                        • String ID:
                                        • API String ID: 3664257935-0
                                        • Opcode ID: 6c53cdab159c99083d4d98b8786732a30233f1b333e0139ad3d8075ed81d35ad
                                        • Instruction ID: be2fe49a244c431ec9946715e535269e6deba234050b303873a188c7b9bcae40
                                        • Opcode Fuzzy Hash: 6c53cdab159c99083d4d98b8786732a30233f1b333e0139ad3d8075ed81d35ad
                                        • Instruction Fuzzy Hash: C5C00271511210AED750DFBA9D4C75637D4A71832AF068477F40CC3160F6344840CB09
                                        APIs
                                        • SetErrorMode.KERNEL32(?,0042E85D), ref: 0042E850
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorMode
                                        • String ID:
                                        • API String ID: 2340568224-0
                                        • Opcode ID: bbf0f8014a804afebd1604ab393a38912dcaab738292d82ddfa54d7cc6c30dd0
                                        • Instruction ID: 289f6c2202f902c5fbbb0b24ee8d848b414576690a26c35d590b8c03c3951524
                                        • Opcode Fuzzy Hash: bbf0f8014a804afebd1604ab393a38912dcaab738292d82ddfa54d7cc6c30dd0
                                        • Instruction Fuzzy Hash: A7B09B76B0C6005DF705D6D5745152D63D4D7C57203E1457BF454D35C0D93C58004918
                                        APIs
                                        • PostMessageA.USER32(00000000,00000012,00000000,00000000), ref: 00483060
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: MessagePost
                                        • String ID:
                                        • API String ID: 410705778-0
                                        • Opcode ID: 6898b449f02840bdaf07bdabea8d5b644a8965388b8fc92a769e6b1c60158538
                                        • Instruction ID: a049f017766f74ee94b83235d94ec2d7737a3ea42143ca09c2755b46fea829eb
                                        • Opcode Fuzzy Hash: 6898b449f02840bdaf07bdabea8d5b644a8965388b8fc92a769e6b1c60158538
                                        • Instruction Fuzzy Hash: 7FA002343D530430F47463510D13F4400402744F15EE1409573053D0C304D82424201D
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: DestroyWindow
                                        • String ID:
                                        • API String ID: 3375834691-0
                                        • Opcode ID: 7c218e59c1dd1ff03dc8e849b9cf22d0cf8864dd38f6abff84783c2b34ac62d8
                                        • Instruction ID: 951f12253bcdbe2be33f1d7372765b1b3ebb510443260a24e1bbd496af9ec3c9
                                        • Opcode Fuzzy Hash: 7c218e59c1dd1ff03dc8e849b9cf22d0cf8864dd38f6abff84783c2b34ac62d8
                                        • Instruction Fuzzy Hash: AFA002755015409ADB10E7A5C84DF7A2298BF44204FD905FA714CA7052C53CD9008A55
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0047F287,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047F241
                                          • Part of subcall function 0042CE50: GetSystemMetrics.USER32(0000002A), ref: 0042CE62
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ByteCharMetricsMultiSystemWide
                                        • String ID:
                                        • API String ID: 224039744-0
                                        • Opcode ID: f52afbad91b667b6f6308f5f7be5f2f829de3790a0e249e9b62606124138a6e4
                                        • Instruction ID: 496bb1a5f94cf580fd05206e04ab07141ed402b11bdf28edaa456749bafa96dd
                                        • Opcode Fuzzy Hash: f52afbad91b667b6f6308f5f7be5f2f829de3790a0e249e9b62606124138a6e4
                                        • Instruction Fuzzy Hash: 1D51B670600245FFDB10DFA6D884B9AB7F8EB19308F518077E804A73A2D778AD49CB59
                                        APIs
                                        • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041F1F4,?,00423CDF,0042405C,0041F1F4), ref: 0041F832
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 3cd9b2b82d3c03bb1042e3aec431f22b9c9f9b479e5e8d2dc048638413a345c3
                                        • Instruction ID: 12b252a98648104a36852bc9e66bdd9c626d3d2234b6f24232172dde86ff5d2a
                                        • Opcode Fuzzy Hash: 3cd9b2b82d3c03bb1042e3aec431f22b9c9f9b479e5e8d2dc048638413a345c3
                                        • Instruction Fuzzy Hash: FA1148746007059BCB10DF19C880B82FBE4EB98350F10C53AE9588B385D374E849CBA8
                                        APIs
                                        • VirtualFree.KERNEL32(00000000,00000000,00004000,?,?,?,?,?,00401973), ref: 00401766
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FreeVirtual
                                        • String ID:
                                        • API String ID: 1263568516-0
                                        • Opcode ID: c75a05877fa6d12c6d50048bf692a8cb9b872a1b30c0c7aeae6369689fd3dcf9
                                        • Instruction ID: 191f0f4b7cd680364798b3dc381f6aadc2f07e0dbee61be3c45a65ffd8c3a871
                                        • Opcode Fuzzy Hash: c75a05877fa6d12c6d50048bf692a8cb9b872a1b30c0c7aeae6369689fd3dcf9
                                        • Instruction Fuzzy Hash: 9E01FC766442148FC3109E29DCC0E2677E8D794378F15453EDA85673A1D37A7C4187D8
                                        APIs
                                        • GetLastError.KERNEL32(00000000,00453771), ref: 00453753
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLast
                                        • String ID:
                                        • API String ID: 1452528299-0
                                        • Opcode ID: 23d18d59897e39bc4499862bac3fc6016057085f4d4fb8d535a9825dcce29caf
                                        • Instruction ID: c77a4f58350eb22b54b4dfaca8229fa0e9126d3262ef2898ea61e0989ca8d5dd
                                        • Opcode Fuzzy Hash: 23d18d59897e39bc4499862bac3fc6016057085f4d4fb8d535a9825dcce29caf
                                        • Instruction Fuzzy Hash: 24014CB5A042046B8701DF69A8114AEFBE8DB4D3617208277FC64D3342D7345E059764
                                        APIs
                                        • LocalAlloc.KERNEL32(00000000,00000644,?,0049D450,004013A3,?,?,00401443,?,?,?,?,?,00401983), ref: 00401353
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AllocLocal
                                        • String ID:
                                        • API String ID: 3494564517-0
                                        • Opcode ID: 78b51a20f87013a2b8d738b98d0019fb6e38c968b046018860c7d69c9a759dbb
                                        • Instruction ID: 3837c305931925427e5917c24a6cbe5f1a74ecb476a9df88ea36e45ee8dad041
                                        • Opcode Fuzzy Hash: 78b51a20f87013a2b8d738b98d0019fb6e38c968b046018860c7d69c9a759dbb
                                        • Instruction Fuzzy Hash: 0CF05E71B012018FE724CF29D880656B7E1EBA9365F20807EE5C5D7760D3359C418B54
                                        APIs
                                        • GetVersion.KERNEL32(?,00419440,00000000,?,?,?,00000001), ref: 0041F576
                                        • SetErrorMode.KERNEL32(00008000,?,00419440,00000000,?,?,?,00000001), ref: 0041F592
                                        • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419440,00000000,?,?,?,00000001), ref: 0041F59E
                                        • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419440,00000000,?,?,?,00000001), ref: 0041F5AC
                                        • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F5DC
                                        • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F605
                                        • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F61A
                                        • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F62F
                                        • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F644
                                        • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F659
                                        • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F66E
                                        • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F683
                                        • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F698
                                        • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F6AD
                                        • FreeLibrary.KERNEL32(00000001,?,00419440,00000000,?,?,?,00000001), ref: 0041F6BF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                        • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                        • API String ID: 2323315520-3614243559
                                        • Opcode ID: 7f93fe397e684a103bce9d62382bab99a389729839f73a4ae53f62d0e5e878ce
                                        • Instruction ID: 05ddd3b6a7babc3b5f2b58818bfec20f43c940fb7309246182468bed43dc01b1
                                        • Opcode Fuzzy Hash: 7f93fe397e684a103bce9d62382bab99a389729839f73a4ae53f62d0e5e878ce
                                        • Instruction Fuzzy Hash: C93104B1A00604BBD710EF75BD46A6933A4F728B28B59093BB148D71A2E77C9C468F5C
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00458E2B
                                        • QueryPerformanceCounter.KERNEL32(00000000,00000000,004590BE,?,?,00000000,00000000,?,004597BA,?,00000000,00000000), ref: 00458E34
                                        • GetSystemTimeAsFileTime.KERNEL32(00000000,00000000), ref: 00458E3E
                                        • GetCurrentProcessId.KERNEL32(?,00000000,00000000,004590BE,?,?,00000000,00000000,?,004597BA,?,00000000,00000000), ref: 00458E47
                                        • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00458EBD
                                        • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,00000000,00000000), ref: 00458ECB
                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,0049BB24,00000003,00000000,00000000,00000000,0045907A), ref: 00458F13
                                        • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00459069,?,00000000,C0000000,00000000,0049BB24,00000003,00000000,00000000,00000000,0045907A), ref: 00458F4C
                                          • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                        • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458FF5
                                        • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 0045902B
                                        • CloseHandle.KERNEL32(000000FF,00459070,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00459063
                                          • Part of subcall function 00453C04: GetLastError.KERNEL32(00000000,00454799,00000005,00000000,004547CE,?,?,00000000,0049D62C,00000004,00000000,00000000,00000000,?,00499C8D,00000000), ref: 00453C07
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                        • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                        • API String ID: 770386003-3271284199
                                        • Opcode ID: 588258891636d6961f6f973a73ca3d63e7b3c2cb37b3ea655e6ca71426862519
                                        • Instruction ID: c4bf9a6304175502231bb311a6f33329fdfd9ee29416440b986483e0f2b1c780
                                        • Opcode Fuzzy Hash: 588258891636d6961f6f973a73ca3d63e7b3c2cb37b3ea655e6ca71426862519
                                        • Instruction Fuzzy Hash: 9071F270A00654DADB10DF65CC46B9E7BF8EB05705F1045AAF908FB282DB785D448F69
                                        APIs
                                          • Part of subcall function 004795B8: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,021579E0,?,?,?,021579E0,0047977C,00000000,0047989A,?,?,?,?), ref: 004795D1
                                          • Part of subcall function 004795B8: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004795D7
                                          • Part of subcall function 004795B8: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,021579E0,?,?,?,021579E0,0047977C,00000000,0047989A,?,?,?,?), ref: 004795EA
                                          • Part of subcall function 004795B8: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,021579E0,?,?,?,021579E0), ref: 00479614
                                          • Part of subcall function 004795B8: CloseHandle.KERNEL32(00000000,?,?,?,021579E0,0047977C,00000000,0047989A,?,?,?,?), ref: 00479632
                                          • Part of subcall function 00479690: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,00479722,?,?,?,021579E0,?,00479784,00000000,0047989A,?,?,?,?), ref: 004796C0
                                        • ShellExecuteEx.SHELL32(0000003C), ref: 004797D4
                                        • GetLastError.KERNEL32(00000000,0047989A,?,?,?,?), ref: 004797DD
                                        • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 0047982A
                                        • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 0047984E
                                        • CloseHandle.KERNEL32(00000000,0047987F,00000000,00000000,000000FF,000000FF,00000000,00479878,?,00000000,0047989A,?,?,?,?), ref: 00479872
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                        • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                        • API String ID: 883996979-221126205
                                        • Opcode ID: f75691c6988614191e08cddca8c11734c2160cae10b5dfc7f4e0ecb506ded385
                                        • Instruction ID: ef977962423105e2be3f30a06cf623b0e2f7e3d3d4ebd630472f9d2e264b432c
                                        • Opcode Fuzzy Hash: f75691c6988614191e08cddca8c11734c2160cae10b5dfc7f4e0ecb506ded385
                                        • Instruction Fuzzy Hash: 35314471910204AADB10FFAA88416DEBAB8EF45314F51857FF518F7281D77C8D058B1A
                                        APIs
                                        • IsIconic.USER32(?), ref: 004187E3
                                        • GetWindowPlacement.USER32(?,0000002C), ref: 00418800
                                        • GetWindowRect.USER32(?), ref: 0041881C
                                        • GetWindowLongA.USER32(?,000000F0), ref: 0041882A
                                        • GetWindowLongA.USER32(?,000000F8), ref: 0041883F
                                        • ScreenToClient.USER32(00000000), ref: 00418848
                                        • ScreenToClient.USER32(00000000,?), ref: 00418853
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$ClientLongScreen$IconicPlacementRect
                                        • String ID: ,
                                        • API String ID: 2266315723-3772416878
                                        • Opcode ID: b787cf8406b328f9ec3a8af6233a206f78ef01905e488829e8331a9627355685
                                        • Instruction ID: c8128d77bd0d7ceb2c04d713c679bf83e48da9b619e6265fa23865d78167b210
                                        • Opcode Fuzzy Hash: b787cf8406b328f9ec3a8af6233a206f78ef01905e488829e8331a9627355685
                                        • Instruction Fuzzy Hash: 1B111971505201ABDB00EF69C885E9B77E8AF48314F140A7EB958DB286C738D900CB65
                                        APIs
                                        • IsIconic.USER32(?), ref: 0042F744
                                        • GetWindowLongA.USER32(?,000000F0), ref: 0042F758
                                        • GetWindowLongA.USER32(?,000000EC), ref: 0042F76F
                                        • GetActiveWindow.USER32 ref: 0042F778
                                        • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F7A5
                                        • SetActiveWindow.USER32(?,0042F8D5,00000000,?), ref: 0042F7C6
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$ActiveLong$IconicMessage
                                        • String ID:
                                        • API String ID: 1633107849-0
                                        • Opcode ID: 49306f5a5aea126db747c93f7e274e0cd8a3885b454e69ee071c1ce4e6e90790
                                        • Instruction ID: 4c2db8bb30fa69d0e852579bfabd785c91e73d104037fd1269e13a33cc275b58
                                        • Opcode Fuzzy Hash: 49306f5a5aea126db747c93f7e274e0cd8a3885b454e69ee071c1ce4e6e90790
                                        • Instruction Fuzzy Hash: 0D31B170A00654AFDB01EFB5DC52D6EBBF8EB09704B9244BBF804E7291D6389D04CB18
                                        APIs
                                        • GetCurrentProcess.KERNEL32(00000028), ref: 00455D8F
                                        • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00455D95
                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00455DAE
                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455DD5
                                        • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455DDA
                                        • ExitWindowsEx.USER32(00000002,00000000), ref: 00455DEB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                        • String ID: SeShutdownPrivilege
                                        • API String ID: 107509674-3733053543
                                        • Opcode ID: 082306ff38d6c760ea0c9f1032eabff53d8a831f0171a5046667534f49f86738
                                        • Instruction ID: 02e3d1fa5e569da00b44776faf89310fbaa28c239a726f1a6525e170f6cce7ee
                                        • Opcode Fuzzy Hash: 082306ff38d6c760ea0c9f1032eabff53d8a831f0171a5046667534f49f86738
                                        • Instruction Fuzzy Hash: 55F06871294B02BAE650A6718C1BF7B21A8DB40749F50892ABD41EA1C3D7BDD40C8A7A
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00499ACA,?,?,00000000,0049D62C,?,00499C54,00000000,00499CA8,?,?,00000000,0049D62C), ref: 004999E3
                                        • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 00499A66
                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00499AA2,?,00000000,?,00000000,00499ACA,?,?,00000000,0049D62C,?,00499C54,00000000), ref: 00499A7E
                                        • FindClose.KERNEL32(000000FF,00499AA9,00499AA2,?,00000000,?,00000000,00499ACA,?,?,00000000,0049D62C,?,00499C54,00000000,00499CA8), ref: 00499A9C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FileFind$AttributesCloseFirstNext
                                        • String ID: isRS-$isRS-???.tmp
                                        • API String ID: 134685335-3422211394
                                        • Opcode ID: cfb3a4e8891647e25ddb47f72537cfc9ca7752bf6e817f453b672b1491ac9f16
                                        • Instruction ID: e7bbbac40fef3dfc3cc8058b31a588cc53a4b1370f1491e53b11de7997221e0f
                                        • Opcode Fuzzy Hash: cfb3a4e8891647e25ddb47f72537cfc9ca7752bf6e817f453b672b1491ac9f16
                                        • Instruction Fuzzy Hash: 98318871A015586FDF10EF66CC41ADEBBBCDB45304F5184BBA808A32A1DA389F45CE58
                                        APIs
                                        • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457E0D
                                        • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457E34
                                        • SetForegroundWindow.USER32(?), ref: 00457E45
                                        • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,0045811D,?,00000000,00458159), ref: 00458108
                                        Strings
                                        • Cannot evaluate variable because [Code] isn't running yet, xrefs: 00457F88
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: MessagePostWindow$ForegroundNtdllProc_
                                        • String ID: Cannot evaluate variable because [Code] isn't running yet
                                        • API String ID: 2236967946-3182603685
                                        • Opcode ID: 1bafb29eaa387cf621c65735d6d6e09d1b320a36b208eca102bc359f3f595fb9
                                        • Instruction ID: fc8679ff921622e129be82b5c7b8b9d6156041410e322bf9d6052ebf871bd799
                                        • Opcode Fuzzy Hash: 1bafb29eaa387cf621c65735d6d6e09d1b320a36b208eca102bc359f3f595fb9
                                        • Instruction Fuzzy Hash: E8911234604204DFDB15CF55D952F1ABBF9EB88700F2180BAED04AB792CB79AE05CB58
                                        APIs
                                        • IsIconic.USER32(?), ref: 0041815F
                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 0041817D
                                        • GetWindowPlacement.USER32(?,0000002C), ref: 004181B3
                                        • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 004181DA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$Placement$Iconic
                                        • String ID: ,
                                        • API String ID: 568898626-3772416878
                                        • Opcode ID: 3939ae1d6e1c590614f47c3d4bcf148a2532e1c37498b01d3d2c2056b4d5783c
                                        • Instruction ID: 655d5dfc889397085a04c255a013ff48624dbcd9c32011b5bbe491b24769000a
                                        • Opcode Fuzzy Hash: 3939ae1d6e1c590614f47c3d4bcf148a2532e1c37498b01d3d2c2056b4d5783c
                                        • Instruction Fuzzy Hash: 3C211D72600204ABDF00EF69CCC1ADA77E8AF49314F55456AFD18DF246CB78D9458BA8
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001,00000000,00464A8D), ref: 00464901
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00464A60,?,00000001,00000000,00464A8D), ref: 00464990
                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00464A42,?,00000000,?,00000000,00464A60,?,00000001,00000000,00464A8D), ref: 00464A22
                                        • FindClose.KERNEL32(000000FF,00464A49,00464A42,?,00000000,?,00000000,00464A60,?,00000001,00000000,00464A8D), ref: 00464A3C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Find$File$CloseErrorFirstModeNext
                                        • String ID:
                                        • API String ID: 4011626565-0
                                        • Opcode ID: ecc694449efe8ee83bfae755dd805d638537151d1d8e40a4bbd8c6577bf73ccd
                                        • Instruction ID: ae00aa0afc7aa582470d59ca75ba9400823c3a1943f8949d3747a5def8a0c8eb
                                        • Opcode Fuzzy Hash: ecc694449efe8ee83bfae755dd805d638537151d1d8e40a4bbd8c6577bf73ccd
                                        • Instruction Fuzzy Hash: B541C570A00658AFDF11EFA5DC45ADEB7B8EB89305F4044BAF404E7381E63C9E488E19
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001,00000000,00464F33), ref: 00464DC1
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00464EFE,?,00000001,00000000,00464F33), ref: 00464E07
                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00464EE0,?,00000000,?,00000000,00464EFE,?,00000001,00000000,00464F33), ref: 00464EBC
                                        • FindClose.KERNEL32(000000FF,00464EE7,00464EE0,?,00000000,?,00000000,00464EFE,?,00000001,00000000,00464F33), ref: 00464EDA
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Find$File$CloseErrorFirstModeNext
                                        • String ID:
                                        • API String ID: 4011626565-0
                                        • Opcode ID: 42490d7e0f8b90401ef2b5897176ab16b990b317db0059791a95fa77735b0182
                                        • Instruction ID: 8e27f6cc4c7e55bed8f6d5ebd72a4c3c722eac7afebeb0f1b00dc6af3d7f2fe3
                                        • Opcode Fuzzy Hash: 42490d7e0f8b90401ef2b5897176ab16b990b317db0059791a95fa77735b0182
                                        • Instruction Fuzzy Hash: 31416535A006589FCB11EFA5CD859DEB7B9FBC8305F5044AAF804E7341EB389E448E59
                                        APIs
                                        • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00453683,00000000,004536A4), ref: 0042EDA6
                                        • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042EDD1
                                        • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00453683,00000000,004536A4), ref: 0042EDDE
                                        • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00453683,00000000,004536A4), ref: 0042EDE6
                                        • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00453683,00000000,004536A4), ref: 0042EDEC
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                        • String ID:
                                        • API String ID: 1177325624-0
                                        • Opcode ID: 060edd20a8b9ef3e5187fa71c6153c8dffa7266a06f07a40ca48e996766aa3cd
                                        • Instruction ID: d5f14a2582f403684e4f7b299b1070748df424b87161b08669007267f0031b9d
                                        • Opcode Fuzzy Hash: 060edd20a8b9ef3e5187fa71c6153c8dffa7266a06f07a40ca48e996766aa3cd
                                        • Instruction Fuzzy Hash: 21F0F0723A07203AF620B17A6C82F7F018CC784B68F10423AF704FF1D1D9A84D0515AD
                                        APIs
                                        • IsIconic.USER32(?), ref: 00484D66
                                        • GetWindowLongA.USER32(00000000,000000F0), ref: 00484D84
                                        • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049E0AC,00484242,00484276,00000000,00484296,?,?,?,0049E0AC), ref: 00484DA6
                                        • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049E0AC,00484242,00484276,00000000,00484296,?,?,?,0049E0AC), ref: 00484DBA
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$Show$IconicLong
                                        • String ID:
                                        • API String ID: 2754861897-0
                                        • Opcode ID: 6d02ab3679acd20c13477f6129401e215db0be7c9c4dcc708735b62ecc99512f
                                        • Instruction ID: c453c85064c149f2f8de5328ae0569b6634ad2f96c4c2f1b45344ef68f201c80
                                        • Opcode Fuzzy Hash: 6d02ab3679acd20c13477f6129401e215db0be7c9c4dcc708735b62ecc99512f
                                        • Instruction Fuzzy Hash: 3D015E706002129EDB10FB769D89B9A22D95B50344F19083FB8449B2E2CB7C9841975C
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00463418), ref: 0046339C
                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,004633F8,?,00000000,?,00000000,00463418), ref: 004633D8
                                        • FindClose.KERNEL32(000000FF,004633FF,004633F8,?,00000000,?,00000000,00463418), ref: 004633F2
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Find$File$CloseFirstNext
                                        • String ID:
                                        • API String ID: 3541575487-0
                                        • Opcode ID: a3f6158ced67ec73cb67a532b72ad96bc9113b626d4d7b4c1370e1b046e46ec6
                                        • Instruction ID: 0500e82312f9f08261d57c94a6d9b1f58695be5d4d7593f033a5dbf80f84d4fc
                                        • Opcode Fuzzy Hash: a3f6158ced67ec73cb67a532b72ad96bc9113b626d4d7b4c1370e1b046e46ec6
                                        • Instruction Fuzzy Hash: 1421DB315046886FDB11DF66CC41ADEB7ACDB49305F5084F7B808D3251EA389F44C959
                                        APIs
                                        • IsIconic.USER32(?), ref: 00424634
                                        • SetActiveWindow.USER32(?,?,?,?,0046DA13), ref: 00424641
                                          • Part of subcall function 00423A9C: ShowWindow.USER32(004108B0,00000009,?,00000000,0041F1F4,00423D8A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042405C), ref: 00423AB7
                                          • Part of subcall function 00423F64: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021525AC,0042465A,?,?,?,?,0046DA13), ref: 00423F9F
                                        • SetFocus.USER32(00000000,?,?,?,?,0046DA13), ref: 0042466E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$ActiveFocusIconicShow
                                        • String ID:
                                        • API String ID: 649377781-0
                                        • Opcode ID: f6b17c850702daf3fe2f22264f5d8e983b40a127641bef431db8629b7e0b9e45
                                        • Instruction ID: 5ae1608fbac1b61a262bbd8080f57afdf1b64e8a1d97d82fcb33e84f02d7d1dc
                                        • Opcode Fuzzy Hash: f6b17c850702daf3fe2f22264f5d8e983b40a127641bef431db8629b7e0b9e45
                                        • Instruction Fuzzy Hash: DBF0D07170122187CB00BFA9D9C5A9633A8AF48714B56407BBD09DF25BC67CDC458768
                                        APIs
                                        • InitializeSecurityDescriptor.ADVAPI32(00000001,00000001), ref: 0042F261
                                        • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000,00000001,00000001), ref: 0042F271
                                        • CreateMutexA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0042F299
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: DescriptorSecurity$CreateDaclInitializeMutex
                                        • String ID:
                                        • API String ID: 3525989157-0
                                        • Opcode ID: 296a65e85b4cf530d2912259c248fa0dd98adb1b483a3bccc15e2a953cf47158
                                        • Instruction ID: b330794617a7040f76ad0da05c7b1ee5a1856395dd3e8d048ce20caf316d4231
                                        • Opcode Fuzzy Hash: 296a65e85b4cf530d2912259c248fa0dd98adb1b483a3bccc15e2a953cf47158
                                        • Instruction Fuzzy Hash: 18E0C0B16443007EE200EE758C82F5F76DCDB48714F00483AB654DB1C1E679D9489B96
                                        APIs
                                        • IsIconic.USER32(?), ref: 0041815F
                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 0041817D
                                        • GetWindowPlacement.USER32(?,0000002C), ref: 004181B3
                                        • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 004181DA
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$Placement$Iconic
                                        • String ID:
                                        • API String ID: 568898626-0
                                        • Opcode ID: add44dc6c1a8246b0274be2cc60e43faf0e8d0d1d4c3491e9dc610c53a27efe0
                                        • Instruction ID: b17f17ea660f77e7302433a0225cb82371cce2f83056bcd31e3690383aca5fbc
                                        • Opcode Fuzzy Hash: add44dc6c1a8246b0274be2cc60e43faf0e8d0d1d4c3491e9dc610c53a27efe0
                                        • Instruction Fuzzy Hash: E5012C72300104BBDF10EE69CCC1EEB7798AB55364F55416AFD18DF242DA38ED8287A8
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CaptureIconic
                                        • String ID:
                                        • API String ID: 2277910766-0
                                        • Opcode ID: 373e0a40ab0d4ea76f69d1688ff4f953920e4e837af208d8a25afaf4faa000c4
                                        • Instruction ID: c42435c704d87005acf5b6d7044dd68bff31d3bfeee1bac994fdbb5906758c2c
                                        • Opcode Fuzzy Hash: 373e0a40ab0d4ea76f69d1688ff4f953920e4e837af208d8a25afaf4faa000c4
                                        • Instruction Fuzzy Hash: 79F049313446014BD720A72DC889AAF62F99F84394B1C643BE41AC7756EB7DDDC48758
                                        APIs
                                        • IsIconic.USER32(?), ref: 004245EB
                                          • Part of subcall function 00423ED4: EnumWindows.USER32(00423E6C), ref: 00423EF8
                                          • Part of subcall function 00423ED4: GetWindow.USER32(?,00000003), ref: 00423F0D
                                          • Part of subcall function 00423ED4: GetWindowLongA.USER32(?,000000EC), ref: 00423F1C
                                          • Part of subcall function 00423ED4: SetWindowPos.USER32(00000000,004245AC,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004245FB,?,?,004241C3), ref: 00423F52
                                        • SetActiveWindow.USER32(?,?,?,004241C3,00000000,004245AC), ref: 004245FF
                                          • Part of subcall function 00423A9C: ShowWindow.USER32(004108B0,00000009,?,00000000,0041F1F4,00423D8A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042405C), ref: 00423AB7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$ActiveEnumIconicLongShowWindows
                                        • String ID:
                                        • API String ID: 2671590913-0
                                        • Opcode ID: 1a354955b864757cfaa5613f9b306845f8d366a619694d2750710a135c8cdae9
                                        • Instruction ID: 0eb0e95855424de6865fa4d756a676c77cd5728601e575884a8a50090c80911a
                                        • Opcode Fuzzy Hash: 1a354955b864757cfaa5613f9b306845f8d366a619694d2750710a135c8cdae9
                                        • Instruction Fuzzy Hash: 3BE01A6070010187DB00EFAAE8C4B8622A8BF88305F55017ABC08CF24BDA3CDC048728
                                        APIs
                                        • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,00412C25), ref: 00412C13
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: NtdllProc_Window
                                        • String ID:
                                        • API String ID: 4255912815-0
                                        • Opcode ID: de892e97fbd68e1bb7582f7974717f862a539d23c567f166e41cd9819a8f42aa
                                        • Instruction ID: cdfe5c129d614e166dcfab814c58775b37bd24f4e82d9105b90a581207f53ed6
                                        • Opcode Fuzzy Hash: de892e97fbd68e1bb7582f7974717f862a539d23c567f166e41cd9819a8f42aa
                                        • Instruction Fuzzy Hash: 0451C2316082058FC720DF6AD781A9AF3E5EF98304B2086ABD904C7351EAB9ED91C74D
                                        APIs
                                        • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00479E56
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: NtdllProc_Window
                                        • String ID:
                                        • API String ID: 4255912815-0
                                        • Opcode ID: 462738d441aef1136b86fc8094aec41bc4a49bb6b5bf6afc55cbfc6645c50547
                                        • Instruction ID: 77384fbc8b33c5310ab19163c687e45bac72601044cd1e9f95c219b02d082465
                                        • Opcode Fuzzy Hash: 462738d441aef1136b86fc8094aec41bc4a49bb6b5bf6afc55cbfc6645c50547
                                        • Instruction Fuzzy Hash: 71414A75604105EFCB20CF99C6808AAB7F5EB48310B74C9A6E849DB745D338EE41DB94
                                        APIs
                                        • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F9DC
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: NtdllProc_Window
                                        • String ID:
                                        • API String ID: 4255912815-0
                                        • Opcode ID: 2621fde08b5d071fc730d3c03362a0ac5d2de45ee12ad7e5c10e42539110ff87
                                        • Instruction ID: 416a4692ed3cb8c0a12f59f0b22837e163b9cfd3c66ebd18f18690eb3ad7abe4
                                        • Opcode Fuzzy Hash: 2621fde08b5d071fc730d3c03362a0ac5d2de45ee12ad7e5c10e42539110ff87
                                        • Instruction Fuzzy Hash: 07D0A7B220010C7FDB00DE98D840D6B33BC9B8C700B90C826F945C7241D234EDA0CBB8
                                        APIs
                                          • Part of subcall function 0044BAA4: GetVersionExA.KERNEL32(00000094), ref: 0044BAC1
                                          • Part of subcall function 0044BAF8: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0044BB10
                                        • LoadLibraryA.KERNEL32(00000000,00000000,0044BF0B,?,?,?,?,00000000,00000000,?,0044FD4D,0049A4DA), ref: 0044BB8A
                                        • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044BBA2
                                        • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044BBB4
                                        • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044BBC6
                                        • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044BBD8
                                        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044BBEA
                                        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044BBFC
                                        • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044BC0E
                                        • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044BC20
                                        • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044BC32
                                        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044BC44
                                        • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044BC56
                                        • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044BC68
                                        • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044BC7A
                                        • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044BC8C
                                        • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044BC9E
                                        • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044BCB0
                                        • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044BCC2
                                        • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044BCD4
                                        • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044BCE6
                                        • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044BCF8
                                        • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044BD0A
                                        • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044BD1C
                                        • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044BD2E
                                        • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044BD40
                                        • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044BD52
                                        • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044BD64
                                        • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044BD76
                                        • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044BD88
                                        • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044BD9A
                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044BDAC
                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044BDBE
                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044BDD0
                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044BDE2
                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044BDF4
                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044BE06
                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044BE18
                                        • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044BE2A
                                        • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044BE3C
                                        • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044BE4E
                                        • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044BE60
                                        • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044BE72
                                        • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044BE84
                                        • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044BE96
                                        • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044BEA8
                                        • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044BEBA
                                        • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044BECC
                                        • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044BEDE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc$DirectoryLibraryLoadSystemVersion
                                        • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                        • API String ID: 2754715182-2910565190
                                        • Opcode ID: 2001b9481bd4323523c3a6d9ee5d3feebd5ce703d364f315cb0e33d3a930df2d
                                        • Instruction ID: 345b4916510d3cb7c096cba84ec2b1d1bd9d6ff2ab3c947e91cb1c242a843473
                                        • Opcode Fuzzy Hash: 2001b9481bd4323523c3a6d9ee5d3feebd5ce703d364f315cb0e33d3a930df2d
                                        • Instruction Fuzzy Hash: 49A16AB0A41A50EBEB00EFF5DC86A2A37A8EB15B14B1405BBB444EF295D678DC048F5D
                                        APIs
                                        • Sleep.KERNEL32(00000000,00000000,004944E1,?,?,?,?,00000000,00000000,00000000), ref: 0049402C
                                        • FindWindowA.USER32(00000000,00000000), ref: 0049405D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FindSleepWindow
                                        • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                        • API String ID: 3078808852-3310373309
                                        • Opcode ID: 834d3c12a7b8cb1b7f9a51084d0e5a3396d1cd2c1371b045a5ef52030d7eb881
                                        • Instruction ID: aaf63752e06fee66a7d05b71673dc8e7902340e663ecb0da5339ca9489632561
                                        • Opcode Fuzzy Hash: 834d3c12a7b8cb1b7f9a51084d0e5a3396d1cd2c1371b045a5ef52030d7eb881
                                        • Instruction Fuzzy Hash: 7EC14060B0421027DB14FB7ACC4692E5A999BD4704750CA3FB40AEB78BDE3CDC0B4799
                                        APIs
                                        • GetDC.USER32(00000000), ref: 0041CE90
                                        • CreateCompatibleDC.GDI32(?), ref: 0041CE9C
                                        • CreateBitmap.GDI32(0041AD94,?,00000001,00000001,00000000), ref: 0041CEC0
                                        • CreateCompatibleBitmap.GDI32(?,0041AD94,?), ref: 0041CED0
                                        • SelectObject.GDI32(0041D28C,00000000), ref: 0041CEEB
                                        • FillRect.USER32(0041D28C,?,?), ref: 0041CF26
                                        • SetTextColor.GDI32(0041D28C,00000000), ref: 0041CF3B
                                        • SetBkColor.GDI32(0041D28C,00000000), ref: 0041CF52
                                        • PatBlt.GDI32(0041D28C,00000000,00000000,0041AD94,?,00FF0062), ref: 0041CF68
                                        • CreateCompatibleDC.GDI32(?), ref: 0041CF7B
                                        • SelectObject.GDI32(00000000,00000000), ref: 0041CFAC
                                        • SelectPalette.GDI32(00000000,00000000,00000001), ref: 0041CFC4
                                        • RealizePalette.GDI32(00000000), ref: 0041CFCD
                                        • SelectPalette.GDI32(0041D28C,00000000,00000001), ref: 0041CFDC
                                        • RealizePalette.GDI32(0041D28C), ref: 0041CFE5
                                        • SetTextColor.GDI32(00000000,00000000), ref: 0041CFFE
                                        • SetBkColor.GDI32(00000000,00000000), ref: 0041D015
                                        • BitBlt.GDI32(0041D28C,00000000,00000000,0041AD94,?,00000000,00000000,00000000,00CC0020), ref: 0041D031
                                        • SelectObject.GDI32(00000000,?), ref: 0041D03E
                                        • DeleteDC.GDI32(00000000), ref: 0041D054
                                          • Part of subcall function 0041A4A8: GetSysColor.USER32(?), ref: 0041A4B2
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ColorSelect$CreatePalette$CompatibleObject$BitmapRealizeText$DeleteFillRect
                                        • String ID:
                                        • API String ID: 269503290-0
                                        • Opcode ID: 5e0ecd7f746a94368510dc98cd5b3d13ae19e4ca4739b00519ae71ef4424a664
                                        • Instruction ID: f3cd37e79d0242250547ce8a95e3067296a2558137ee74c5e82542f4c8f5946c
                                        • Opcode Fuzzy Hash: 5e0ecd7f746a94368510dc98cd5b3d13ae19e4ca4739b00519ae71ef4424a664
                                        • Instruction Fuzzy Hash: 6F61CD71A44604AFDB10EBE9DC46FAFB7B8EF48704F10446AF504E7281C67CA9418B69
                                        APIs
                                        • ShowWindow.USER32(?,00000005,00000000,0049A050,?,?,00000000,?,00000000,00000000,?,0049A407,00000000,0049A411,?,00000000), ref: 00499D3B
                                        • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,0049A050,?,?,00000000,?,00000000,00000000,?,0049A407,00000000), ref: 00499D4E
                                        • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,0049A050,?,?,00000000,?,00000000,00000000), ref: 00499D5E
                                        • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00499D7F
                                        • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,0049A050,?,?,00000000,?,00000000), ref: 00499D8F
                                          • Part of subcall function 0042D89C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D92A,?,?,?,00000001,?,0045681A,00000000,00456882), ref: 0042D8D1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                        • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                        • API String ID: 2000705611-3672972446
                                        • Opcode ID: 925e690ebd037e7923dbbcefbad47493d482e32af6c3f83e886948a8d640b5b4
                                        • Instruction ID: 24b702ce4587ab849973673670b37801b9677cadbfb3bf4f1077f7c12e9ac28d
                                        • Opcode Fuzzy Hash: 925e690ebd037e7923dbbcefbad47493d482e32af6c3f83e886948a8d640b5b4
                                        • Instruction Fuzzy Hash: 5591C430A04205AFDF11EF69C852BAEBBB4EB49304F51447AF500AB792C63DAC05CB6D
                                        APIs
                                        • GetLastError.KERNEL32(00000000,0045B190,?,?,?,?,?,00000006,?,00000000,00499145,?,00000000,004991E8), ref: 0045B042
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLast
                                        • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                        • API String ID: 1452528299-3112430753
                                        • Opcode ID: c6f54f5b50df562880ca518316ccafa31a629e74388fdf67c77d9c44612f3ce0
                                        • Instruction ID: 1722664f16d817fc675012576ec738190a07adef69c32437d7057340c1fc2b4b
                                        • Opcode Fuzzy Hash: c6f54f5b50df562880ca518316ccafa31a629e74388fdf67c77d9c44612f3ce0
                                        • Instruction Fuzzy Hash: 3271AE307006445BDB01EB6A88927AE7BA5EF49755F50846BFC01EB383CB7C8E49879D
                                        APIs
                                        • GetVersion.KERNEL32 ref: 0045D3D6
                                        • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045D3F6
                                        • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045D403
                                        • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045D410
                                        • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045D41E
                                          • Part of subcall function 0045D2C4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045D363,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045D33D
                                        • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D611,?,?,00000000), ref: 0045D4D7
                                        • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D611,?,?,00000000), ref: 0045D4E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                        • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                        • API String ID: 59345061-4263478283
                                        • Opcode ID: 0336fb35fd749793045182d1361f828010284629c3cee937cf748adbc12729e9
                                        • Instruction ID: 1fdbc06bdf38f6500452038ca5d2f44928d617c4984e35671f0aa61f53d98d16
                                        • Opcode Fuzzy Hash: 0336fb35fd749793045182d1361f828010284629c3cee937cf748adbc12729e9
                                        • Instruction Fuzzy Hash: D35183B1D00208EFDB20DF99C841BAEB7B8EF49315F14806AF904B7382D6789945CF69
                                        APIs
                                        • CreateCompatibleDC.GDI32(00000000), ref: 0041B813
                                        • CreateCompatibleDC.GDI32(00000000), ref: 0041B81D
                                        • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B82F
                                        • CreateBitmap.GDI32(0000000B,?,00000001,00000001,00000000), ref: 0041B846
                                        • GetDC.USER32(00000000), ref: 0041B852
                                        • CreateCompatibleBitmap.GDI32(00000000,0000000B,?), ref: 0041B87F
                                        • ReleaseDC.USER32(00000000,00000000), ref: 0041B8A5
                                        • SelectObject.GDI32(00000000,?), ref: 0041B8C0
                                        • SelectObject.GDI32(?,00000000), ref: 0041B8CF
                                        • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B8FB
                                        • SelectObject.GDI32(00000000,00000000), ref: 0041B909
                                        • SelectObject.GDI32(?,00000000), ref: 0041B917
                                        • DeleteDC.GDI32(00000000), ref: 0041B920
                                        • DeleteDC.GDI32(?), ref: 0041B929
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
                                        • String ID:
                                        • API String ID: 644427674-0
                                        • Opcode ID: 545e798d89bfd874ee53134500b0446245b84f374f10eb2ff5fc30c629433f8f
                                        • Instruction ID: 5456327a1e321ce8c2b8187df1c916a831ebe275c46a8a968a344784d91ca00b
                                        • Opcode Fuzzy Hash: 545e798d89bfd874ee53134500b0446245b84f374f10eb2ff5fc30c629433f8f
                                        • Instruction Fuzzy Hash: FC419F71E44609ABDB10EAE9C845FEFB7BCEB08704F104466F614F7281D7786D418BA8
                                        APIs
                                          • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                                        • RegQueryValueExA.ADVAPI32(0045B366,00000000,00000000,?,00000000,?,00000000,00455275,?,0045B366,00000003,00000000,00000000,004552AC), ref: 004550F5
                                          • Part of subcall function 0042ED18: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004539D7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042ED37
                                        • RegQueryValueExA.ADVAPI32(0045B366,00000000,00000000,00000000,?,00000004,00000000,004551BF,?,0045B366,00000000,00000000,?,00000000,?,00000000), ref: 00455179
                                        • RegQueryValueExA.ADVAPI32(0045B366,00000000,00000000,00000000,?,00000004,00000000,004551BF,?,0045B366,00000000,00000000,?,00000000,?,00000000), ref: 004551A8
                                        Strings
                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045504C
                                        • RegOpenKeyEx, xrefs: 00455078
                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00455013
                                        • , xrefs: 00455066
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: QueryValue$FormatMessageOpen
                                        • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                        • API String ID: 2812809588-1577016196
                                        • Opcode ID: 650b60b503d74eca58cf70ec9562748bdb23163610bc239b6f24371e85c1222d
                                        • Instruction ID: 06452bf81ef06fa34888f2ab1cc7b3841a1100f4c60e90cd60a05f06e497d7d6
                                        • Opcode Fuzzy Hash: 650b60b503d74eca58cf70ec9562748bdb23163610bc239b6f24371e85c1222d
                                        • Instruction Fuzzy Hash: E0913371D04608ABDB10DFA5C952BEEB7F8EB08305F50406BF904F7282D6799E088B69
                                        APIs
                                          • Part of subcall function 00459B60: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459C9D,00000000,00459E55,?,00000000,00000000,00000000), ref: 00459BAD
                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459E55,?,00000000,00000000,00000000), ref: 00459CFB
                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459E55,?,00000000,00000000,00000000), ref: 00459D65
                                          • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,00459E55,?,00000000,00000000,00000000), ref: 00459DCC
                                        Strings
                                        • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 00459D7F
                                        • .NET Framework version %s not found, xrefs: 00459E05
                                        • .NET Framework not found, xrefs: 00459E19
                                        • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 00459CAE
                                        • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 00459D18
                                        • v2.0.50727, xrefs: 00459D57
                                        • v4.0.30319, xrefs: 00459CED
                                        • v1.1.4322, xrefs: 00459DBE
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Close$Open
                                        • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                        • API String ID: 2976201327-446240816
                                        • Opcode ID: 8b9e0b07a6d71abb33b342f656cf4b7e33db3fac7b3c8c62fd281b3a753bfe81
                                        • Instruction ID: 13a12a4b366685baa8d6a2e304724611cbcec49206d2204e0959de5a5d6478e2
                                        • Opcode Fuzzy Hash: 8b9e0b07a6d71abb33b342f656cf4b7e33db3fac7b3c8c62fd281b3a753bfe81
                                        • Instruction Fuzzy Hash: 6451B235A04104EFCB04DB66D862BEE77BADB49305F1844BBA941D7382E7799E0D8B18
                                        APIs
                                        • CloseHandle.KERNEL32(?), ref: 00459277
                                        • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00459293
                                        • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 004592A1
                                        • GetExitCodeProcess.KERNEL32(?), ref: 004592B2
                                        • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 004592F9
                                        • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00459315
                                        Strings
                                        • Helper process exited, but failed to get exit code., xrefs: 004592EB
                                        • Helper process exited with failure code: 0x%x, xrefs: 004592DF
                                        • Helper process exited., xrefs: 004592C1
                                        • Helper isn't responding; killing it., xrefs: 00459283
                                        • Stopping 64-bit helper process. (PID: %u), xrefs: 00459269
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                        • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                        • API String ID: 3355656108-1243109208
                                        • Opcode ID: 230b5ddc3981dfca21d5636881bab7241834d3e40b9cb852e8f413207b64b114
                                        • Instruction ID: 475b633a8f1197f12a32b7740e8dffccf3703e2e74a756bc360da45c31bde27f
                                        • Opcode Fuzzy Hash: 230b5ddc3981dfca21d5636881bab7241834d3e40b9cb852e8f413207b64b114
                                        • Instruction Fuzzy Hash: 7B215C70604700EAC720EA7DC486B5B77D49F49305F048D2EB899DB693DA7CEC489B2A
                                        APIs
                                          • Part of subcall function 0042E234: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042E260
                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,00454E67,?,00000000,00454F2B), ref: 00454DB7
                                        • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,00454E67,?,00000000,00454F2B), ref: 00454EF3
                                          • Part of subcall function 0042ED18: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004539D7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042ED37
                                        Strings
                                        • RegCreateKeyEx, xrefs: 00454D2B
                                        • , xrefs: 00454D19
                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454CCF
                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454CFF
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseCreateFormatMessageQueryValue
                                        • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                        • API String ID: 2481121983-1280779767
                                        • Opcode ID: 2d07f13e4db519d4e9e36b01427add84eda95a74c7e6f0e57b2001e2f306a931
                                        • Instruction ID: 61cb1c98edcfe528623c145d9993427f2b00fea00e486b8f0244815ce8f04fab
                                        • Opcode Fuzzy Hash: 2d07f13e4db519d4e9e36b01427add84eda95a74c7e6f0e57b2001e2f306a931
                                        • Instruction Fuzzy Hash: 18810175900209ABDB01DFD5C942BDEB7B8FB49709F50442AF900FB282D7789A49CB69
                                        APIs
                                          • Part of subcall function 00454024: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00498709,_iu,?,00000000,0045415E), ref: 00454113
                                          • Part of subcall function 00454024: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00498709,_iu,?,00000000,0045415E), ref: 00454123
                                        • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 004985B5
                                        • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00498709), ref: 004985D6
                                        • CreateWindowExA.USER32(00000000,STATIC,00498718,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 004985FD
                                        • SetWindowLongA.USER32(?,000000FC,00497D90), ref: 00498610
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004986DC,?,?,000000FC,00497D90,00000000,STATIC,00498718), ref: 00498640
                                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004986B4
                                        • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004986DC,?,?,000000FC,00497D90,00000000), ref: 004986C0
                                          • Part of subcall function 00454498: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0045457F
                                        • DestroyWindow.USER32(?,004986E3,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004986DC,?,?,000000FC,00497D90,00000000,STATIC), ref: 004986D6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$File$CloseCreateHandle$AttributesCopyDestroyLongMultipleObjectsPrivateProfileStringWaitWrite
                                        • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                        • API String ID: 1549857992-2312673372
                                        • Opcode ID: 33f0aa1e6c66ba33127d106aa60bf689e86794d53dcbda2b1297c66d72ebb552
                                        • Instruction ID: 19a9ac76a87cbdbac9fefc72f4bc8d66673aab5a8439699f4ab81f25108c8d39
                                        • Opcode Fuzzy Hash: 33f0aa1e6c66ba33127d106aa60bf689e86794d53dcbda2b1297c66d72ebb552
                                        • Instruction Fuzzy Hash: 78414771A54204AFDF00EBA5CC42F9E7BF8EB09714F51457AF500FB291DA799E048B58
                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E96D,?,00000000,0047F9E0,00000000), ref: 0042E891
                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E897
                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E96D,?,00000000,0047F9E0,00000000), ref: 0042E8E5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressCloseHandleModuleProc
                                        • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll$hE
                                        • API String ID: 4190037839-2100363064
                                        • Opcode ID: 58c30dd9f85b062d47b06f98ac05074f4c591b85530fc523b77ad03276e46551
                                        • Instruction ID: 343416b7bfae85f45959abe8e21461bd4048f30ead5244c3b453dfa896624356
                                        • Opcode Fuzzy Hash: 58c30dd9f85b062d47b06f98ac05074f4c591b85530fc523b77ad03276e46551
                                        • Instruction Fuzzy Hash: 06214470B00229EBDB50EAA7DC42BAE77A8EB44314F904477A500E7281DB7C9E45DB1C
                                        APIs
                                        • GetActiveWindow.USER32 ref: 004635F0
                                        • GetModuleHandleA.KERNEL32(user32.dll), ref: 00463604
                                        • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00463611
                                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0046361E
                                        • GetWindowRect.USER32(?,00000000), ref: 0046366A
                                        • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 004636A8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$AddressProc$ActiveHandleModuleRect
                                        • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                        • API String ID: 2610873146-3407710046
                                        • Opcode ID: 5d54fb813e64eee8d2e1fd1d869d3f84fcc541412d8aec38238ce219d7c6ea2a
                                        • Instruction ID: 23225dc964baf5770c03b9449d190f9fd0809e25ab0c2f23061680c52a7637e8
                                        • Opcode Fuzzy Hash: 5d54fb813e64eee8d2e1fd1d869d3f84fcc541412d8aec38238ce219d7c6ea2a
                                        • Instruction Fuzzy Hash: AE21C2B17006446BD320EE68CC45F3B76D9EB84B05F09452EF944DB3C1EA78DD004B5A
                                        APIs
                                        • GetActiveWindow.USER32 ref: 0042F620
                                        • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F634
                                        • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F641
                                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F64E
                                        • GetWindowRect.USER32(?,00000000), ref: 0042F69A
                                        • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F6D8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$AddressProc$ActiveHandleModuleRect
                                        • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                        • API String ID: 2610873146-3407710046
                                        • Opcode ID: 9e18f176ca51f207d9f48e4ded0b32e3445f45e6b18c2f86467d84d44384674f
                                        • Instruction ID: 8e363f887434259cf3ecd6bfca6d9ac669349ab4594bae960fb014309ef79425
                                        • Opcode Fuzzy Hash: 9e18f176ca51f207d9f48e4ded0b32e3445f45e6b18c2f86467d84d44384674f
                                        • Instruction Fuzzy Hash: BC21C2B27006146FD600EA68DC85F3B72A9EB84704F89463AF944DB391DA78DC098B59
                                        APIs
                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,004595F7,?,00000000,0045965A,?,?,00000000,00000000), ref: 00459475
                                        • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,0045958C,?,00000000,00000001,00000000,00000000,00000000,004595F7), ref: 004594D2
                                        • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,0045958C,?,00000000,00000001,00000000,00000000,00000000,004595F7), ref: 004594DF
                                        • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 0045952B
                                        • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00459565,?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,0045958C,?,00000000), ref: 00459551
                                        • GetLastError.KERNEL32(?,?,00000000,00000001,00459565,?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,0045958C,?,00000000), ref: 00459558
                                          • Part of subcall function 00453C04: GetLastError.KERNEL32(00000000,00454799,00000005,00000000,004547CE,?,?,00000000,0049D62C,00000004,00000000,00000000,00000000,?,00499C8D,00000000), ref: 00453C07
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                        • String ID: CreateEvent$TransactNamedPipe
                                        • API String ID: 2182916169-3012584893
                                        • Opcode ID: 8c882674e4e7badbb1dce3e2dfa1fdcbe7e98f1f80990b5ca878147d0da0e0cb
                                        • Instruction ID: 77fbb71d8e7aac064b87aac98c1c55f9fcb2258c1561d492b861e589c0c855dd
                                        • Opcode Fuzzy Hash: 8c882674e4e7badbb1dce3e2dfa1fdcbe7e98f1f80990b5ca878147d0da0e0cb
                                        • Instruction Fuzzy Hash: CF418B71A00208FFDB11DF99C981F9EB7F9EB48710F5040AAF904E7282D6789E54CB68
                                        APIs
                                        • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00457621,?,?,00000031,?), ref: 004574E4
                                        • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 004574EA
                                        • LoadTypeLib.OLEAUT32(00000000,?), ref: 00457537
                                          • Part of subcall function 00453C04: GetLastError.KERNEL32(00000000,00454799,00000005,00000000,004547CE,?,?,00000000,0049D62C,00000004,00000000,00000000,00000000,?,00499C8D,00000000), ref: 00453C07
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressErrorHandleLastLoadModuleProcType
                                        • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                        • API String ID: 1914119943-2711329623
                                        • Opcode ID: b2a57cb5d0d4215bed9739cbf0b7be67a86da8044cbf193a82d044f72dd204c0
                                        • Instruction ID: 559faf3bdf9cccbe36ab56d48fd8e4aa4276a02661c60707683b87f46ce48c1c
                                        • Opcode Fuzzy Hash: b2a57cb5d0d4215bed9739cbf0b7be67a86da8044cbf193a82d044f72dd204c0
                                        • Instruction Fuzzy Hash: 8131B471A04604BFCB01EFAADC01D5FB7BEEB8975571044B6BD04D3652EA38DD04CA68
                                        APIs
                                        • RectVisible.GDI32(?,?), ref: 00417263
                                        • SaveDC.GDI32(?), ref: 00417277
                                        • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 0041729A
                                        • RestoreDC.GDI32(?,?), ref: 004172B5
                                        • CreateSolidBrush.GDI32(00000000), ref: 00417335
                                        • FrameRect.USER32(?,?,?), ref: 00417368
                                        • DeleteObject.GDI32(?), ref: 00417372
                                        • CreateSolidBrush.GDI32(00000000), ref: 00417382
                                        • FrameRect.USER32(?,?,?), ref: 004173B5
                                        • DeleteObject.GDI32(?), ref: 004173BF
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                        • String ID:
                                        • API String ID: 375863564-0
                                        • Opcode ID: 53338b723e60019b0e5d7787f83bb0eaf38aae583f1cfacba6e60a06ab1a3e99
                                        • Instruction ID: 6654575de22a121332528345891e4d9aada139d791074539051cb87a9fd886f5
                                        • Opcode Fuzzy Hash: 53338b723e60019b0e5d7787f83bb0eaf38aae583f1cfacba6e60a06ab1a3e99
                                        • Instruction Fuzzy Hash: 30515D712086455FDB50EF69C8C0B9B7BE8AF48314F1455AAFD588B286C738EC81CB99
                                        APIs
                                        • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                        • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                        • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                        • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                        • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                        • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                        • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                        • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                        • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                        • String ID:
                                        • API String ID: 1694776339-0
                                        • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                        • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                        • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                        • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                        APIs
                                        • GetSystemMenu.USER32(00000000,00000000), ref: 00422683
                                        • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 004226A1
                                        • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004226AE
                                        • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004226BB
                                        • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004226C8
                                        • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 004226D5
                                        • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 004226E2
                                        • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 004226EF
                                        • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 0042270D
                                        • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 00422729
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Menu$Delete$EnableItem$System
                                        • String ID:
                                        • API String ID: 3985193851-0
                                        • Opcode ID: 28c3c26aa58a7b1d0b737a17757400c93c751d32761aa9437bbdc0a385d65993
                                        • Instruction ID: df9c0873c136ddd24b8aa988775969986c1613bec62327c4069b14a2c43cb384
                                        • Opcode Fuzzy Hash: 28c3c26aa58a7b1d0b737a17757400c93c751d32761aa9437bbdc0a385d65993
                                        • Instruction Fuzzy Hash: 5F2156743847047AE721E724CD8BF9B7BD89B54748F144069B6487F2D3C6FCAA40869C
                                        APIs
                                        • SHGetMalloc.SHELL32(?), ref: 004621AF
                                        • GetActiveWindow.USER32 ref: 00462213
                                        • CoInitialize.OLE32(00000000), ref: 00462227
                                        • SHBrowseForFolder.SHELL32(?), ref: 0046223E
                                        • CoUninitialize.OLE32(0046227F,00000000,?,?,?,?,?,00000000,00462303), ref: 00462253
                                        • SetActiveWindow.USER32(?,0046227F,00000000,?,?,?,?,?,00000000,00462303), ref: 00462269
                                        • SetActiveWindow.USER32(?,?,0046227F,00000000,?,?,?,?,?,00000000,00462303), ref: 00462272
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                        • String ID: A
                                        • API String ID: 2684663990-3554254475
                                        • Opcode ID: caefdfe045defb9a034f2c4a917009fdef53ece79d7542ea0497d69e424cd409
                                        • Instruction ID: 1e82777cc352b96db12449cf8796706bfa71e84f11e11660080683620fe74db3
                                        • Opcode Fuzzy Hash: caefdfe045defb9a034f2c4a917009fdef53ece79d7542ea0497d69e424cd409
                                        • Instruction Fuzzy Hash: E23130B0E04208AFDB00EFB5D945ADEBBF8EB09304F51447AF914E7251E7789A04CB59
                                        APIs
                                        • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045DAB9
                                        • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045DAC9
                                        • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045DAD9
                                        • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045DAE9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc
                                        • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                        • API String ID: 190572456-3516654456
                                        • Opcode ID: 5abc5c05f731a0f84057b652f47985810eed84a0374322df604e0c431af132d1
                                        • Instruction ID: 9991d33b7b3f44c4a287d390de66c621eb38f0a325e11cae05c3c9c0ae6f74c7
                                        • Opcode Fuzzy Hash: 5abc5c05f731a0f84057b652f47985810eed84a0374322df604e0c431af132d1
                                        • Instruction Fuzzy Hash: ED016CB0D00710DAE324DF335C827223AA79B94306F1584376B4853266D3FC184DCE2D
                                        APIs
                                        • SetBkColor.GDI32(?,00000000), ref: 0041AE09
                                        • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0041AE43
                                        • SetBkColor.GDI32(?,?), ref: 0041AE58
                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AEA2
                                        • SetTextColor.GDI32(00000000,00000000), ref: 0041AEAD
                                        • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AEBD
                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AEFC
                                        • SetTextColor.GDI32(00000000,00000000), ref: 0041AF06
                                        • SetBkColor.GDI32(00000000,?), ref: 0041AF13
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Color$StretchText
                                        • String ID:
                                        • API String ID: 2984075790-0
                                        • Opcode ID: b2e79564dac12e93c58a92479de6674996e515196b856df7b31fa3c4552ba36b
                                        • Instruction ID: 4ec4bb7d7ecd06ab75a809c898bbb7394ceff3bd51f581de865bbf99f3132505
                                        • Opcode Fuzzy Hash: b2e79564dac12e93c58a92479de6674996e515196b856df7b31fa3c4552ba36b
                                        • Instruction Fuzzy Hash: E761A6B5A01605EFC740EFADE985E9AB7F9EF08318B108566F518DB251C734ED408F98
                                        APIs
                                          • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                        • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00458A74,?, /s ",?,regsvr32.exe",?,00458A74), ref: 004589E6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseDirectoryHandleSystem
                                        • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                        • API String ID: 2051275411-1862435767
                                        • Opcode ID: 155819c64c430fb45d55460a0d10478e2dbda3fe00918e678cc052cf01514edf
                                        • Instruction ID: 5e566bfdb395c8031f807e0e6dfcda5b961088fbae7d5a2ae3caad0b9f5d9a1a
                                        • Opcode Fuzzy Hash: 155819c64c430fb45d55460a0d10478e2dbda3fe00918e678cc052cf01514edf
                                        • Instruction Fuzzy Hash: 94410770A003486BDB10EFE5C842B9DB7F9AF45305F50407FA914BB296DF789E098B59
                                        APIs
                                        • OffsetRect.USER32(?,00000001,00000001), ref: 0044D781
                                        • GetSysColor.USER32(00000014), ref: 0044D788
                                        • SetTextColor.GDI32(00000000,00000000), ref: 0044D7A0
                                        • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D7C9
                                        • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D7D3
                                        • GetSysColor.USER32(00000010), ref: 0044D7DA
                                        • SetTextColor.GDI32(00000000,00000000), ref: 0044D7F2
                                        • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D81B
                                        • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D846
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Text$Color$Draw$OffsetRect
                                        • String ID:
                                        • API String ID: 1005981011-0
                                        • Opcode ID: c732eae71167dd8aa6631ccdc206b1dcbb1a1316a8d8e9d7e0f026f0b59abdf9
                                        • Instruction ID: 83f763003a0c4173e52025d9049416b14570b2719a823760897ab970dc451d42
                                        • Opcode Fuzzy Hash: c732eae71167dd8aa6631ccdc206b1dcbb1a1316a8d8e9d7e0f026f0b59abdf9
                                        • Instruction Fuzzy Hash: B221ACB46015047FC710FB2ACD8AE8AB7DC9F59319B00857BB918EB3A3C67CDE444669
                                        APIs
                                          • Part of subcall function 00451070: SetEndOfFile.KERNEL32(?,?,0045CB3E,00000000,0045CCC9,?,00000000,00000002,00000002), ref: 00451077
                                          • Part of subcall function 004073A0: DeleteFileA.KERNEL32(00000000,0049D62C,00499FD9,00000000,0049A02E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 004073AB
                                        • GetWindowThreadProcessId.USER32(00000000,?), ref: 00497E6D
                                        • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00497E81
                                        • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00497E9B
                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00497EA7
                                        • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00497EAD
                                        • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00497EC0
                                        Strings
                                        • Deleting Uninstall data files., xrefs: 00497DE3
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                        • String ID: Deleting Uninstall data files.
                                        • API String ID: 1570157960-2568741658
                                        • Opcode ID: 76f4a073d4d431fcb8e24e0d71c40f55804fe31760389f23b01cbf0fd8bd04be
                                        • Instruction ID: 7989a93d4f85e89f9f4a8d52eef74e044f35551c753dc98037dc67a034be62a8
                                        • Opcode Fuzzy Hash: 76f4a073d4d431fcb8e24e0d71c40f55804fe31760389f23b01cbf0fd8bd04be
                                        • Instruction Fuzzy Hash: 78213270718204BEEF10EBB6AC42B5737A8E755758F15497BF500961E2EA7C5C048B1D
                                        APIs
                                          • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                                        • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,00471155,?,?,?,?,00000000), ref: 004710BF
                                        • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,00471155), ref: 004710D6
                                        • AddFontResourceA.GDI32(00000000), ref: 004710F3
                                        • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00471107
                                        Strings
                                        • AddFontResource, xrefs: 00471111
                                        • Failed to set value in Fonts registry key., xrefs: 004710C8
                                        • Failed to open Fonts registry key., xrefs: 004710DD
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                        • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                        • API String ID: 955540645-649663873
                                        • Opcode ID: 7c4e9ce8899c50156beb29e6a4f0c1fb68aa66f584b13ae4b867648ef350e078
                                        • Instruction ID: e530b8863bd5b0940b7b47d45e6c2b04f0dd933a31ed90210a2cbfb1d5868c86
                                        • Opcode Fuzzy Hash: 7c4e9ce8899c50156beb29e6a4f0c1fb68aa66f584b13ae4b867648ef350e078
                                        • Instruction Fuzzy Hash: 3821B27074024477D710EA6A9C42F9A77ACCB09708F60C43BBA04EB3D2DA7CDE05862D
                                        APIs
                                          • Part of subcall function 00416860: GetClassInfoA.USER32(00400000,?,?), ref: 004168CF
                                          • Part of subcall function 00416860: UnregisterClassA.USER32(?,00400000), ref: 004168FB
                                          • Part of subcall function 00416860: RegisterClassA.USER32(?), ref: 0041691E
                                        • GetVersion.KERNEL32 ref: 00463A54
                                        • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 00463A92
                                        • SHGetFileInfo.SHELL32(00463B30,00000000,?,00000160,00004011), ref: 00463AAF
                                        • LoadCursorA.USER32(00000000,00007F02), ref: 00463ACD
                                        • SetCursor.USER32(00000000,00000000,00007F02,00463B30,00000000,?,00000160,00004011), ref: 00463AD3
                                        • SetCursor.USER32(?,00463B13,00007F02,00463B30,00000000,?,00000160,00004011), ref: 00463B06
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                        • String ID: Explorer
                                        • API String ID: 2594429197-512347832
                                        • Opcode ID: 08ef91ce8ca4084e417ba220884df78b79a66e01962786801913a20119982a52
                                        • Instruction ID: 0956d246c88e4b13c617490cc10e92cdb10fa67267cb1644ec11604dcab5a564
                                        • Opcode Fuzzy Hash: 08ef91ce8ca4084e417ba220884df78b79a66e01962786801913a20119982a52
                                        • Instruction Fuzzy Hash: 6A212C307403446AE710BFB58C47F9A76989B08708F5000BFBA09EE1C3EABD9D4586AD
                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,021579E0,?,?,?,021579E0,0047977C,00000000,0047989A,?,?,?,?), ref: 004795D1
                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004795D7
                                        • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,021579E0,?,?,?,021579E0,0047977C,00000000,0047989A,?,?,?,?), ref: 004795EA
                                        • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,021579E0,?,?,?,021579E0), ref: 00479614
                                        • CloseHandle.KERNEL32(00000000,?,?,?,021579E0,0047977C,00000000,0047989A,?,?,?,?), ref: 00479632
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                        • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                        • API String ID: 2704155762-2318956294
                                        • Opcode ID: 1947a9aaa15eabe4036a12787753409495eb16ca8dbead4cdc7f2695ecfe1c22
                                        • Instruction ID: 19ddb68189d16dccfde8b10573e35333770f7cebea86a77b7f1be6907437da3a
                                        • Opcode Fuzzy Hash: 1947a9aaa15eabe4036a12787753409495eb16ca8dbead4cdc7f2695ecfe1c22
                                        • Instruction Fuzzy Hash: CC01D26034470436E52131BA4C86FBB248C8B50768F148237BA1CEA2E2EDAD9E0601AE
                                        APIs
                                        • GetLastError.KERNEL32(00000000,0045A78A,?,00000000,00000000,00000000,?,00000006,?,00000000,00499145,?,00000000,004991E8), ref: 0045A6CE
                                          • Part of subcall function 00454B5C: FindClose.KERNEL32(000000FF,00454C52), ref: 00454C41
                                        Strings
                                        • Failed to strip read-only attribute., xrefs: 0045A69C
                                        • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 0045A6A8
                                        • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 0045A743
                                        • Stripped read-only attribute., xrefs: 0045A690
                                        • Failed to delete directory (%d)., xrefs: 0045A764
                                        • Deleting directory: %s, xrefs: 0045A657
                                        • Failed to delete directory (%d). Will retry later., xrefs: 0045A6E7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseErrorFindLast
                                        • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                        • API String ID: 754982922-1448842058
                                        • Opcode ID: ae42777790169d4ff6edf5fab0230c903d40739da18b61ae09ca68f4304208a4
                                        • Instruction ID: 6800a92dfaec35f14ad088af188abd42280c19cea7490fe80134e7d3278dcbe3
                                        • Opcode Fuzzy Hash: ae42777790169d4ff6edf5fab0230c903d40739da18b61ae09ca68f4304208a4
                                        • Instruction Fuzzy Hash: 62418630A002485ACB10EB6988017AE7AF59B4D306F55867FAC11A7393DB7CCE1D875B
                                        APIs
                                        • GetDC.USER32(00000000), ref: 004298DA
                                        • GetTextMetricsA.GDI32(00000000), ref: 004298E3
                                          • Part of subcall function 0041A638: CreateFontIndirectA.GDI32(?), ref: 0041A6F7
                                        • SelectObject.GDI32(00000000,00000000), ref: 004298F2
                                        • GetTextMetricsA.GDI32(00000000,?), ref: 004298FF
                                        • SelectObject.GDI32(00000000,00000000), ref: 00429906
                                        • ReleaseDC.USER32(00000000,00000000), ref: 0042990E
                                        • GetSystemMetrics.USER32(00000006), ref: 00429933
                                        • GetSystemMetrics.USER32(00000006), ref: 0042994D
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Metrics$ObjectSelectSystemText$CreateFontIndirectRelease
                                        • String ID:
                                        • API String ID: 1583807278-0
                                        • Opcode ID: 493c3e02d1035430593376a4cfe0bac28c29019347665ee68c3eba71a2dbb902
                                        • Instruction ID: 0ef879b540a67ceb128a5e1141d84f2d1524799c58b88ee5a2ee57f477153a9f
                                        • Opcode Fuzzy Hash: 493c3e02d1035430593376a4cfe0bac28c29019347665ee68c3eba71a2dbb902
                                        • Instruction Fuzzy Hash: 8401A19170971127F310667A9CC2B6F6688DB54368F44053EFA86963E3D96C8C81876E
                                        APIs
                                        • GetDC.USER32(00000000), ref: 0041E277
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041E281
                                        • ReleaseDC.USER32(00000000,00000000), ref: 0041E28E
                                        • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041E29D
                                        • GetStockObject.GDI32(00000007), ref: 0041E2AB
                                        • GetStockObject.GDI32(00000005), ref: 0041E2B7
                                        • GetStockObject.GDI32(0000000D), ref: 0041E2C3
                                        • LoadIconA.USER32(00000000,00007F00), ref: 0041E2D4
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ObjectStock$CapsDeviceIconLoadRelease
                                        • String ID:
                                        • API String ID: 225703358-0
                                        • Opcode ID: db53187b583683c3da25eb47fc51b38c63e1255722fbf2352793706f85574c6b
                                        • Instruction ID: 718266ba1944efb5b46721f14e799226cd24d8dfc19287898d5783b558d94fa9
                                        • Opcode Fuzzy Hash: db53187b583683c3da25eb47fc51b38c63e1255722fbf2352793706f85574c6b
                                        • Instruction Fuzzy Hash: 1111FB70A453015AE340BFA69D52BAA3691D724709F00813BF608EF3D2DB7D5C809BAD
                                        APIs
                                        • LoadCursorA.USER32(00000000,00007F02), ref: 00463F38
                                        • SetCursor.USER32(00000000,00000000,00007F02,00000000,00463FCD), ref: 00463F3E
                                        • SetCursor.USER32(?,00463FB5,00007F02,00000000,00463FCD), ref: 00463FA8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Cursor$Load
                                        • String ID: $ $Internal error: Item already expanding
                                        • API String ID: 1675784387-1948079669
                                        • Opcode ID: 2e72c9ebfc19e7403a65945d55937a119cc11725f60109d9f94943b84faf3f65
                                        • Instruction ID: aa82ab3995de3935e6727d947cb2bd0e3876d59c6d9623ce98a17a39b04bf081
                                        • Opcode Fuzzy Hash: 2e72c9ebfc19e7403a65945d55937a119cc11725f60109d9f94943b84faf3f65
                                        • Instruction Fuzzy Hash: 67B1E230A00244DFDB14DF65C549B9EBBF1AF45304F1584AAE8459B392E778EE84CB0A
                                        APIs
                                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0045457F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: PrivateProfileStringWrite
                                        • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                        • API String ID: 390214022-3304407042
                                        • Opcode ID: 7fc08df52904c59b3176bd425c815c443ddc94d3e7b0bfcf8c3a045116732771
                                        • Instruction ID: e87d0749b1697b84d3b9cc82c23e20e51564d8fa8ce324392089b518a873d649
                                        • Opcode Fuzzy Hash: 7fc08df52904c59b3176bd425c815c443ddc94d3e7b0bfcf8c3a045116732771
                                        • Instruction Fuzzy Hash: B8913334E001499BDB01EFA5D882BDEB7B5EF49309F508467E900BB292D77C9E49CB58
                                        APIs
                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,0047EAF4,?,?,?,?,00000000,0047EC49,?,?,?,00000000,?,0047ED58), ref: 0047EAD0
                                        • FindClose.KERNEL32(000000FF,0047EAFB,0047EAF4,?,?,?,?,00000000,0047EC49,?,?,?,00000000,?,0047ED58,00000000), ref: 0047EAEE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileNext
                                        • String ID: TG$TG
                                        • API String ID: 2066263336-2531790037
                                        • Opcode ID: e11fe1f409109a0bb18fd9fab999c4355e57a24987c5da876cabd545c71bdb31
                                        • Instruction ID: 49c023a3d40347f396a503d53546bb693b8cfca30f5629bd36de7deb8458e88f
                                        • Opcode Fuzzy Hash: e11fe1f409109a0bb18fd9fab999c4355e57a24987c5da876cabd545c71bdb31
                                        • Instruction Fuzzy Hash: F5812C7490024D9FDF11DF96C841ADFBBB9EF4D304F1081EAE508A7291D6399A46CF54
                                        APIs
                                        • GetSystemDefaultLCID.KERNEL32(00000000,00408DB8,?,?,?,?,00000000,00000000,00000000,?,00409DBF,00000000,00409DD2), ref: 00408B8A
                                          • Part of subcall function 004089B8: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049D4C4,00000001,?,00408A83,?,00000000,00408B62), ref: 004089D6
                                          • Part of subcall function 00408A04: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,00408C06,?,?,?,00000000,00408DB8), ref: 00408A17
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: InfoLocale$DefaultSystem
                                        • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                        • API String ID: 1044490935-665933166
                                        • Opcode ID: c69c3147cd56940e9f4fd8337a0fbc887525be67d32930313bc35b703755f031
                                        • Instruction ID: a8d7ab9d838d1b353a0e5ff474912d8a0235132b07344be0acb9e4c83fee81e1
                                        • Opcode Fuzzy Hash: c69c3147cd56940e9f4fd8337a0fbc887525be67d32930313bc35b703755f031
                                        • Instruction Fuzzy Hash: D8513D34B001486BDB01FBA5DA41A9F77A9DB98308F50947FB181BB7C6CE3CDA068759
                                        APIs
                                        • GetVersion.KERNEL32(00000000,00411D49), ref: 00411BDC
                                        • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 00411C9A
                                          • Part of subcall function 00411EFC: CreatePopupMenu.USER32 ref: 00411F16
                                        • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 00411D26
                                          • Part of subcall function 00411EFC: CreateMenu.USER32 ref: 00411F20
                                        • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 00411D0D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Menu$Insert$Create$ItemPopupVersion
                                        • String ID: ,$?
                                        • API String ID: 2359071979-2308483597
                                        • Opcode ID: c987c748b65508a950cf3f2169e5bd87e5634fb74b346734da7ef3b4f05fb7f7
                                        • Instruction ID: 125356fab78159fbe3d4b3b77ff780d7a0eb3536e5c02055c9c5492709250fea
                                        • Opcode Fuzzy Hash: c987c748b65508a950cf3f2169e5bd87e5634fb74b346734da7ef3b4f05fb7f7
                                        • Instruction Fuzzy Hash: 7D512674A001049BDB10EF6AED815EE7BF9EF08304B1141BAFA04E73A2E738D941CB58
                                        APIs
                                        • GetObjectA.GDI32(?,00000018,?), ref: 0041C378
                                        • GetObjectA.GDI32(?,00000018,?), ref: 0041C387
                                        • GetBitmapBits.GDI32(?,?,?), ref: 0041C3D8
                                        • GetBitmapBits.GDI32(?,?,?), ref: 0041C3E6
                                        • DeleteObject.GDI32(?), ref: 0041C3EF
                                        • DeleteObject.GDI32(?), ref: 0041C3F8
                                        • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041C415
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Object$BitmapBitsDelete$CreateIcon
                                        • String ID:
                                        • API String ID: 1030595962-0
                                        • Opcode ID: 8204310b78e8d6a6cf9899529667619705c527fa466c5b93b01e90bd2c764378
                                        • Instruction ID: 7028de2688ff158aa25c0b8276400e232655bb6670dd4605646626e5bfc1af4e
                                        • Opcode Fuzzy Hash: 8204310b78e8d6a6cf9899529667619705c527fa466c5b93b01e90bd2c764378
                                        • Instruction Fuzzy Hash: F651F671E002199FCB50DFE9C8819EEB7F9EB48314B218066F914E7295D638AD81CB68
                                        APIs
                                        • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041D34E
                                        • GetDeviceCaps.GDI32(00000000,00000026), ref: 0041D36D
                                        • SelectPalette.GDI32(?,?,00000001), ref: 0041D3D3
                                        • RealizePalette.GDI32(?), ref: 0041D3E2
                                        • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041D44C
                                        • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D48A
                                        • SelectPalette.GDI32(?,?,00000001), ref: 0041D4AF
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: PaletteStretch$Select$BitsCapsDeviceModeRealize
                                        • String ID:
                                        • API String ID: 2222416421-0
                                        • Opcode ID: 11edf0dba9517228aa32d7039567d0e1bdcd43b434536bf7bada936ddc7c4efc
                                        • Instruction ID: 60201597840efc574cdf5035eb35bbfd27a544e021146ecd029e3556dfc27432
                                        • Opcode Fuzzy Hash: 11edf0dba9517228aa32d7039567d0e1bdcd43b434536bf7bada936ddc7c4efc
                                        • Instruction Fuzzy Hash: 305121B0A00604AFD714DFA9C985F9AB7F9EF08304F14859AB944D7392C778ED80CB58
                                        APIs
                                        • SendMessageA.USER32(00000000,?,?), ref: 00457B2A
                                          • Part of subcall function 004246CC: GetWindowTextA.USER32(?,?,00000100), ref: 004246EC
                                          • Part of subcall function 0041F2F4: GetCurrentThreadId.KERNEL32 ref: 0041F343
                                          • Part of subcall function 0041F2F4: EnumThreadWindows.USER32(00000000,0041F2A4,00000000), ref: 0041F349
                                          • Part of subcall function 00424714: SetWindowTextA.USER32(?,00000000), ref: 0042472C
                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00457B91
                                        • TranslateMessage.USER32(?), ref: 00457BAF
                                        • DispatchMessageA.USER32(?), ref: 00457BB8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Message$TextThreadWindow$CurrentDispatchEnumSendTranslateWindows
                                        • String ID: [Paused]
                                        • API String ID: 1007367021-4230553315
                                        • Opcode ID: 8f39b929066e5dde17ef7bf9f49813106d9eceee4e0607b45077cfdd9f9bed8a
                                        • Instruction ID: d952aa0340fda6d06c899081e645d661bac1146de2c671e539639067201b9655
                                        • Opcode Fuzzy Hash: 8f39b929066e5dde17ef7bf9f49813106d9eceee4e0607b45077cfdd9f9bed8a
                                        • Instruction Fuzzy Hash: BB3196309082445EDB11DFB9E845FDE7BF8DB49318F5180B7E814E7292D67CA909CB29
                                        APIs
                                        • GetCursor.USER32(00000000,0046C21F), ref: 0046C19C
                                        • LoadCursorA.USER32(00000000,00007F02), ref: 0046C1AA
                                        • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046C21F), ref: 0046C1B0
                                        • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046C21F), ref: 0046C1BA
                                        • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046C21F), ref: 0046C1C0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Cursor$LoadSleep
                                        • String ID: CheckPassword
                                        • API String ID: 4023313301-1302249611
                                        • Opcode ID: c2fe5332046b00ec619954058f05e209d56247e563ca7958298a020a06cd3411
                                        • Instruction ID: ee4704442a97aa51a819b3d11b93b6eea7a80086b594a8aac8f18d25b90f0006
                                        • Opcode Fuzzy Hash: c2fe5332046b00ec619954058f05e209d56247e563ca7958298a020a06cd3411
                                        • Instruction Fuzzy Hash: 063175346402449FD711EF69C8C9F9E7BE4AF49304F5580BAB9449B3E2E7789E40CB49
                                        APIs
                                          • Part of subcall function 00478DDC: GetWindowThreadProcessId.USER32(00000000), ref: 00478DE4
                                          • Part of subcall function 00478DDC: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00478EDB,0049E0AC,00000000), ref: 00478DF7
                                          • Part of subcall function 00478DDC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00478DFD
                                        • SendMessageA.USER32(00000000,0000004A,00000000,0047926E), ref: 00478EE9
                                        • GetTickCount.KERNEL32 ref: 00478F2E
                                        • GetTickCount.KERNEL32 ref: 00478F38
                                        • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00478F8D
                                        Strings
                                        • CallSpawnServer: Unexpected status: %d, xrefs: 00478F76
                                        • CallSpawnServer: Unexpected response: $%x, xrefs: 00478F1E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                        • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                        • API String ID: 613034392-3771334282
                                        • Opcode ID: b2e1d8d59d79f67ca6a224e872d53bca437999279a7be28f50c91e0342c7e9be
                                        • Instruction ID: 2b74b3330966d0da2430542d23b63ad4dc4eec681a1128910255243e8f8c0985
                                        • Opcode Fuzzy Hash: b2e1d8d59d79f67ca6a224e872d53bca437999279a7be28f50c91e0342c7e9be
                                        • Instruction Fuzzy Hash: E0319374F502149ADB10EBB9884A7EE76A19F48304F50843EF148EB382DA7C4D0187A9
                                        APIs
                                        • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 0045A03B
                                        Strings
                                        • CreateAssemblyCache, xrefs: 0045A032
                                        • .NET Framework CreateAssemblyCache function failed, xrefs: 0045A05E
                                        • Failed to load .NET Framework DLL "%s", xrefs: 0045A020
                                        • Fusion.dll, xrefs: 00459FDB
                                        • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 0045A046
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc
                                        • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                        • API String ID: 190572456-3990135632
                                        • Opcode ID: d95d5d40fddf0b6030493c953464f742ef4760e894d11a5ea04ccacfdf112554
                                        • Instruction ID: ac224aa19d502af52a8aeeb8631c7515eb40ef1487658bef2565bb8923ebe5d4
                                        • Opcode Fuzzy Hash: d95d5d40fddf0b6030493c953464f742ef4760e894d11a5ea04ccacfdf112554
                                        • Instruction Fuzzy Hash: 7931A971E006059FDB10EFA5C88169EB7B4AF44715F50867BE814E7382D7389E18C79A
                                        APIs
                                          • Part of subcall function 0041C498: GetObjectA.GDI32(?,00000018), ref: 0041C4A5
                                        • GetFocus.USER32 ref: 0041C5B8
                                        • GetDC.USER32(?), ref: 0041C5C4
                                        • SelectPalette.GDI32(?,?,00000000), ref: 0041C5E5
                                        • RealizePalette.GDI32(?), ref: 0041C5F1
                                        • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C608
                                        • SelectPalette.GDI32(?,00000000,00000000), ref: 0041C630
                                        • ReleaseDC.USER32(?,?), ref: 0041C63D
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Palette$Select$BitsFocusObjectRealizeRelease
                                        • String ID:
                                        • API String ID: 3303097818-0
                                        • Opcode ID: 13ad04b8ebeec00c1d7dbe87a4843d5f0ce23703817d7fa7e30356844582fb0f
                                        • Instruction ID: 5608d60df95c2c9a4937b8f20fdaccdf81dd4bf5f719291f5ec9f8ce647d196e
                                        • Opcode Fuzzy Hash: 13ad04b8ebeec00c1d7dbe87a4843d5f0ce23703817d7fa7e30356844582fb0f
                                        • Instruction Fuzzy Hash: 00116DB1A00619BBDF10DBA9CC85FAFB7FCEF48700F14446AB614E7281D67899008B28
                                        APIs
                                        • GetSystemMetrics.USER32(0000000E), ref: 004190C0
                                        • GetSystemMetrics.USER32(0000000D), ref: 004190C8
                                        • 6F532980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,?), ref: 004190CE
                                          • Part of subcall function 00410C48: 6F52C400.COMCTL32(?,000000FF,00000000,004190FC,00000000,00419158,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,?), ref: 00410C4C
                                        • 6F59CB00.COMCTL32(?,00000000,00000000,00000000,00000000,00419158,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,?), ref: 0041911E
                                        • 6F59C740.COMCTL32(00000000,?,?,00000000,00000000,00000000,00000000,00419158,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00419129
                                        • 6F59CB00.COMCTL32(?,00000001,?,?,00000000,?,?,00000000,00000000,00000000,00000000,00419158,?,00000000,0000000D,00000000), ref: 0041913C
                                        • 6F530860.COMCTL32(?,0041915F,?,00000000,?,?,00000000,00000000,00000000,00000000,00419158,?,00000000,0000000D,00000000,0000000E), ref: 00419152
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: MetricsSystem$C400C740F530860F532980
                                        • String ID:
                                        • API String ID: 209721339-0
                                        • Opcode ID: 3537cdd0f738fbfcd60e26d14cefecc9ad32e9dd8feb771d9bbef366dd2eac9a
                                        • Instruction ID: 9903b46d79d4c0b31f098cc3390b5efedd2ad94e5cf824da9eef417fc70482b9
                                        • Opcode Fuzzy Hash: 3537cdd0f738fbfcd60e26d14cefecc9ad32e9dd8feb771d9bbef366dd2eac9a
                                        • Instruction Fuzzy Hash: 0611B971B44204BBEB14EFA5CC87F9E73B9EB09704F504166B604EB2C1E5B99D848B58
                                        APIs
                                          • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00485110), ref: 004850F5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseOpen
                                        • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                        • API String ID: 47109696-2530820420
                                        • Opcode ID: f7ac7d87b6566833f8f94ca2fdfd92b371a3bfc49258f80580d53ac0ca8de827
                                        • Instruction ID: 02a49102d00d8724c0d73e8972acf5231ddb46999e19ea23a0f5791770e41de6
                                        • Opcode Fuzzy Hash: f7ac7d87b6566833f8f94ca2fdfd92b371a3bfc49258f80580d53ac0ca8de827
                                        • Instruction Fuzzy Hash: FE11B230A04644ABDB00F766DC56B5F7BA8DB42744F508877A800DB782D73D9E41975D
                                        APIs
                                          • Part of subcall function 0044CD18: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0044CD30
                                        • LoadLibraryA.KERNEL32(00000000,00000000,0044CE0A,?,?,?,?,00000000,00000000), ref: 0044CD92
                                        • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044CDA3
                                        • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044CDB3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc$DirectoryLibraryLoadSystem
                                        • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                        • API String ID: 2141747552-1050967733
                                        • Opcode ID: ea022944773ab25f9a4076fd398f24179dfceb8cd9828e0392caa77096e119c9
                                        • Instruction ID: 55534d0cd89e21a5042de7d2cb1dd0110792ae2e246426a933e63f936c6ed6e6
                                        • Opcode Fuzzy Hash: ea022944773ab25f9a4076fd398f24179dfceb8cd9828e0392caa77096e119c9
                                        • Instruction Fuzzy Hash: 361151B0A01704AFF710EFA1DCC2B5A7BA8E758719F64047BE400666A1DBBD9D448A1C
                                        APIs
                                        • GetDC.USER32(00000000), ref: 00496E01
                                          • Part of subcall function 0041A638: CreateFontIndirectA.GDI32(?), ref: 0041A6F7
                                        • SelectObject.GDI32(00000000,00000000), ref: 00496E23
                                        • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,004973A1), ref: 00496E37
                                        • GetTextMetricsA.GDI32(00000000,?), ref: 00496E59
                                        • ReleaseDC.USER32(00000000,00000000), ref: 00496E76
                                        Strings
                                        • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00496E2E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Text$CreateExtentFontIndirectMetricsObjectPointReleaseSelect
                                        • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                        • API String ID: 2948443157-222967699
                                        • Opcode ID: aae36943e4c039aea34424998f68ade3a8833365680bc7432fe66356b3d4646c
                                        • Instruction ID: 569e85929f3d385eaff6f9e1b1d1d5c6dd8a65a34f46b30b3a8bef4bdf425d44
                                        • Opcode Fuzzy Hash: aae36943e4c039aea34424998f68ade3a8833365680bc7432fe66356b3d4646c
                                        • Instruction Fuzzy Hash: 36018476A04608AFDB05DBE9CC41F5FB7ECDB49704F11047ABA04E7281D678AE008B68
                                        APIs
                                        • SelectObject.GDI32(00000000,?), ref: 0041B8C0
                                        • SelectObject.GDI32(?,00000000), ref: 0041B8CF
                                        • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B8FB
                                        • SelectObject.GDI32(00000000,00000000), ref: 0041B909
                                        • SelectObject.GDI32(?,00000000), ref: 0041B917
                                        • DeleteDC.GDI32(00000000), ref: 0041B920
                                        • DeleteDC.GDI32(?), ref: 0041B929
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ObjectSelect$Delete$Stretch
                                        • String ID:
                                        • API String ID: 1458357782-0
                                        • Opcode ID: c5d1e2e3ff328356a4e4238c7f450765dbf7839f38aeea7c0d55facf19ccd353
                                        • Instruction ID: b8528283d587f8f5f7158778d976388ea9280e6d202ec49eeb693ac58173ed71
                                        • Opcode Fuzzy Hash: c5d1e2e3ff328356a4e4238c7f450765dbf7839f38aeea7c0d55facf19ccd353
                                        • Instruction Fuzzy Hash: 5A118EB2F04619ABDB10D6DDC885FEFB7BCEB08314F044415B614FB241C678AD418B54
                                        APIs
                                        • GetCursorPos.USER32 ref: 004237FF
                                        • WindowFromPoint.USER32(?,?), ref: 0042380C
                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0042381A
                                        • GetCurrentThreadId.KERNEL32 ref: 00423821
                                        • SendMessageA.USER32(00000000,00000084,?,?), ref: 0042383A
                                        • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423851
                                        • SetCursor.USER32(00000000), ref: 00423863
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                        • String ID:
                                        • API String ID: 1770779139-0
                                        • Opcode ID: bca67253d695687129505d4dd6b4be75de0481567bd8dbfc76009214d22bf118
                                        • Instruction ID: d55a13ab3e3fc67d9c1f0c697d1027359b93869cc9afd0973a071b09e334c979
                                        • Opcode Fuzzy Hash: bca67253d695687129505d4dd6b4be75de0481567bd8dbfc76009214d22bf118
                                        • Instruction Fuzzy Hash: 9901D42230521036D6207B7A5C86E2F22E8CBC5B65F51443FB609BF282D93D8C01976D
                                        APIs
                                        • GetModuleHandleA.KERNEL32(user32.dll), ref: 00496C24
                                        • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00496C31
                                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00496C3E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModule
                                        • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                        • API String ID: 667068680-2254406584
                                        • Opcode ID: 1a62ebb246959f38fae6f97a16ae9b6e3f147e8fdc483f677f644595477796c0
                                        • Instruction ID: 0100053a3692f287516410ec157e21cb1b88c24c6f2ed11ec452f60a58bd69cd
                                        • Opcode Fuzzy Hash: 1a62ebb246959f38fae6f97a16ae9b6e3f147e8fdc483f677f644595477796c0
                                        • Instruction Fuzzy Hash: 5AF0F692701B1526DA1025764C81B7B698CCBC27A0F060037BD85A7382E9AD9C0552AD
                                        APIs
                                        • GetProcAddress.KERNEL32(00000000,ISCryptGetVersion), ref: 0045D98D
                                        • GetProcAddress.KERNEL32(00000000,ArcFourInit), ref: 0045D99D
                                        • GetProcAddress.KERNEL32(00000000,ArcFourCrypt), ref: 0045D9AD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc
                                        • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                        • API String ID: 190572456-508647305
                                        • Opcode ID: a120c3d2ef62b36cbcf1f94c94fb794ce275c00622819f97a022044a312cbe17
                                        • Instruction ID: 0705cba7109997b41c54f5ec5154c4026f190107a5f336fc7dc4235633f43cad
                                        • Opcode Fuzzy Hash: a120c3d2ef62b36cbcf1f94c94fb794ce275c00622819f97a022044a312cbe17
                                        • Instruction Fuzzy Hash: E9F030F1901620EBF314EF77AC457273695EBA4302F14843BA445E11B2D7BA085AEA2C
                                        APIs
                                        • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045DE8D
                                        • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045DE9D
                                        • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045DEAD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc
                                        • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                        • API String ID: 190572456-212574377
                                        • Opcode ID: 69782b4271ac4a522c1cbf050024bd159fbeab52ed8ba1f2270972ee26ec74bc
                                        • Instruction ID: ffc1661d06bbefe96a91e36acebf6432405697aaa326f86a6f465272ccde7cfc
                                        • Opcode Fuzzy Hash: 69782b4271ac4a522c1cbf050024bd159fbeab52ed8ba1f2270972ee26ec74bc
                                        • Instruction Fuzzy Hash: 84F01DB1D00A18DED724DF37AC4A72736D5EF74316F08843BA9465A2A2D7B80858DF1D
                                        APIs
                                        • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,0049B934,004579ED,00457D90,00457944,00000000,00000B06,00000000,00000000,00000000,00000002,00000000,00482671), ref: 0042EE85
                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EE8B
                                        • InterlockedExchange.KERNEL32(0049D66C,00000001), ref: 0042EE9C
                                          • Part of subcall function 0042EDFC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EEC0,00000004,0049B934,004579ED,00457D90,00457944,00000000,00000B06,00000000,00000000,00000000,00000002,00000000), ref: 0042EE12
                                          • Part of subcall function 0042EDFC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EE18
                                          • Part of subcall function 0042EDFC: InterlockedExchange.KERNEL32(0049D664,00000001), ref: 0042EE29
                                        • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,0049B934,004579ED,00457D90,00457944,00000000,00000B06,00000000,00000000,00000000,00000002,00000000), ref: 0042EEB0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                        • String ID: ChangeWindowMessageFilterEx$user32.dll
                                        • API String ID: 142928637-2676053874
                                        • Opcode ID: 147ab314087a4e3dcf6e16000bf7a92f8a6b53821ee1abd9afb0821482d3c5ed
                                        • Instruction ID: d923442659e3b0e51499426f76f6993fec2ee5a704375d7ef0c30b5e995126c2
                                        • Opcode Fuzzy Hash: 147ab314087a4e3dcf6e16000bf7a92f8a6b53821ee1abd9afb0821482d3c5ed
                                        • Instruction Fuzzy Hash: 1AE06DF1B40724AAEF107B766C86B9B2668EB50769F55003BF104A61E1C7FD0C408A6C
                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,0049A50C), ref: 00479E6E
                                        • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00479E7B
                                        • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00479E8B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModule
                                        • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                        • API String ID: 667068680-222143506
                                        • Opcode ID: 4eb8c5683a80416fa23ca28207be772c3a68f7a3a60c78b74a0383d4a233a3f9
                                        • Instruction ID: 2eb801612c02c2f681ec2550ef92dd2b82403b3208254216f30f7223daafca7c
                                        • Opcode Fuzzy Hash: 4eb8c5683a80416fa23ca28207be772c3a68f7a3a60c78b74a0383d4a233a3f9
                                        • Instruction Fuzzy Hash: BFC0C9E1680710A9D600F7725C82DBB2548D510B25310883FB499651D2E7BD0C144A2C
                                        APIs
                                        • GetFocus.USER32 ref: 0041BB95
                                        • GetDC.USER32(?), ref: 0041BBA1
                                        • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BBD6
                                        • RealizePalette.GDI32(00000000), ref: 0041BBE2
                                        • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BC10
                                        • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BC44
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Palette$Select$BitmapCreateFocusRealize
                                        • String ID:
                                        • API String ID: 3275473261-0
                                        • Opcode ID: 2f364fcd98ee6a1d62b7c654a57492f5fb96a9e1e42606f87797115b42be741f
                                        • Instruction ID: d5c29bb792210f064481fc70285f12689ccfb8d13ad776c980584781b3891df8
                                        • Opcode Fuzzy Hash: 2f364fcd98ee6a1d62b7c654a57492f5fb96a9e1e42606f87797115b42be741f
                                        • Instruction Fuzzy Hash: E4511E74A002099FCF11DFA9C895AEEBBB5FF49704F10406AF500A7790D779AD81CBA9
                                        APIs
                                        • GetFocus.USER32 ref: 0041BE67
                                        • GetDC.USER32(?), ref: 0041BE73
                                        • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BEAD
                                        • RealizePalette.GDI32(00000000), ref: 0041BEB9
                                        • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BEDD
                                        • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BF11
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Palette$Select$BitmapCreateFocusRealize
                                        • String ID:
                                        • API String ID: 3275473261-0
                                        • Opcode ID: 6a42abb991037a6bf202db87d3771568c300b6986fb43c24206afdf92edcb334
                                        • Instruction ID: 6bf5c6e251c24ad455d3524f1730cbba616f151bd8f8db37d5e0169c444cf9bf
                                        • Opcode Fuzzy Hash: 6a42abb991037a6bf202db87d3771568c300b6986fb43c24206afdf92edcb334
                                        • Instruction Fuzzy Hash: FD511875A002089FCB11DFA9C891AAEBBF5FF49700F11846AF504EB390D7789D40CBA8
                                        APIs
                                        • GetFocus.USER32 ref: 0041B9CE
                                        • GetDC.USER32(?), ref: 0041B9DA
                                        • GetDeviceCaps.GDI32(?,00000068), ref: 0041B9F6
                                        • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041BA13
                                        • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041BA2A
                                        • ReleaseDC.USER32(?,?), ref: 0041BA76
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: EntriesPaletteSystem$CapsDeviceFocusRelease
                                        • String ID:
                                        • API String ID: 2502006586-0
                                        • Opcode ID: aaad342ca44b07dec6af6486a8a42c1cb8d3efc41e270446eeb3d15c1de1c0ff
                                        • Instruction ID: 59801f7e5fcc4ac8ef53bb63f5e7b2fd9dc64a74171921ba3453a8653c00992f
                                        • Opcode Fuzzy Hash: aaad342ca44b07dec6af6486a8a42c1cb8d3efc41e270446eeb3d15c1de1c0ff
                                        • Instruction Fuzzy Hash: A941C371A042189FCB10DFB9C885A9FBBB4EF49740F1484AAF940EB351D2389D11CBA5
                                        APIs
                                        • SetLastError.KERNEL32(00000057,00000000,0045D914,?,?,?,?,00000000), ref: 0045D8B3
                                        • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D980,?,00000000,0045D914,?,?,?,?,00000000), ref: 0045D8F2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLast
                                        • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                        • API String ID: 1452528299-1580325520
                                        • Opcode ID: bceaa7c9d38e855be30fb0ce12922fb4a40a0d74626b7c5ce76b3f9998da2675
                                        • Instruction ID: 7ee2480e64cf5dcc37247868779a06df4fe5ff89f2b42202383772de8024ccfa
                                        • Opcode Fuzzy Hash: bceaa7c9d38e855be30fb0ce12922fb4a40a0d74626b7c5ce76b3f9998da2675
                                        • Instruction Fuzzy Hash: 4811BB75A04204AFE731EBE1C941B9E76ADDF44306F604077AD0496383D67C5F0A952D
                                        APIs
                                        • GetSystemMetrics.USER32(0000000B), ref: 0041C225
                                        • GetSystemMetrics.USER32(0000000C), ref: 0041C22F
                                        • GetDC.USER32(00000000), ref: 0041C239
                                        • GetDeviceCaps.GDI32(00000000,0000000E), ref: 0041C260
                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0041C26D
                                        • ReleaseDC.USER32(00000000,00000000), ref: 0041C2A6
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CapsDeviceMetricsSystem$Release
                                        • String ID:
                                        • API String ID: 447804332-0
                                        • Opcode ID: 3e92d3a5d6c5ecb792e0ebd5600fae34c9b68402c42568e6e1a494463c386ac3
                                        • Instruction ID: bd62dbbe377736d475eb9c8390e540ebf9edbe2df99a0055a8dbd9c6863756d8
                                        • Opcode Fuzzy Hash: 3e92d3a5d6c5ecb792e0ebd5600fae34c9b68402c42568e6e1a494463c386ac3
                                        • Instruction Fuzzy Hash: CA214A74E44608AFEB00EFE9C942BEEB7B4EB48700F10806AF514B7381D6785940CB69
                                        APIs
                                          • Part of subcall function 0045D848: SetLastError.KERNEL32(00000057,00000000,0045D914,?,?,?,?,00000000), ref: 0045D8B3
                                        • GetLastError.KERNEL32(00000000,00000000,00000000,00474844,?,?,0049E1E4,00000000), ref: 004747FD
                                        • GetLastError.KERNEL32(00000000,00000000,00000000,00474844,?,?,0049E1E4,00000000), ref: 00474813
                                        Strings
                                        • Could not set permissions on the registry key because it currently does not exist., xrefs: 00474807
                                        • Setting permissions on registry key: %s\%s, xrefs: 004747C2
                                        • Failed to set permissions on registry key (%d)., xrefs: 00474824
                                        • I, xrefs: 00474785
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLast
                                        • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s$I
                                        • API String ID: 1452528299-1959139981
                                        • Opcode ID: fa1a9a8d389e764d463da442ef7f1c9e05787aef6c03ccc219f4a1874d89d582
                                        • Instruction ID: 89f83d431bb9d789a293ecef52b9ab2aae7d8ed3921fa29d9781309811a141fd
                                        • Opcode Fuzzy Hash: fa1a9a8d389e764d463da442ef7f1c9e05787aef6c03ccc219f4a1874d89d582
                                        • Instruction Fuzzy Hash: 15217774A042485FDB00EBA9C8416FEBBE8DB89314F51817BE414E7392DB785D058BAA
                                        APIs
                                        • GetWindowLongA.USER32(?,000000EC), ref: 0047FA6A
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046DA09), ref: 0047FA90
                                        • GetWindowLongA.USER32(?,000000EC), ref: 0047FAA0
                                        • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047FAC1
                                        • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047FAD5
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047FAF1
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$Long$Show
                                        • String ID:
                                        • API String ID: 3609083571-0
                                        • Opcode ID: abe530f147a2c3f98821beb69050e02df951cc1f08551c366297f014f152c27b
                                        • Instruction ID: ffd9c37a1d4b3a018da72acb707aca8a1d598a80d0625303fdebb2ead6bb840a
                                        • Opcode Fuzzy Hash: abe530f147a2c3f98821beb69050e02df951cc1f08551c366297f014f152c27b
                                        • Instruction Fuzzy Hash: D301E9B6A54210ABD600DB78CD41F6637E8AB0C310F0A4776FA5DDF3E3C679D8048A08
                                        APIs
                                          • Part of subcall function 0041AB30: CreateBrushIndirect.GDI32 ref: 0041AB9B
                                        • UnrealizeObject.GDI32(00000000), ref: 0041B6CC
                                        • SelectObject.GDI32(?,00000000), ref: 0041B6DE
                                        • SetBkColor.GDI32(?,00000000), ref: 0041B701
                                        • SetBkMode.GDI32(?,00000002), ref: 0041B70C
                                        • SetBkColor.GDI32(?,00000000), ref: 0041B727
                                        • SetBkMode.GDI32(?,00000001), ref: 0041B732
                                          • Part of subcall function 0041A4A8: GetSysColor.USER32(?), ref: 0041A4B2
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                        • String ID:
                                        • API String ID: 3527656728-0
                                        • Opcode ID: 591f5e0a38fc1ca3dbe863e806ec08e439b2c286ec032ca355b2d19c4403f824
                                        • Instruction ID: 4060aa1d5abe481981ad85160ceff6bfe730d60da31349b060da60163fdb8f1a
                                        • Opcode Fuzzy Hash: 591f5e0a38fc1ca3dbe863e806ec08e439b2c286ec032ca355b2d19c4403f824
                                        • Instruction Fuzzy Hash: AAF0CD75601100ABDE04FFBADACAE4B77989F043097048057B908DF197CA7CE8A08B3A
                                        APIs
                                          • Part of subcall function 00424714: SetWindowTextA.USER32(?,00000000), ref: 0042472C
                                        • ShowWindow.USER32(?,00000005,00000000,004998A9,?,?,00000000), ref: 0049967A
                                          • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                          • Part of subcall function 004076F8: SetCurrentDirectoryA.KERNEL32(00000000,?,004996A2,00000000,00499875,?,?,00000005,00000000,004998A9,?,?,00000000), ref: 00407703
                                          • Part of subcall function 0042D89C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D92A,?,?,?,00000001,?,0045681A,00000000,00456882), ref: 0042D8D1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                        • String ID: .dat$.msg$IMsg$Uninstall
                                        • API String ID: 3312786188-1660910688
                                        • Opcode ID: b59174c22afc0cb4d84e45ba041c7c5ab1d45157887829cd53cd9da25efcf179
                                        • Instruction ID: 4da38b6a349b60b5a60df07f01633cb26419001f7db46277bbb3aa66fc0d4d29
                                        • Opcode Fuzzy Hash: b59174c22afc0cb4d84e45ba041c7c5ab1d45157887829cd53cd9da25efcf179
                                        • Instruction Fuzzy Hash: A1313074A10114AFCB01FFAACC5295E7B75FB49318B51887AF800A7352EB39AD04CB59
                                        APIs
                                        • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EF2A
                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EF30
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EF59
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressByteCharHandleModuleMultiProcWide
                                        • String ID: ShutdownBlockReasonCreate$user32.dll
                                        • API String ID: 828529508-2866557904
                                        • Opcode ID: 0a1a7f0b35af10bec52672da06a2906d532a44599cf47327945e1bb0849fc05d
                                        • Instruction ID: 50bd107db23699165094570332042a9a2090c4fb9dd7a9a9ac1c8e9692f1be1d
                                        • Opcode Fuzzy Hash: 0a1a7f0b35af10bec52672da06a2906d532a44599cf47327945e1bb0849fc05d
                                        • Instruction Fuzzy Hash: D7F0F0E134062237E620B27FAC86F7F55CC8F94729F150036B608EA2C2EA7C9905426F
                                        APIs
                                        • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00458824
                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00458845
                                        • CloseHandle.KERNEL32(?,00458878), ref: 0045886B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                        • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                        • API String ID: 2573145106-3235461205
                                        • Opcode ID: b59af786c083e6c34fb912d8588e02e36760330094b26c60bb33ca54220cd61b
                                        • Instruction ID: 4c05e8df3edacc9d455a33c3a45c96e3e51f685ffe720196e50d624f784124f1
                                        • Opcode Fuzzy Hash: b59af786c083e6c34fb912d8588e02e36760330094b26c60bb33ca54220cd61b
                                        • Instruction Fuzzy Hash: 3E01A274A00204AFDB10FBA98C52A1E73A8EB45715FA0057AFD10F73D2DE39AD048A28
                                        APIs
                                        • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EEC0,00000004,0049B934,004579ED,00457D90,00457944,00000000,00000B06,00000000,00000000,00000000,00000002,00000000), ref: 0042EE12
                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EE18
                                        • InterlockedExchange.KERNEL32(0049D664,00000001), ref: 0042EE29
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressExchangeHandleInterlockedModuleProc
                                        • String ID: ChangeWindowMessageFilter$user32.dll
                                        • API String ID: 3478007392-2498399450
                                        • Opcode ID: 2ae9261505c9f67baa706182e7b3239f9e45ce3b55a3ca64683e2b7ae62260b5
                                        • Instruction ID: 37ab6c1781d9ace597be808b0f82a5ae7151ca86b9dce60fc565c366ef428a29
                                        • Opcode Fuzzy Hash: 2ae9261505c9f67baa706182e7b3239f9e45ce3b55a3ca64683e2b7ae62260b5
                                        • Instruction Fuzzy Hash: 76E0ECB1B41320AAEA1137726C8AF5726559B2471DF950437F108671E2C6FC1C84C91D
                                        APIs
                                        • GetWindowThreadProcessId.USER32(00000000), ref: 00478DE4
                                        • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00478EDB,0049E0AC,00000000), ref: 00478DF7
                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00478DFD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProcProcessThreadWindow
                                        • String ID: AllowSetForegroundWindow$user32.dll
                                        • API String ID: 1782028327-3855017861
                                        • Opcode ID: baaddf851ddbcde89e908f2650d0d7dd5a96bc2ff5b27e890b2c54087906d01e
                                        • Instruction ID: c95bb4f0dd120990503e7052118a19d741abdcedadff55ee9c16c600a1fe714f
                                        • Opcode Fuzzy Hash: baaddf851ddbcde89e908f2650d0d7dd5a96bc2ff5b27e890b2c54087906d01e
                                        • Instruction Fuzzy Hash: EFD09EB168060165E910B3B69D4AE9B235C89847647248C3FB458E2586DF7CD894457D
                                        APIs
                                        • BeginPaint.USER32(00000000,?), ref: 004170A2
                                        • SaveDC.GDI32(?), ref: 004170D3
                                        • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00417195), ref: 00417134
                                        • RestoreDC.GDI32(?,?), ref: 0041715B
                                        • EndPaint.USER32(00000000,?,0041719C,00000000,00417195), ref: 0041718F
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Paint$BeginClipExcludeRectRestoreSave
                                        • String ID:
                                        • API String ID: 3808407030-0
                                        • Opcode ID: d3cb791d7785fb4fc35c1181fb0c895e71633609ec102f90fedaf0bd5e116ec9
                                        • Instruction ID: 2d0e89e5730252ba578d2efb55dda1d595b63161fefa896777b830b1b9f6ffa1
                                        • Opcode Fuzzy Hash: d3cb791d7785fb4fc35c1181fb0c895e71633609ec102f90fedaf0bd5e116ec9
                                        • Instruction Fuzzy Hash: 9B412170A08204AFDB04DFA5C985FAA77F9FF48314F1544AEE4059B362C7789D85CB18
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eea1a8f7c9869be2cd73ede4559f3beb1d50bc075a71ac7122178a7397227914
                                        • Instruction ID: f067b59d413d1c4671d71e094a7f62e666ee1dcd53ee7561759f320ec3b01eff
                                        • Opcode Fuzzy Hash: eea1a8f7c9869be2cd73ede4559f3beb1d50bc075a71ac7122178a7397227914
                                        • Instruction Fuzzy Hash: 6F314F70605740AFC720EF69D984BABB7E8AF89314F04891EF9D5C7751D638EC808B59
                                        APIs
                                        • GetSystemMetrics.USER32(0000000B), ref: 0041C01A
                                        • GetSystemMetrics.USER32(0000000C), ref: 0041C024
                                        • GetDC.USER32(00000000), ref: 0041C062
                                        • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041C0A9
                                        • DeleteObject.GDI32(00000000), ref: 0041C0EA
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: MetricsSystem$BitmapCreateDeleteObject
                                        • String ID:
                                        • API String ID: 1095203571-0
                                        • Opcode ID: e9779dfffb4f21f61e506df0ae377518d2b748fc237c0f7807fdb933fd26a7eb
                                        • Instruction ID: f919feb2cfdf9cb53746996a9db251afb7e4286801c3fccb61a5d2ca1bdc7bf1
                                        • Opcode Fuzzy Hash: e9779dfffb4f21f61e506df0ae377518d2b748fc237c0f7807fdb933fd26a7eb
                                        • Instruction Fuzzy Hash: A3313E74A40205EFDB04DFA5C981AAEB7F5EB48704F11856AF510AB381D7789E80DB98
                                        APIs
                                        • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429C58
                                        • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429C87
                                        • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429CA3
                                        • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 00429CCE
                                        • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 00429CEC
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 5ef5cab32e95011e4c7cfb0abff5a7214c11a7d164d3b5ed8cb8a22c4c4654b6
                                        • Instruction ID: 0478e77fbb77d274a7bfb783d11adee83c5a4069cdde94f0426c34ba09fc350e
                                        • Opcode Fuzzy Hash: 5ef5cab32e95011e4c7cfb0abff5a7214c11a7d164d3b5ed8cb8a22c4c4654b6
                                        • Instruction Fuzzy Hash: 222190707107147AE710AFA7DC82F4B76EC9B40704F90443E7906AB2D2DAB8ED41861D
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                        • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                        • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$AllocString
                                        • String ID:
                                        • API String ID: 262959230-0
                                        • Opcode ID: 67daf853af92f19bd36af3157ccd0aae30d6e3cf77030be0de76c974993ddc75
                                        • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                        • Opcode Fuzzy Hash: 67daf853af92f19bd36af3157ccd0aae30d6e3cf77030be0de76c974993ddc75
                                        • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                        APIs
                                        • SelectPalette.GDI32(00000000,00000000,00000000), ref: 00414869
                                        • RealizePalette.GDI32(00000000), ref: 00414871
                                        • SelectPalette.GDI32(00000000,00000000,00000001), ref: 00414885
                                        • RealizePalette.GDI32(00000000), ref: 0041488B
                                        • ReleaseDC.USER32(00000000,00000000), ref: 00414896
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Palette$RealizeSelect$Release
                                        • String ID:
                                        • API String ID: 2261976640-0
                                        • Opcode ID: fa3b9403a46652b92fdf4541f93f936de0ad42420f7af6617674ce52f43e61da
                                        • Instruction ID: aeb03e62d8ddadf83c94429ec28f403801e3a8d1cb621d3e7bfc21001d019430
                                        • Opcode Fuzzy Hash: fa3b9403a46652b92fdf4541f93f936de0ad42420f7af6617674ce52f43e61da
                                        • Instruction Fuzzy Hash: 3201DF7520C3806AD600B63D8C85A9F6BEC9FCA314F15946EF484DB3C2CA7AC8018761
                                        APIs
                                        • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00407453
                                        • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 004074CD
                                        • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 00407525
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Enum$NameOpenResourceUniversal
                                        • String ID: Z
                                        • API String ID: 3604996873-1505515367
                                        • Opcode ID: ef725f5677505cc1ece444b72ce86a205eac34b3eeee73834d2775d04d947be5
                                        • Instruction ID: 2310e9831ee7c99a0a8649866770d0a98cc310fb2cf5807583ec8a4e9daa3455
                                        • Opcode Fuzzy Hash: ef725f5677505cc1ece444b72ce86a205eac34b3eeee73834d2775d04d947be5
                                        • Instruction Fuzzy Hash: 41519070E04208AFDB11DF99C845A9EBBB9EB49314F1448BAE400B72D1D778AE418B5A
                                        APIs
                                        • SetRectEmpty.USER32(?), ref: 0044D626
                                        • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D651
                                        • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D6D9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: DrawText$EmptyRect
                                        • String ID:
                                        • API String ID: 182455014-2867612384
                                        • Opcode ID: 118ce66f65fc30a3616beabd50b84bb536d9a0cd1ba8fe4db387a67cc8cfb132
                                        • Instruction ID: 5f00bac91b28cdab45bfb944687f04cfacea2c0ae70fe3b1c590f7ffbabf3d5b
                                        • Opcode Fuzzy Hash: 118ce66f65fc30a3616beabd50b84bb536d9a0cd1ba8fe4db387a67cc8cfb132
                                        • Instruction Fuzzy Hash: 7C517271E00248AFDB11DFA9C885BDEBBF8AF49304F15847AE805EB252D7389944CB64
                                        APIs
                                        • GetDC.USER32(00000000), ref: 0042F42A
                                          • Part of subcall function 0041A638: CreateFontIndirectA.GDI32(?), ref: 0041A6F7
                                        • SelectObject.GDI32(?,00000000), ref: 0042F44D
                                        • ReleaseDC.USER32(00000000,?), ref: 0042F52C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CreateFontIndirectObjectReleaseSelect
                                        • String ID: ...\
                                        • API String ID: 3133960002-983595016
                                        • Opcode ID: d1b66580af5f8b118005d8afe4c27e7b3c53fe3fbe43e40283f5066ed8c29eea
                                        • Instruction ID: 21909acc4746510f695b318a8719c62c66087a48e53e42bcbae852ee139bb065
                                        • Opcode Fuzzy Hash: d1b66580af5f8b118005d8afe4c27e7b3c53fe3fbe43e40283f5066ed8c29eea
                                        • Instruction Fuzzy Hash: E1314270B00229ABDB11EF9AD851BAEB7F9EB48308F90447BF410A7291C7785E45CA59
                                        APIs
                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00498709,_iu,?,00000000,0045415E), ref: 00454113
                                        • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00498709,_iu,?,00000000,0045415E), ref: 00454123
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseCreateFileHandle
                                        • String ID: .tmp$_iu
                                        • API String ID: 3498533004-10593223
                                        • Opcode ID: 2a078343c1ee0e1e426b7682a7e14f96dd8f6dbcb1786daf15018a65187b9764
                                        • Instruction ID: 59545500d2eeb09234598e35ee9a1648d273934097dc79d2b475452d37d3be57
                                        • Opcode Fuzzy Hash: 2a078343c1ee0e1e426b7682a7e14f96dd8f6dbcb1786daf15018a65187b9764
                                        • Instruction Fuzzy Hash: 8431C570E00209ABCF11EB95C942BEEBBB5AF54309F20452AF900BB3D2D7385F459759
                                        APIs
                                        • GetClassInfoA.USER32(00400000,?,?), ref: 004168CF
                                        • UnregisterClassA.USER32(?,00400000), ref: 004168FB
                                        • RegisterClassA.USER32(?), ref: 0041691E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Class$InfoRegisterUnregister
                                        • String ID: @
                                        • API String ID: 3749476976-2766056989
                                        • Opcode ID: 972889012e988871c021c5b3915c115c32e7dca9cc0b0972fc7e6fa2a96e2fd7
                                        • Instruction ID: c7ae62685634f2feb307fa6559a912500e41153472d9d2bb59c10c8b55fc2cbc
                                        • Opcode Fuzzy Hash: 972889012e988871c021c5b3915c115c32e7dca9cc0b0972fc7e6fa2a96e2fd7
                                        • Instruction Fuzzy Hash: C6318E706043008BDB10EF68C885B9B77E9AB89308F00457FF985DB392DB39DD458B5A
                                        APIs
                                        • GetFileAttributesA.KERNEL32(00000000,0049A448,00000000,00499BEE,?,?,00000000,0049D62C), ref: 00499B68
                                        • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,0049A448,00000000,00499BEE,?,?,00000000,0049D62C), ref: 00499B91
                                        • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00499BAA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: File$Attributes$Move
                                        • String ID: isRS-%.3u.tmp
                                        • API String ID: 3839737484-3657609586
                                        • Opcode ID: 88eac6fa2fd00287dbaa55a3b9bd3a1b65409462b653a3bc96acdfff81af7d31
                                        • Instruction ID: 0b841a000e743cb9e8da0cfb8565bc532e10ded45a2cf007f5af54a585f9ef1c
                                        • Opcode Fuzzy Hash: 88eac6fa2fd00287dbaa55a3b9bd3a1b65409462b653a3bc96acdfff81af7d31
                                        • Instruction Fuzzy Hash: 54212171D14119ABCF00EBA9D881AAFBBB8BB58314F11457EA814B72D1D63C6E018A59
                                        APIs
                                          • Part of subcall function 0042CC54: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042CC78
                                          • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                          • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                        • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 004573EC
                                        • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00457419
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                        • String ID: LoadTypeLib$RegisterTypeLib
                                        • API String ID: 1312246647-2435364021
                                        • Opcode ID: 18df84fe9d86e2862f6386675fb05e4dd3e507c86707e069f339337bab75705e
                                        • Instruction ID: 195147ed2e8b8ae7ced7006412bb8845aee82bd7b9f018cfdf51d436bcb33606
                                        • Opcode Fuzzy Hash: 18df84fe9d86e2862f6386675fb05e4dd3e507c86707e069f339337bab75705e
                                        • Instruction Fuzzy Hash: C911D630B04204BFDB01DFA6DC51A4EBBADEB4A305F108076FD04D3652DA389E04C618
                                        APIs
                                        • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 0045796A
                                        • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 00457A07
                                        Strings
                                        • Failed to create DebugClientWnd, xrefs: 004579D0
                                        • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00457996
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                        • API String ID: 3850602802-3720027226
                                        • Opcode ID: 96d37884a0109ccc9dd8bbdd55bd34cbe6755c3aabe39c11de9650ea9973cdf2
                                        • Instruction ID: b12cfe17c44d9b7297a0742d7ace06ebf4c30bfebd2037bde928bbf0dce3c7c1
                                        • Opcode Fuzzy Hash: 96d37884a0109ccc9dd8bbdd55bd34cbe6755c3aabe39c11de9650ea9973cdf2
                                        • Instruction Fuzzy Hash: 1311C4B16082509BE310AB299C81B5F77949B54319F04443BF9849F383D3B99C18C7AE
                                        APIs
                                          • Part of subcall function 00424714: SetWindowTextA.USER32(?,00000000), ref: 0042472C
                                        • GetFocus.USER32 ref: 0047999F
                                        • GetKeyState.USER32(0000007A), ref: 004799B1
                                        • WaitMessage.USER32(?,00000000,004799D8,?,00000000,004799FF,?,?,00000001,00000000,?,?,0048174F,00000000,00482671), ref: 004799BB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: FocusMessageStateTextWaitWindow
                                        • String ID: Wnd=$%x
                                        • API String ID: 1381870634-2927251529
                                        • Opcode ID: c7714a687ecd515da0b3d99d6b7bbb34f6b1e8ac2199ab9b74b109a4a99a3c73
                                        • Instruction ID: 0ce6ec70c77c992717eb959f135b56f98f7128e6f958ad4e09c8363bf76ba6b5
                                        • Opcode Fuzzy Hash: c7714a687ecd515da0b3d99d6b7bbb34f6b1e8ac2199ab9b74b109a4a99a3c73
                                        • Instruction Fuzzy Hash: 0511A3B0604244AFDB00FF69D842ADEB7B8EB49704B51C5BBF508E7381D738AD00CA69
                                        APIs
                                        • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046F430
                                        • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046F43F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Time$File$LocalSystem
                                        • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                        • API String ID: 1748579591-1013271723
                                        • Opcode ID: b3309c05ae6708dc9511693656f5da53199351be95235e45feba58672e8eaade
                                        • Instruction ID: b1f3f51ab816b97a6d4fd488e4796d5760ecc8acc51059d8482d4647201c4143
                                        • Opcode Fuzzy Hash: b3309c05ae6708dc9511693656f5da53199351be95235e45feba58672e8eaade
                                        • Instruction Fuzzy Hash: F111F5A040C3919AD340DF2AC44072BBAE4AB99708F44896FF9C8D6381E779C948DB67
                                        APIs
                                        • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 004546EB
                                          • Part of subcall function 004073A0: DeleteFileA.KERNEL32(00000000,0049D62C,00499FD9,00000000,0049A02E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 004073AB
                                        • MoveFileA.KERNEL32(00000000,00000000), ref: 00454710
                                          • Part of subcall function 00453C04: GetLastError.KERNEL32(00000000,00454799,00000005,00000000,004547CE,?,?,00000000,0049D62C,00000004,00000000,00000000,00000000,?,00499C8D,00000000), ref: 00453C07
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: File$AttributesDeleteErrorLastMove
                                        • String ID: DeleteFile$MoveFile
                                        • API String ID: 3024442154-139070271
                                        • Opcode ID: cd51b7d6411f51ddff926bfb4089fa62fb2906befb808aa5ea3769e8c14f62c4
                                        • Instruction ID: 274a2e09890dd6abd1f20e60e4879b25532b4b8e44e7f96c1dbb1ac345d4d7c6
                                        • Opcode Fuzzy Hash: cd51b7d6411f51ddff926bfb4089fa62fb2906befb808aa5ea3769e8c14f62c4
                                        • Instruction Fuzzy Hash: 53F08B746141445BE701FBA5D94265FA7ECEB8431EF50403BB800BB6C3DB3C9D08492D
                                        APIs
                                          • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                                        • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00484FF1
                                        • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00485014
                                        Strings
                                        • System\CurrentControlSet\Control\Windows, xrefs: 00484FBE
                                        • CSDVersion, xrefs: 00484FE8
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseOpenQueryValue
                                        • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                        • API String ID: 3677997916-1910633163
                                        • Opcode ID: 8d7ca411ea9e754ca79f01cf2f30b9d2c9f8e2d0c9492ca206519446712ee48d
                                        • Instruction ID: 3d9820a6fde95d05ac542d305ffe0a0e534a7c1f4e1b62a11fb8fb702f882c01
                                        • Opcode Fuzzy Hash: 8d7ca411ea9e754ca79f01cf2f30b9d2c9f8e2d0c9492ca206519446712ee48d
                                        • Instruction Fuzzy Hash: E7F04975A40608E6DF10FAD18C55BDF73BCAB05704F604967E510E7281E7399A049BAE
                                        APIs
                                          • Part of subcall function 0044BB28: LoadLibraryA.KERNEL32(00000000,00000000,0044BF0B,?,?,?,?,00000000,00000000,?,0044FD4D,0049A4DA), ref: 0044BB8A
                                          • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044BBA2
                                          • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044BBB4
                                          • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044BBC6
                                          • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044BBD8
                                          • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044BBEA
                                          • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044BBFC
                                          • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044BC0E
                                          • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044BC20
                                          • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044BC32
                                          • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044BC44
                                          • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044BC56
                                          • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044BC68
                                          • Part of subcall function 0044BB28: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044BC7A
                                          • Part of subcall function 004651E8: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004651FB
                                        • LoadLibraryA.KERNEL32(00000000,SHPathPrepareForWriteA,00000000,0046528A,?,?,?,?,00000000,00000000,?,0049A502), ref: 0046525F
                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00465265
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressProc$LibraryLoad$DirectorySystem
                                        • String ID: SHPathPrepareForWriteA$shell32.dll
                                        • API String ID: 1442766254-2683653824
                                        • Opcode ID: 19c949dbb77f1a78b4d411d9c1a27eb2db95fd8b53bd2c0869d9e8e17518ae75
                                        • Instruction ID: 415eb7409d81aa8454bb2dd4c72fa8b3e514a75415032da6adba06dceafb32ff
                                        • Opcode Fuzzy Hash: 19c949dbb77f1a78b4d411d9c1a27eb2db95fd8b53bd2c0869d9e8e17518ae75
                                        • Instruction Fuzzy Hash: F5F04470640A08BFD700FB62DC53F5E7BACEB45718FA044B7B400B6591EA7C9E04892D
                                        APIs
                                          • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459C9D,00000000,00459E55,?,00000000,00000000,00000000), ref: 00459BAD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseOpen
                                        • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                        • API String ID: 47109696-2631785700
                                        • Opcode ID: deea85188aa12689871c1150ceca2f68809688995ae8b7fb4ba5acb78cb4dab7
                                        • Instruction ID: 9ff5366a1843594bb80037a440052cb9e88b760eaf161db27522a6c9f4c26c6f
                                        • Opcode Fuzzy Hash: deea85188aa12689871c1150ceca2f68809688995ae8b7fb4ba5acb78cb4dab7
                                        • Instruction Fuzzy Hash: 2AF0AF31300121EBEB10EB17AC41B5E6789DB91316F18443BFA81C7253F6BCDC46862E
                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,004542C2,00000000,00454365,?,?,00000000,00000000,00000000,00000000,00000000,?,00454755,00000000), ref: 0042DD5A
                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042DD60
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                        • API String ID: 1646373207-4063490227
                                        • Opcode ID: 5abbe40046ba00350f24005cef1803a495b962ffc597d09d0b22329c5a666800
                                        • Instruction ID: 2c7f72bc3db4c40d16b1b765d912767d34fa58fe4c646cc18e222b4ed7f6fe44
                                        • Opcode Fuzzy Hash: 5abbe40046ba00350f24005cef1803a495b962ffc597d09d0b22329c5a666800
                                        • Instruction Fuzzy Hash: 0FE02660B60F1113D70071BA5C8379B208D4B84718F90043F3984F52C6DDBDD9490A6E
                                        APIs
                                        • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EF20), ref: 0042EFB2
                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EFB8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: ShutdownBlockReasonDestroy$user32.dll
                                        • API String ID: 1646373207-260599015
                                        • Opcode ID: baf4c7a8591a40d7dc6da6f15e5b4dc27338d30cfca151258ddc16df194b77c5
                                        • Instruction ID: 02ec898c6c75b1ba26151a3eebd585b8454ae7040b346800783755fde70e6890
                                        • Opcode Fuzzy Hash: baf4c7a8591a40d7dc6da6f15e5b4dc27338d30cfca151258ddc16df194b77c5
                                        • Instruction Fuzzy Hash: 01D0A993302B3332AA1071FB3DC19BB02CC8D202AA3670033F600E2280EA8CCC4012AC
                                        APIs
                                        • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,0049A4DA), ref: 0044FD57
                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044FD5D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: NotifyWinEvent$user32.dll
                                        • API String ID: 1646373207-597752486
                                        • Opcode ID: 21449735c4530238711e5baf3f7e6c6119c4b5ed48e58139290ccade4ce38153
                                        • Instruction ID: af032255d430417ffea63134fe83afc5c4b4dbba1536058c56e775f9f11b8dd5
                                        • Opcode Fuzzy Hash: 21449735c4530238711e5baf3f7e6c6119c4b5ed48e58139290ccade4ce38153
                                        • Instruction Fuzzy Hash: B2E012E0E417449AFB00BBB96D467193AD0EF6471DF10007FB540A6291C77C44489B1D
                                        APIs
                                        • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,0049A530,00000001,00000000,0049A554), ref: 0049A25A
                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0049A260
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: DisableProcessWindowsGhosting$user32.dll
                                        • API String ID: 1646373207-834958232
                                        • Opcode ID: 51550ffda035ac84042d4bddea94f20537adf7cd2f58fd56988f617bc6aacde1
                                        • Instruction ID: dac1c8ebddd32ae9bf6a035aad1c8d1f3cf840f271d0053423bdda14aa0d062e
                                        • Opcode Fuzzy Hash: 51550ffda035ac84042d4bddea94f20537adf7cd2f58fd56988f617bc6aacde1
                                        • Instruction Fuzzy Hash: 09B09281686A01509C4033F20C06A1B0E08484171871800B73400F12C6CE6E842404FF
                                        APIs
                                          • Part of subcall function 0042F2BC: GetTickCount.KERNEL32 ref: 0042F2C2
                                          • Part of subcall function 0042F0D8: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042F10D
                                        • GetLastError.KERNEL32(00000000,004768B9,?,?,0049E1E4,00000000), ref: 004767A2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CountErrorFileLastMoveTick
                                        • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                        • API String ID: 2406187244-2685451598
                                        • Opcode ID: 60709b24bbd29ecba445f14f57d2c4ad189bd31ebd78b2e227524017e35208ed
                                        • Instruction ID: 03a236e7dc5f504d91790a0ce298dd5dba96fa6117a2cc3ee4ad00c9fc2b7c38
                                        • Opcode Fuzzy Hash: 60709b24bbd29ecba445f14f57d2c4ad189bd31ebd78b2e227524017e35208ed
                                        • Instruction Fuzzy Hash: 53418474A006098BCB00EFA5D882ADE77B9EF48314F52853BE414B7391D7389E05CBAD
                                        APIs
                                        • GetDesktopWindow.USER32 ref: 00414196
                                        • GetDesktopWindow.USER32 ref: 0041424E
                                          • Part of subcall function 00419310: 6F59C6F0.COMCTL32(00000000,?,0041427E,?,?,?,?,00413F43,00000000,00413F56), ref: 0041932C
                                          • Part of subcall function 00419310: ShowCursor.USER32(00000001,00000000,?,0041427E,?,?,?,?,00413F43,00000000,00413F56), ref: 00419349
                                        • SetCursor.USER32(00000000,?,?,?,?,00413F43,00000000,00413F56), ref: 0041428C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CursorDesktopWindow$Show
                                        • String ID:
                                        • API String ID: 2074268717-0
                                        • Opcode ID: cfce6284985b2a2f885b46e24aab87199b3bad27be3208afe6f8a3dae0a7e5f2
                                        • Instruction ID: 6a264f145c0982e92da272f414c83554030b66ece25ea6070dcdf00fca6814f6
                                        • Opcode Fuzzy Hash: cfce6284985b2a2f885b46e24aab87199b3bad27be3208afe6f8a3dae0a7e5f2
                                        • Instruction Fuzzy Hash: 30414170A10151AFC710EF6DDD89B5677E5ABA9318B05807BE409CB366C738DC81CB1D
                                        APIs
                                        • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408EC5
                                        • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408F34
                                        • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408FCF
                                        • MessageBoxA.USER32(00000000,?,?,00002010), ref: 0040900E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: LoadString$FileMessageModuleName
                                        • String ID:
                                        • API String ID: 704749118-0
                                        • Opcode ID: 6a14109298dd6aa5b23f5014bc90c14a5f309fa4690e2bc273b58c6e1dd153b9
                                        • Instruction ID: d606a76aa49eec759d07c5becdfef17a6c6b9766ea912d15a143196380f0994c
                                        • Opcode Fuzzy Hash: 6a14109298dd6aa5b23f5014bc90c14a5f309fa4690e2bc273b58c6e1dd153b9
                                        • Instruction Fuzzy Hash: C73162706083815AD330EB65C945BDBB7D99F8A304F00483FB6C8D72D2DB799904876B
                                        APIs
                                        • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044EEE5
                                          • Part of subcall function 0044D528: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044D55A
                                        • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044EF69
                                          • Part of subcall function 0042C004: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042C018
                                        • IsRectEmpty.USER32(?), ref: 0044EF2B
                                        • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044EF4E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                        • String ID:
                                        • API String ID: 855768636-0
                                        • Opcode ID: 975d6f0bacda975cfe83ce1eab8afcd9494905b79e3112c8c9d866416d3664bd
                                        • Instruction ID: 5be5a2c99a49a2f339bd726f9f517b743d06364a043e5a66e7e3b57b404dc1d6
                                        • Opcode Fuzzy Hash: 975d6f0bacda975cfe83ce1eab8afcd9494905b79e3112c8c9d866416d3664bd
                                        • Instruction Fuzzy Hash: 5B118C3170031027E610BA7E8C82B5F66C99B88748F01483FB60AEB387DDB8DC09835E
                                        APIs
                                        • OffsetRect.USER32(?,?,00000000), ref: 00497270
                                        • OffsetRect.USER32(?,00000000,?), ref: 0049728B
                                        • OffsetRect.USER32(?,?,00000000), ref: 004972A5
                                        • OffsetRect.USER32(?,00000000,?), ref: 004972C0
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: OffsetRect
                                        • String ID:
                                        • API String ID: 177026234-0
                                        • Opcode ID: 1a73e688525ba1e930e3dbf3898af9d30e9465d405d6debb224a7eeb0afca85c
                                        • Instruction ID: e718e50738441f611e1ccbf74e0cde98489d487b8bfa6672397ae6e260ffa509
                                        • Opcode Fuzzy Hash: 1a73e688525ba1e930e3dbf3898af9d30e9465d405d6debb224a7eeb0afca85c
                                        • Instruction Fuzzy Hash: BE214FB67142016BCB00DF69CD85E5BB7EEEBD4340F14CA2AF544C728AD634E9448796
                                        APIs
                                        • GetCursorPos.USER32 ref: 004176B0
                                        • SetCursor.USER32(00000000), ref: 004176F3
                                        • GetLastActivePopup.USER32(?), ref: 0041771D
                                        • GetForegroundWindow.USER32(?), ref: 00417724
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Cursor$ActiveForegroundLastPopupWindow
                                        • String ID:
                                        • API String ID: 1959210111-0
                                        • Opcode ID: 6c3ac19022b264060b45d73ebcd70729185e734ffe6bab55d55db2cfe9612f2c
                                        • Instruction ID: dbcb3e4d6cdf237ebd373b45723c7518e1d79ef9827cdcdbbe1e0fb97faef126
                                        • Opcode Fuzzy Hash: 6c3ac19022b264060b45d73ebcd70729185e734ffe6bab55d55db2cfe9612f2c
                                        • Instruction Fuzzy Hash: 8121CF303086018BC710EF29D980ADB73B1AB44768F52447BE8688B392D73DEC81CA8D
                                        APIs
                                        • MulDiv.KERNEL32(8B500000,00000008,?), ref: 00496ED9
                                        • MulDiv.KERNEL32(50142444,00000008,?), ref: 00496EED
                                        • MulDiv.KERNEL32(F6E65FE8,00000008,?), ref: 00496F01
                                        • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 00496F1F
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 865696dda9c04e972e54b31ac7a717d8d8d580924cf1526e353e6871edb84c7d
                                        • Instruction ID: e3308cc84e827548128d2b2e4dd5895a6eb2c6c5d9673f95432de963ba277a10
                                        • Opcode Fuzzy Hash: 865696dda9c04e972e54b31ac7a717d8d8d580924cf1526e353e6871edb84c7d
                                        • Instruction Fuzzy Hash: CB113372604204AFCF40DFA9D8C4D9B7BECEF4D324B15516AF918DB24AD634ED408BA4
                                        APIs
                                        • GetClassInfoA.USER32(00400000,0041F8C0,?), ref: 0041F8F1
                                        • UnregisterClassA.USER32(0041F8C0,00400000), ref: 0041F91A
                                        • RegisterClassA.USER32(0049B598), ref: 0041F924
                                        • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F95F
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Class$InfoLongRegisterUnregisterWindow
                                        • String ID:
                                        • API String ID: 4025006896-0
                                        • Opcode ID: 2c6c52059b860e5687bb0614cf61ad31389445ce60e69e295929954b72f96d02
                                        • Instruction ID: 2f8fb42507e3cd1bc96778dfed7eead12d65e2047fb8f4462c71738803dd6c65
                                        • Opcode Fuzzy Hash: 2c6c52059b860e5687bb0614cf61ad31389445ce60e69e295929954b72f96d02
                                        • Instruction Fuzzy Hash: B7012DB16141047BCB10FBA8ED81E9A379CD719318B11423BB505E72A1D739D8168BAC
                                        APIs
                                        • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D477
                                        • LoadResource.KERNEL32(00400000,72756F73,0040AC18,00400000,00000001,00000000,?,0040D3D4,00000000,?,00000000,?,?,0047DE64,0000000A,00000000), ref: 0040D491
                                        • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040AC18,00400000,00000001,00000000,?,0040D3D4,00000000,?,00000000,?,?,0047DE64), ref: 0040D4AB
                                        • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040AC18,00400000,00000001,00000000,?,0040D3D4,00000000,?,00000000,?), ref: 0040D4B5
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Resource$FindLoadLockSizeof
                                        • String ID:
                                        • API String ID: 3473537107-0
                                        • Opcode ID: 073da2e1467bd4923794a1699de9deb8666d8abafae58723814b459cf24724ae
                                        • Instruction ID: 736189130eb46f944708fe8ab0dcf7c2da2e7d83e7efdb8d5663637d3260b2f8
                                        • Opcode Fuzzy Hash: 073da2e1467bd4923794a1699de9deb8666d8abafae58723814b459cf24724ae
                                        • Instruction Fuzzy Hash: FCF04FB3A005046F8B04EE9DA881D5B76DCDE88364310013AFD08EB282DA38DD018B78
                                        APIs
                                        • RtlInitializeCriticalSection.KERNEL32(0049D420,00000000,00401A82,?,?,0040222E,02152B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                        • RtlEnterCriticalSection.KERNEL32(0049D420,0049D420,00000000,00401A82,?,?,0040222E,02152B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                        • LocalAlloc.KERNEL32(00000000,00000FF8,0049D420,00000000,00401A82,?,?,0040222E,02152B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                        • RtlLeaveCriticalSection.KERNEL32(0049D420,00401A89,00000000,00401A82,?,?,0040222E,02152B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                        • String ID:
                                        • API String ID: 730355536-0
                                        • Opcode ID: af9432a4a2f11b04810e4d66a6e0dd8d5d7e21dce30ad7e75a74316efdc90f86
                                        • Instruction ID: 7339f3ebbe1eed2a5a633cb922c09bf0bd68a71b88021a6e55e3f3fb74b7268e
                                        • Opcode Fuzzy Hash: af9432a4a2f11b04810e4d66a6e0dd8d5d7e21dce30ad7e75a74316efdc90f86
                                        • Instruction Fuzzy Hash: AB01CCB0E482405EFB19AF699902B293FD4D799748F51803BF441A7AF1CA7C6840CB2E
                                        APIs
                                          • Part of subcall function 0042E26C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00484FCF,?,00000001,?,?,00484FCF,?,00000001,00000000), ref: 0042E288
                                        • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045BFAA,?,?,?,?,?,00000000,0045BFD1), ref: 00456574
                                        • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045BFAA,?,?,?,?,?,00000000), ref: 0045657D
                                        • RemoveFontResourceA.GDI32(00000000), ref: 0045658A
                                        • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 0045659E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                        • String ID:
                                        • API String ID: 4283692357-0
                                        • Opcode ID: 18bbce5fff6d48609ef0ee32c883151f01d971de8c147fc0902137a50bd33190
                                        • Instruction ID: 60fc6220e6421739c6cddc48edde2e304ed69df2a150d613f8e8855ad9854c81
                                        • Opcode Fuzzy Hash: 18bbce5fff6d48609ef0ee32c883151f01d971de8c147fc0902137a50bd33190
                                        • Instruction Fuzzy Hash: 27F054B174531076EA10B6B6AC47F5B22CC8F54749F54483A7604EB2C3D57CDD04966D
                                        APIs
                                        • GetLastError.KERNEL32(00000000,00000000), ref: 00470CA1
                                        Strings
                                        • Setting NTFS compression on directory: %s, xrefs: 00470C6F
                                        • Unsetting NTFS compression on directory: %s, xrefs: 00470C87
                                        • Failed to set NTFS compression state (%d)., xrefs: 00470CB2
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLast
                                        • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                        • API String ID: 1452528299-1392080489
                                        • Opcode ID: dfbe84044b29f3d57c509b65a983513d49cbe1f7a65d8e2e78e9d92552162f9b
                                        • Instruction ID: 2f8c6a7a6e35e8588bbb9e762321129d74c961a1f58895d436786832a4f1a68a
                                        • Opcode Fuzzy Hash: dfbe84044b29f3d57c509b65a983513d49cbe1f7a65d8e2e78e9d92552162f9b
                                        • Instruction Fuzzy Hash: 04018B30D09248AACB15D7ED94812DDFBE89F0D305F54C1EFA459E7342DF790A08879A
                                        APIs
                                        • GetLastError.KERNEL32(?,00000000), ref: 0047144D
                                        Strings
                                        • Unsetting NTFS compression on file: %s, xrefs: 00471433
                                        • Setting NTFS compression on file: %s, xrefs: 0047141B
                                        • Failed to set NTFS compression state (%d)., xrefs: 0047145E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLast
                                        • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                        • API String ID: 1452528299-3038984924
                                        • Opcode ID: fe182551a98f743fcb6dc7018ea21a6c51c49eaeb083c5d16317d3ad1726425c
                                        • Instruction ID: a30ff693f52cd42e459b797e94763e7277481e0955e0c4e592f957c66b82d28b
                                        • Opcode Fuzzy Hash: fe182551a98f743fcb6dc7018ea21a6c51c49eaeb083c5d16317d3ad1726425c
                                        • Instruction Fuzzy Hash: 41016730D0424866CB1497AD64422DDBBE89F4D315F94C1EFA458E7352DE790A0887AA
                                        APIs
                                        • GetCurrentProcess.KERNEL32(00000008,?,?,00000001,00000000,00000002,00000000,00482671,?,?,?,?,?,0049A5C3,00000000,0049A5EB), ref: 00479455
                                        • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,00000001,00000000,00000002,00000000,00482671,?,?,?,?,?,0049A5C3,00000000), ref: 0047945B
                                        • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,00000001,00000000,00000002,00000000,00482671), ref: 0047947D
                                        • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,00000001,00000000,00000002,00000000,00482671), ref: 0047948E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                        • String ID:
                                        • API String ID: 215268677-0
                                        • Opcode ID: 6d49464bdbc91184ad7f6ac62fff289a707b850c7d11bd8742fde9f2fb834cc3
                                        • Instruction ID: 6505384fcc0360b3c734b71afb4e1a1a4ab6f9baee95e57f14d901b11eacad59
                                        • Opcode Fuzzy Hash: 6d49464bdbc91184ad7f6ac62fff289a707b850c7d11bd8742fde9f2fb834cc3
                                        • Instruction Fuzzy Hash: 90F030716447006BD600EAB58D82E9B73DCEB44354F04883EBE98CB2C1D678DC08AB76
                                        APIs
                                        • GetLastActivePopup.USER32(?), ref: 0042469C
                                        • IsWindowVisible.USER32(?), ref: 004246AD
                                        • IsWindowEnabled.USER32(?), ref: 004246B7
                                        • SetForegroundWindow.USER32(?), ref: 004246C1
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                        • String ID:
                                        • API String ID: 2280970139-0
                                        • Opcode ID: 6de0995d0e447abcc63ecfbcb3df3be24c1d568dc5660fd48fcf8973f81aa8b9
                                        • Instruction ID: 92c4e0b2622c21c1aafdf32b5a5e60d634be871c9bac48645995030a32fad986
                                        • Opcode Fuzzy Hash: 6de0995d0e447abcc63ecfbcb3df3be24c1d568dc5660fd48fcf8973f81aa8b9
                                        • Instruction Fuzzy Hash: BBE01261B0293157AA31FA7AA885A9F118CDD47BC43460277BC41F7297DB2CDC1045FD
                                        APIs
                                        • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047CE0D,?,00000000,00000000,00000001,00000000,0047B7C1,?,00000000), ref: 0047B785
                                        Strings
                                        • Failed to parse "reg" constant, xrefs: 0047B78C
                                        • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047B5F9
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Close
                                        • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                        • API String ID: 3535843008-1938159461
                                        • Opcode ID: 684bb0749049f9b56ef336efe55875cadaaeb758c41cb9d5aa092f380e5d2a32
                                        • Instruction ID: f1421b174eee6fc7f54e6f8e7a43c19df08b7389384ab18ee26f4796af10067b
                                        • Opcode Fuzzy Hash: 684bb0749049f9b56ef336efe55875cadaaeb758c41cb9d5aa092f380e5d2a32
                                        • Instruction Fuzzy Hash: 89815175E00208AFCB10DFA5D481BDEBBF9EF48354F50816AE454A7391DB38AE05CB99
                                        Strings
                                        • Failed to proceed to next wizard page; showing wizard., xrefs: 0046D9F8
                                        • Failed to proceed to next wizard page; aborting., xrefs: 0046D9E4
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                        • API String ID: 0-1974262853
                                        • Opcode ID: add31560b0341e522612951ad2314b824f5c06f277653e44a4d324fe3becfdea
                                        • Instruction ID: 84e2974eb34e4f2dda2b8c8cb2eefec3d4715c8d151fead2dfc4afe0ae77ca03
                                        • Opcode Fuzzy Hash: add31560b0341e522612951ad2314b824f5c06f277653e44a4d324fe3becfdea
                                        • Instruction Fuzzy Hash: 4D319E70F04204EFD711EB69D989BA977F5EB05304F6500BBE408AB3A2D7786E44CB1A
                                        APIs
                                        • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004508A1
                                        • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004508D2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ExecuteMessageSendShell
                                        • String ID: open
                                        • API String ID: 812272486-2758837156
                                        • Opcode ID: ecebf72486316a37e3830fd15e4a4b51011a10e5760c3bac1abab3b5df80333e
                                        • Instruction ID: f57ce05e9eba324e121f638db0535f08eb0d68243c76b72727f5d658c61a4d86
                                        • Opcode Fuzzy Hash: ecebf72486316a37e3830fd15e4a4b51011a10e5760c3bac1abab3b5df80333e
                                        • Instruction Fuzzy Hash: 4C216075E00604BFDB00EFA9C981E9EB7F8EB44705F10817AB904F7292D7789A45CB88
                                        APIs
                                        • ShellExecuteEx.SHELL32(0000003C), ref: 00455A94
                                        • GetLastError.KERNEL32(0000003C,00000000,00455ADD,?,?,?), ref: 00455AA5
                                          • Part of subcall function 0042DD14: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD27
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: DirectoryErrorExecuteLastShellSystem
                                        • String ID: <
                                        • API String ID: 893404051-4251816714
                                        • Opcode ID: d516e6598b8be20c8747e6ec9c3ac67b1ec18d9ef1beef7a885f0700c60fe9ff
                                        • Instruction ID: 1dd1e4a4b05f96b02f6cdc30b2026c57645841094811f513de853399c4f5318c
                                        • Opcode Fuzzy Hash: d516e6598b8be20c8747e6ec9c3ac67b1ec18d9ef1beef7a885f0700c60fe9ff
                                        • Instruction Fuzzy Hash: 482151B0A00649AFDB00DF65D8926AE7BE8EF08345F50413BF844E7281E7789E49CB58
                                        APIs
                                        • RtlEnterCriticalSection.KERNEL32(0049D420,00000000,)), ref: 004025C7
                                        • RtlLeaveCriticalSection.KERNEL32(0049D420,0040263D), ref: 00402630
                                          • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049D420,00000000,00401A82,?,?,0040222E,02152B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                          • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049D420,0049D420,00000000,00401A82,?,?,0040222E,02152B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                          • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049D420,00000000,00401A82,?,?,0040222E,02152B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                          • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049D420,00401A89,00000000,00401A82,?,?,0040222E,02152B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                        • String ID: )
                                        • API String ID: 2227675388-1084416617
                                        • Opcode ID: 6cd487279c882ad8b73ab70f6921dc77a3e8d3550fda99517b88d6d0f9ae5c50
                                        • Instruction ID: 570f99ef1d3d95e4b4d80a2adc1962b98f522b57bc72750d6ce688ebb538822c
                                        • Opcode Fuzzy Hash: 6cd487279c882ad8b73ab70f6921dc77a3e8d3550fda99517b88d6d0f9ae5c50
                                        • Instruction Fuzzy Hash: CE110131B042046FEB25AF799F1A62AAAD4D79575CB64087FF404F32D2D9BD9C02826C
                                        APIs
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00498451
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Window
                                        • String ID: /INITPROCWND=$%x $@
                                        • API String ID: 2353593579-4169826103
                                        • Opcode ID: 3a83e6e038dbafd0e3ea01eb6dd6426255c1a8b46f58718dc6178500fe069b44
                                        • Instruction ID: a9318bdce5e824465d4436be78f64917a5ae5ef5b8220d929174e0d313b11457
                                        • Opcode Fuzzy Hash: 3a83e6e038dbafd0e3ea01eb6dd6426255c1a8b46f58718dc6178500fe069b44
                                        • Instruction Fuzzy Hash: EF119370A082059FDB01DBA9D851BAEBBE8EF49314F11847BE504E7292EA3C99058B58
                                        APIs
                                          • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                          • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                        • SysFreeString.OLEAUT32(?), ref: 00447966
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: String$AllocByteCharFreeMultiWide
                                        • String ID: NIL Interface Exception$Unknown Method
                                        • API String ID: 3952431833-1023667238
                                        • Opcode ID: ea7a85b9692c4460c5906b58765fb64bf6ee6b5f46e4d7caecedcff591b2af5e
                                        • Instruction ID: 10ddd43a001eab7360299ad3f405319ab988bcee1c7d5b08318f9ee426dd8228
                                        • Opcode Fuzzy Hash: ea7a85b9692c4460c5906b58765fb64bf6ee6b5f46e4d7caecedcff591b2af5e
                                        • Instruction Fuzzy Hash: 9211E9716042089FEB10EFA58D51A6FBBBDEB09304F91403AF500F7281C7789D01C769
                                        APIs
                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00497D50,?,00497D44,00000000,00497D2B), ref: 00497CF6
                                        • CloseHandle.KERNEL32(00497D90,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00497D50,?,00497D44,00000000), ref: 00497D0D
                                          • Part of subcall function 00497BE0: GetLastError.KERNEL32(00000000,00497C78,?,?,?,?), ref: 00497C04
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CloseCreateErrorHandleLastProcess
                                        • String ID: D
                                        • API String ID: 3798668922-2746444292
                                        • Opcode ID: a880bfa9a77c93c91fa9ab75ae7060b7f78cb32e3cfe05dc5138aae6885ad4e0
                                        • Instruction ID: a89f5070db7a5e6d261d16ca7c1b7ea99db6432e353ebe52f8e4aa70fd7af1a9
                                        • Opcode Fuzzy Hash: a880bfa9a77c93c91fa9ab75ae7060b7f78cb32e3cfe05dc5138aae6885ad4e0
                                        • Instruction Fuzzy Hash: 1001A1B0608248AFDB00DBA5DC42FAF7BACDF09704F60013BF504E72C1E6785E008668
                                        APIs
                                        • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042E1C8
                                        • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042E208
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Value$EnumQuery
                                        • String ID: Inno Setup: No Icons
                                        • API String ID: 1576479698-2016326496
                                        • Opcode ID: 5fa1588eb3983bc8147b11ac52db8119f930d32b550c0df0fd023eaaf2352da0
                                        • Instruction ID: e7333c3f072e055346127a6a42ec618886ffe365ff3054ef7f5207155727e60c
                                        • Opcode Fuzzy Hash: 5fa1588eb3983bc8147b11ac52db8119f930d32b550c0df0fd023eaaf2352da0
                                        • Instruction Fuzzy Hash: 3C01DB32745371A9F73145137D41B7B65CC8B42B60F64057BF941FA2C1DA68AC0592BE
                                        APIs
                                        • SetFileAttributesA.KERNEL32(00000000,?,00000000,0045362D,?,?,-00000001,?), ref: 00453607
                                        • GetLastError.KERNEL32(00000000,?,00000000,0045362D,?,?,-00000001,?), ref: 0045360F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: AttributesErrorFileLast
                                        • String ID: @8H
                                        • API String ID: 1799206407-3762495883
                                        • Opcode ID: 65c44507f9335e4e2a077e4ee2190135d3d5d768f820153090acd923ffb3f295
                                        • Instruction ID: 2a718f5fbeded0ca4f0ca1a684ecb9b724474f3cd93569f9f0dcaab09f3de9c7
                                        • Opcode Fuzzy Hash: 65c44507f9335e4e2a077e4ee2190135d3d5d768f820153090acd923ffb3f295
                                        • Instruction Fuzzy Hash: 49F0F971A04204BBCB10DF7AAC4249EF7ECDB49362711457BFC14D3342E6784E088598
                                        APIs
                                          • Part of subcall function 0047E3D0: FreeLibrary.KERNEL32(00000000,00482E1B), ref: 0047E3E6
                                          • Part of subcall function 0047E0A8: GetTickCount.KERNEL32 ref: 0047E0F2
                                          • Part of subcall function 00457A90: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 00457AAF
                                        • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,0049A243), ref: 00499941
                                        • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,0049A243), ref: 00499947
                                        Strings
                                        • Detected restart. Removing temporary directory., xrefs: 004998FB
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                        • String ID: Detected restart. Removing temporary directory.
                                        • API String ID: 1717587489-3199836293
                                        • Opcode ID: cf4eeb9d2890f889123e5d43942b6b9d65dcdfa64d28096ccc0edee5f77a06bc
                                        • Instruction ID: 3ff60914118e938cb0b4ccf38de38d34f2fcffefe5e82e60aedbfe03ba6cc694
                                        • Opcode Fuzzy Hash: cf4eeb9d2890f889123e5d43942b6b9d65dcdfa64d28096ccc0edee5f77a06bc
                                        • Instruction Fuzzy Hash: 7DE0E5B12086446EDE1277AB6C1796B3F8CD74A76CB11447FF80491652E82D4C108A3D
                                        APIs
                                        • GetModuleHandleA.KERNEL32(00000000,0049A49E), ref: 0040334B
                                        • GetCommandLineA.KERNEL32(00000000,0049A49E), ref: 00403356
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: CommandHandleLineModule
                                        • String ID: `6V
                                        • API String ID: 2123368496-3162666886
                                        • Opcode ID: 4c2fff2b42c352919ceac1b40f57867521b0a3bfc58f22e25f1018fd897ed554
                                        • Instruction ID: 62cda813ad8590bce7ae974c015f7103e9ff33e1479b40d519804c4e019ae8dd
                                        • Opcode Fuzzy Hash: 4c2fff2b42c352919ceac1b40f57867521b0a3bfc58f22e25f1018fd897ed554
                                        • Instruction Fuzzy Hash: 26C00260D012059AE750AFB6A846B152A94A75934DF8044BFB104BA2E2DA7C82066BDE
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2030314553.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2030240390.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030375236.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030393926.000000000049C000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030410711.000000000049D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004AD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000001.00000002.2030427859.00000000004E6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_msgtopstdemo.jbxd
                                        Similarity
                                        • API ID: ErrorLastSleep
                                        • String ID:
                                        • API String ID: 1458359878-0
                                        • Opcode ID: 162f6e589a9a3ecbf727cd3144cb36b5133ad9a431805f826c669b7668a8d72d
                                        • Instruction ID: 0e0098d5c51f6c3332c54b3c49cab550602dc5c9badc8da443834b62d3c24bba
                                        • Opcode Fuzzy Hash: 162f6e589a9a3ecbf727cd3144cb36b5133ad9a431805f826c669b7668a8d72d
                                        • Instruction Fuzzy Hash: BCF02B32F00914E74F30A76AA88393F628CDA417A6720012BFC04DB303D53CDE0586A8

                                        Execution Graph

                                        Execution Coverage:8.1%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:105
                                        Total number of Limit Nodes:10
                                        execution_graph 17674 dc46f8 17675 dc470a 17674->17675 17680 dc4809 17675->17680 17678 dc4735 17681 dc482d 17680->17681 17689 dc4918 17681->17689 17693 dc4908 17681->17693 17682 dc4716 17685 dc3ea8 17682->17685 17686 dc3eb3 17685->17686 17701 dc5cac 17686->17701 17688 dc7058 17688->17678 17690 dc493f 17689->17690 17691 dc4a1c 17690->17691 17697 dc4528 17690->17697 17695 dc493f 17693->17695 17694 dc4a1c 17694->17694 17695->17694 17696 dc4528 CreateActCtxA 17695->17696 17696->17694 17698 dc59a8 CreateActCtxA 17697->17698 17700 dc5a6b 17698->17700 17702 dc5cb7 17701->17702 17705 dc5ccc 17702->17705 17704 dc7105 17704->17688 17706 dc5cd7 17705->17706 17709 dc5cfc 17706->17709 17708 dc71e2 17708->17704 17710 dc5d07 17709->17710 17713 dc5d2c 17710->17713 17712 dc72e5 17712->17708 17714 dc5d37 17713->17714 17715 dc86d3 17714->17715 17720 dcaa88 17714->17720 17724 dcaa79 17714->17724 17716 dc8711 17715->17716 17728 dcce74 17715->17728 17716->17712 17721 dcaaa3 17720->17721 17723 dcaabb 17721->17723 17733 dc83ec 17721->17733 17723->17715 17725 dcaaa3 17724->17725 17726 dc83ec 3 API calls 17725->17726 17727 dcaabb 17725->17727 17726->17727 17727->17715 17729 dcce91 17728->17729 17730 dcceb5 17729->17730 17740 dcd010 17729->17740 17744 dcd020 17729->17744 17730->17716 17734 dc83b6 17733->17734 17736 dc86d3 17734->17736 17738 dcaa88 3 API calls 17734->17738 17739 dcaa79 3 API calls 17734->17739 17735 dc8711 17735->17723 17736->17735 17737 dcce74 3 API calls 17736->17737 17737->17735 17738->17736 17739->17736 17742 dcd02d 17740->17742 17741 dcd067 17741->17730 17742->17741 17748 dcc958 17742->17748 17746 dcd02d 17744->17746 17745 dcd067 17745->17730 17746->17745 17747 dcc958 3 API calls 17746->17747 17747->17745 17749 dcc963 17748->17749 17751 dcd978 17749->17751 17752 dcca84 17749->17752 17751->17751 17753 dcca8f 17752->17753 17754 dc5d2c 3 API calls 17753->17754 17755 dcd9e7 17754->17755 17756 dcd9f6 17755->17756 17761 dcde68 17755->17761 17767 dcde59 17755->17767 17773 dcca94 17756->17773 17758 dcda10 17758->17751 17762 dcde96 17761->17762 17763 dcdac0 GetFocus 17762->17763 17764 dcdebf 17762->17764 17766 dcdf67 17762->17766 17763->17764 17765 dcdf62 KiUserCallbackDispatcher 17764->17765 17764->17766 17765->17766 17768 dcde96 17767->17768 17769 dcdac0 GetFocus 17768->17769 17770 dcdebf 17768->17770 17772 dcdf67 17768->17772 17769->17770 17771 dcdf62 KiUserCallbackDispatcher 17770->17771 17770->17772 17771->17772 17776 dcca9f 17773->17776 17774 dcdcd4 GetFocus KiUserCallbackDispatcher KiUserCallbackDispatcher 17775 dcef84 17774->17775 17775->17758 17776->17774 17777 dcef89 17776->17777 17777->17758 17778 dcadb8 17782 dcae9f 17778->17782 17787 dcaeb0 17778->17787 17779 dcadc7 17783 dcaee4 17782->17783 17784 dcaec1 17782->17784 17783->17779 17784->17783 17785 dcb0e8 GetModuleHandleW 17784->17785 17786 dcb115 17785->17786 17786->17779 17788 dcaee4 17787->17788 17789 dcaec1 17787->17789 17788->17779 17789->17788 17790 dcb0e8 GetModuleHandleW 17789->17790 17791 dcb115 17790->17791 17791->17779 17792 dcd138 17793 dcd17e GetCurrentProcess 17792->17793 17795 dcd1c9 17793->17795 17796 dcd1d0 GetCurrentThread 17793->17796 17795->17796 17797 dcd20d GetCurrentProcess 17796->17797 17798 dcd206 17796->17798 17799 dcd243 17797->17799 17798->17797 17800 dcd26b GetCurrentThreadId 17799->17800 17801 dcd29c 17800->17801 17802 dcd380 DuplicateHandle 17803 dcd416 17802->17803

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 294 dcd129-dcd1c7 GetCurrentProcess 298 dcd1c9-dcd1cf 294->298 299 dcd1d0-dcd204 GetCurrentThread 294->299 298->299 300 dcd20d-dcd241 GetCurrentProcess 299->300 301 dcd206-dcd20c 299->301 302 dcd24a-dcd265 call dcd308 300->302 303 dcd243-dcd249 300->303 301->300 307 dcd26b-dcd29a GetCurrentThreadId 302->307 303->302 308 dcd29c-dcd2a2 307->308 309 dcd2a3-dcd305 307->309 308->309
                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 00DCD1B6
                                        • GetCurrentThread.KERNEL32 ref: 00DCD1F3
                                        • GetCurrentProcess.KERNEL32 ref: 00DCD230
                                        • GetCurrentThreadId.KERNEL32 ref: 00DCD289
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2952098148.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_dc0000_MsgToPst.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID: /fdR
                                        • API String ID: 2063062207-297486749
                                        • Opcode ID: ca09291f75a98544c4f994e63eca10ad85e6e8a3dd9a094f3f35225de7d1433f
                                        • Instruction ID: fbb5d9eb84b0260666e032c1507b38eb13c5cba5264d817e09468e0120f5930b
                                        • Opcode Fuzzy Hash: ca09291f75a98544c4f994e63eca10ad85e6e8a3dd9a094f3f35225de7d1433f
                                        • Instruction Fuzzy Hash: 005155B09003498FDB14DFA9D948BEEBBF1AF48314F2484ADE449A7360DB349984CB65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 316 dcd138-dcd1c7 GetCurrentProcess 320 dcd1c9-dcd1cf 316->320 321 dcd1d0-dcd204 GetCurrentThread 316->321 320->321 322 dcd20d-dcd241 GetCurrentProcess 321->322 323 dcd206-dcd20c 321->323 324 dcd24a-dcd265 call dcd308 322->324 325 dcd243-dcd249 322->325 323->322 329 dcd26b-dcd29a GetCurrentThreadId 324->329 325->324 330 dcd29c-dcd2a2 329->330 331 dcd2a3-dcd305 329->331 330->331
                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 00DCD1B6
                                        • GetCurrentThread.KERNEL32 ref: 00DCD1F3
                                        • GetCurrentProcess.KERNEL32 ref: 00DCD230
                                        • GetCurrentThreadId.KERNEL32 ref: 00DCD289
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2952098148.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_dc0000_MsgToPst.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID: /fdR
                                        • API String ID: 2063062207-297486749
                                        • Opcode ID: 141aec2fe6e17159686557a9a1e58472843a8dde4a53789276bfe8b45e8f69ed
                                        • Instruction ID: 5d1b61d73ab33aea7ebe556a2ea7f265ccb1573dcfc42a02895aff687bdde462
                                        • Opcode Fuzzy Hash: 141aec2fe6e17159686557a9a1e58472843a8dde4a53789276bfe8b45e8f69ed
                                        • Instruction Fuzzy Hash: 1B5124B09003099FDB14DFA9D948BAEBBF1BF88314F24846DE419A7360DB749984CB65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 360 dcaeb0-dcaebf 361 dcaeeb-dcaeef 360->361 362 dcaec1-dcaece call dc98b8 360->362 364 dcaef1-dcaefb 361->364 365 dcaf03-dcaf44 361->365 367 dcaee4 362->367 368 dcaed0 362->368 364->365 371 dcaf46-dcaf4e 365->371 372 dcaf51-dcaf5f 365->372 367->361 417 dcaed6 call dcb148 368->417 418 dcaed6 call dcb139 368->418 371->372 373 dcaf61-dcaf66 372->373 374 dcaf83-dcaf85 372->374 377 dcaf68-dcaf6f call dca894 373->377 378 dcaf71 373->378 376 dcaf88-dcaf8f 374->376 375 dcaedc-dcaede 375->367 379 dcb020-dcb0e0 375->379 381 dcaf9c-dcafa3 376->381 382 dcaf91-dcaf99 376->382 383 dcaf73-dcaf81 377->383 378->383 410 dcb0e8-dcb113 GetModuleHandleW 379->410 411 dcb0e2-dcb0e5 379->411 386 dcafa5-dcafad 381->386 387 dcafb0-dcafb9 call dca8a4 381->387 382->381 383->376 386->387 391 dcafbb-dcafc3 387->391 392 dcafc6-dcafcb 387->392 391->392 394 dcafcd-dcafd4 392->394 395 dcafe9-dcafed 392->395 394->395 396 dcafd6-dcafe6 call dca8b4 call dca8c4 394->396 415 dcaff0 call dcb448 395->415 416 dcaff0 call dcb421 395->416 396->395 398 dcaff3-dcaff6 401 dcaff8-dcb016 398->401 402 dcb019-dcb01f 398->402 401->402 412 dcb11c-dcb130 410->412 413 dcb115-dcb11b 410->413 411->410 413->412 415->398 416->398 417->375 418->375
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00DCB106
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2952098148.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_dc0000_MsgToPst.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID: /fdR
                                        • API String ID: 4139908857-297486749
                                        • Opcode ID: 1976dbe517c9328e203d637796468c07ce0124658916142ab931f0bedb034234
                                        • Instruction ID: 789d1b4ba2bc8af978913d36de1f185c5de717d285252fc4ed7b6ce5f2ddae61
                                        • Opcode Fuzzy Hash: 1976dbe517c9328e203d637796468c07ce0124658916142ab931f0bedb034234
                                        • Instruction Fuzzy Hash: 52714870A00B068FD724DF29D145B5ABBF1FF48304F148A2DE48AD7A50D775E949CBA1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 419 dc4528-dc5a69 CreateActCtxA 422 dc5a6b-dc5a71 419->422 423 dc5a72-dc5acc 419->423 422->423 430 dc5ace-dc5ad1 423->430 431 dc5adb-dc5adf 423->431 430->431 432 dc5af0 431->432 433 dc5ae1-dc5aed 431->433 435 dc5af1 432->435 433->432 435->435
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 00DC5A59
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2952098148.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_dc0000_MsgToPst.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID: /fdR
                                        • API String ID: 2289755597-297486749
                                        • Opcode ID: b714828550814fdb503b596d8ffcee1d337455419e5112fd5dba6b5d5b0e8a45
                                        • Instruction ID: 7715f7cf30b5e652d880e4efbe680cafc4f33aa053b63ee6056ce2294e1ba91a
                                        • Opcode Fuzzy Hash: b714828550814fdb503b596d8ffcee1d337455419e5112fd5dba6b5d5b0e8a45
                                        • Instruction Fuzzy Hash: 6341E2B0C00719CADB24DFAAC884B9EBBF5BF48304F24815AD409AB255DB756985CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 436 dc599d-dc599f 437 dc59ac-dc5a69 CreateActCtxA 436->437 439 dc5a6b-dc5a71 437->439 440 dc5a72-dc5acc 437->440 439->440 447 dc5ace-dc5ad1 440->447 448 dc5adb-dc5adf 440->448 447->448 449 dc5af0 448->449 450 dc5ae1-dc5aed 448->450 452 dc5af1 449->452 450->449 452->452
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 00DC5A59
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2952098148.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_dc0000_MsgToPst.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID: /fdR
                                        • API String ID: 2289755597-297486749
                                        • Opcode ID: c92fba1aa649ac35257b5308a6c142abca49c9be0e0f62474eac10a39f390dc9
                                        • Instruction ID: 3ba2051c21e5bfd6b79d6e40aa3ed0ffa8f07f5dcab82d544bd13508bc86d14b
                                        • Opcode Fuzzy Hash: c92fba1aa649ac35257b5308a6c142abca49c9be0e0f62474eac10a39f390dc9
                                        • Instruction Fuzzy Hash: 0341F3B0C00719CEDB24DFAAC984B8DBBF5BF48304F24816AD409AB255DB756986CF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 453 dcd378-dcd414 DuplicateHandle 454 dcd41d-dcd43a 453->454 455 dcd416-dcd41c 453->455 455->454
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00DCD407
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2952098148.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_dc0000_MsgToPst.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID: /fdR
                                        • API String ID: 3793708945-297486749
                                        • Opcode ID: d960fa55113fe2b6d6fd8cde691cb9a95e30b4735f7ddd9a043f74c22e68ea39
                                        • Instruction ID: d7ffa5ca242be031e497998b0f74bbdbab3a034997a09d561bad30e5a587b783
                                        • Opcode Fuzzy Hash: d960fa55113fe2b6d6fd8cde691cb9a95e30b4735f7ddd9a043f74c22e68ea39
                                        • Instruction Fuzzy Hash: FA2103B5D002499FDB10CFAAD984AEEBFF5EB48310F14802AE958A7310C374A941CF60

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 458 dcd380-dcd414 DuplicateHandle 459 dcd41d-dcd43a 458->459 460 dcd416-dcd41c 458->460 460->459
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00DCD407
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2952098148.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_dc0000_MsgToPst.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID: /fdR
                                        • API String ID: 3793708945-297486749
                                        • Opcode ID: c1ca0c36331ac01671df30b6422c9c37bd97d0cb345bf4875af54562cf39dfef
                                        • Instruction ID: 39e48f3ff74ccb41d990ae48f643f9bcf3c93fd75859e055a63f6642563228ca
                                        • Opcode Fuzzy Hash: c1ca0c36331ac01671df30b6422c9c37bd97d0cb345bf4875af54562cf39dfef
                                        • Instruction Fuzzy Hash: FB21E4B5D002099FDB10CF9AD984ADEFFF5EB48310F14802AE954A3310D374A940CFA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 463 dcb0a0-dcb0e0 464 dcb0e8-dcb113 GetModuleHandleW 463->464 465 dcb0e2-dcb0e5 463->465 466 dcb11c-dcb130 464->466 467 dcb115-dcb11b 464->467 465->464 467->466
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00DCB106
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2952098148.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_dc0000_MsgToPst.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID: /fdR
                                        • API String ID: 4139908857-297486749
                                        • Opcode ID: 83dec34a0216e4c0b79f5da1d116ad15b89ecfc17994e45d1f945e6e113dc80f
                                        • Instruction ID: abbef178a427aacaeed72807c66c8eccef2a50112362534b290ab837c0fbe101
                                        • Opcode Fuzzy Hash: 83dec34a0216e4c0b79f5da1d116ad15b89ecfc17994e45d1f945e6e113dc80f
                                        • Instruction Fuzzy Hash: B9110FB5C003498FCB10DF9AD444BDEFBF4AB89320F14842AD468B7210C375A545CFA1
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2951770407.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_d6d000_MsgToPst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 428792d3ce0876344459068973f4a7e65ec61375ad562962ca9e458faa4e7fb5
                                        • Instruction ID: 578bef2445d15ed72d9afd4ef79b19407bfec6bf00aa6392f1ac97df933069f9
                                        • Opcode Fuzzy Hash: 428792d3ce0876344459068973f4a7e65ec61375ad562962ca9e458faa4e7fb5
                                        • Instruction Fuzzy Hash: 4B212571A04240DFCB05DF14E9C0B26BF66FB98318F24C569E84A4B656C336D856CAB1
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2951853661.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_d7d000_MsgToPst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b25959ccc7c8779c06816754e6eb84f9e2c104161c644a2b9e5931e862c4ebf1
                                        • Instruction ID: 74121fcdcd5e1bb8b656c8a61d8cb4748368cefb1ba7affc418070104a34d82f
                                        • Opcode Fuzzy Hash: b25959ccc7c8779c06816754e6eb84f9e2c104161c644a2b9e5931e862c4ebf1
                                        • Instruction Fuzzy Hash: FE21D071604200EFDB05DF14D980B26BBB6FF84314F24C6ADE94D4B296D336D846CA75
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2951853661.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_d7d000_MsgToPst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 081adc72137cec5f7916660067bbb231f3cd26a9082a832100d8be171409a9ee
                                        • Instruction ID: 56203368ea0473104d3c94760e698ca405fb329a28998851b324bd97a3c62ae3
                                        • Opcode Fuzzy Hash: 081adc72137cec5f7916660067bbb231f3cd26a9082a832100d8be171409a9ee
                                        • Instruction Fuzzy Hash: A021FF75604200DFCB14DF24D984B26BBB6EF88314F24C56DE84E4B296D33AD847CA71
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2951853661.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_d7d000_MsgToPst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4ee4d31e2bc85eab346fbf3eaa793b278f0df2564cc00b28ba072a908988a134
                                        • Instruction ID: 268f4b3e82eacaa02429424ac1a371da7bb332cc84f9fa87ec42cabc722aff08
                                        • Opcode Fuzzy Hash: 4ee4d31e2bc85eab346fbf3eaa793b278f0df2564cc00b28ba072a908988a134
                                        • Instruction Fuzzy Hash: 7F214F755093808FDB12CF24D994715BF72EF46214F28C5EAD8498B6A7D33A980ACB62
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2951770407.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_d6d000_MsgToPst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                        • Instruction ID: 1a401bb2287d2da130b23acbf9884f837d99b200a1df7f0944a7e2f39fb48a0f
                                        • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                        • Instruction Fuzzy Hash: E311D376904280CFCB16CF14D5C4B16BF72FB94318F28C6AAD84A0B656C336D85ACBA1
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2951853661.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_d7d000_MsgToPst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                        • Instruction ID: bb2caeefd7f02f0d9a746c436e3c87cd2bc35644997d995090523eaebba34909
                                        • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                        • Instruction Fuzzy Hash: 6C117975504280DFDB16CF14D5C4B15BBB2FB84314F28C6AAD8494B696D33AD84ACB61
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2951770407.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_d6d000_MsgToPst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6a71d3aa9ab48de80a5775601a41d03adcf03785be2a09058722eeae4505dc79
                                        • Instruction ID: 5e4deef1718122d4f2aaff8b99f57a5db27efa0f456cd43be8ed1998339e0648
                                        • Opcode Fuzzy Hash: 6a71d3aa9ab48de80a5775601a41d03adcf03785be2a09058722eeae4505dc79
                                        • Instruction Fuzzy Hash: 7801F731A083449BE7104A25DDC4767BF99EF40325F2CC429EC4A4A182C678D840C6B3
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2951770407.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_d6d000_MsgToPst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fc2acc919789b5680dc8e6a9381ce355a364a7c0f2b9a81215cd15f9826a192a
                                        • Instruction ID: 1f77897377b8d2398716c901211e7249db758a38f4a2857b328d1b97df960050
                                        • Opcode Fuzzy Hash: fc2acc919789b5680dc8e6a9381ce355a364a7c0f2b9a81215cd15f9826a192a
                                        • Instruction Fuzzy Hash: 25F0C2715043449BE7108A16D8C4B62FFA8EF90334F28C45AED090E282C2799840CAB1