Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
z39UartAssist.exe

Overview

General Information

Sample name:z39UartAssist.exe
Analysis ID:1541089
MD5:b117bdf393de8ff72d5a0b68731fcf54
SHA1:d8f63074a1ee7c0140d1316b985a3e4ae5017496
SHA256:ccc1e602d6a8ceeae8f1009170e8d46bc2cbc57d3583f483745c0d5e855ffd0a
Tags:exeuser-Porcupine
Infos:

Detection

Score:26
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Contains functionality to detect sleep reduction / modifications
Contains functionality to infect the boot sector
Sample is not signed and drops a device driver
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to get notified if a device is plugged in / out
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read device registry values (via SetupAPI)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Creates driver files
Detected potential crypto function
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May check if the current machine is a sandbox (GetTickCount - Sleep)
PE / OLE file has an invalid certificate
Potential key logger detected (key state polling based)
Queries device information via Setup API
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • z39UartAssist.exe (PID: 2084 cmdline: "C:\Users\user\Desktop\z39UartAssist.exe" MD5: B117BDF393DE8FF72D5A0B68731FCF54)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    SourceRuleDescriptionAuthorStrings
    0.2.z39UartAssist.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results
      Source: z39UartAssist.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004720C4 PostMessageA,RegisterDeviceNotificationA,0_2_004720C4
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004D097C FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,0_2_004D097C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004E4360 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_004E4360
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004D0B9C FindFirstFileA,GetLastError,0_2_004D0B9C
      Source: global trafficHTTP traffic detected: GET /assistcenter/uartassist_upgrade/?ver=50014&ident=SYWVSLRYMZWXKN5D&stamp=01729767727 HTTP/1.0Host: www.cmsoft.cnUser-Agent: Mozilla/4.0Accept: */*Accept-Language: zh-cnAccept-Encoding: identityConnection: closeCache-Control: no-cache
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004712DC @TSyncUart@RecvData$qqrpvi,ClearCommError,ReadFile,0_2_004712DC
      Source: global trafficHTTP traffic detected: GET /assistcenter/uartassist_upgrade/?ver=50014&ident=SYWVSLRYMZWXKN5D&stamp=01729767727 HTTP/1.0Host: www.cmsoft.cnUser-Agent: Mozilla/4.0Accept: */*Accept-Language: zh-cnAccept-Encoding: identityConnection: closeCache-Control: no-cache
      Source: global trafficDNS traffic detected: DNS query: www.cmsoft.cn
      Source: z39UartAssist.exeString found in binary or memory: http://crl.gdca.com.cn/crl/GDCA_TrustAUTH_R4_Generic_CA.crl0
      Source: z39UartAssist.exeString found in binary or memory: http://crl.gdca.com.cn/crl/GDCA_TrustAUTH_R5_ROOT.crl0
      Source: z39UartAssist.exe, z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://free.cmsoft.cn/assistcenter/
      Source: z39UartAssist.exe, 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmp, z39UartAssist.exe, 00000000.00000003.1750748185.000000000420C000.00000004.00001000.00020000.00000000.sdmp, z39UartAssist.exe, 00000000.00000002.2977965266.00000000041F0000.00000004.00001000.00020000.00000000.sdmp, z39UartAssist.exe, 00000000.00000002.2978007112.000000000420C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://free.cmsoft.cn/assistcenter/help/UartAssist
      Source: z39UartAssist.exe, 00000000.00000002.2978007112.000000000420C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://free.cmsoft.cn/download/cmsoft/assistant/uartassist5.0.14.zip
      Source: z39UartAssist.exe, z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://free.cmsoft.cn/tools/ntp/?handler=%d
      Source: z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://free.cmsoft.cn/tools/ntp/?handler=%dtimestamp
      Source: z39UartAssist.exe, z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://free.scomm.cn/assistcenter/
      Source: z39UartAssist.exeString found in binary or memory: http://ocsp2.gdca.com.cn/ocsp0
      Source: z39UartAssist.exe, z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.cmsoft.cn
      Source: z39UartAssist.exe, z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.cmsoft.cn/assistcenter/
      Source: z39UartAssist.exe, 00000000.00000003.1750748185.000000000420C000.00000004.00001000.00020000.00000000.sdmp, z39UartAssist.exe, 00000000.00000002.2977965266.00000000041F0000.00000004.00001000.00020000.00000000.sdmp, z39UartAssist.exe, 00000000.00000002.2978007112.000000000420C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.cmsoft.cn/assistcenter/images/assist_dll3.raw
      Source: z39UartAssist.exe, 00000000.00000003.1750748185.000000000420C000.00000004.00001000.00020000.00000000.sdmp, z39UartAssist.exe, 00000000.00000002.2977965266.00000000041F0000.00000004.00001000.00020000.00000000.sdmp, z39UartAssist.exe, 00000000.00000002.2978007112.000000000420C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.cmsoft.cn/assistcenter/uartassist_upgrade/
      Source: z39UartAssist.exe, 00000000.00000002.2977572678.0000000002453000.00000004.00001000.00020000.00000000.sdmp, z39UartAssist.exe, 00000000.00000003.1750748185.000000000420C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.cmsoft.cn/assistcenter/uartassist_upgrade/?ver=50014&ident=SYWVSLRYMZWXKN5D&stamp=0172976
      Source: z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.cmsoft.cnhttp://www.cmsoft.cn/assistcenter/http://www.scomm.cn/assistcenter/http://free.c
      Source: z39UartAssist.exeString found in binary or memory: http://www.gdca.com.cn/cert/GDCA_TrustAUTH_R5_ROOT.der0)
      Source: z39UartAssist.exeString found in binary or memory: http://www.gdca.com.cn/cps/cps0F
      Source: z39UartAssist.exeString found in binary or memory: http://www.gdca.com.cn/cps/cps0L
      Source: z39UartAssist.exe, z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.scomm.cn/assistcenter/
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00554DA4 GlobalAlloc,GlobalLock,SetClipboardData,GlobalUnlock,0_2_00554DA4
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00554E88 GetClipboardData,GlobalLock,GlobalUnlock,0_2_00554E88
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0052EDE0 GetKeyboardState,KiUserCallbackDispatcher,0_2_0052EDE0
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0046C9A4 @TcmTrayIcon@ShiftState$qv,GetKeyState,GetKeyState,GetKeyState,0_2_0046C9A4
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00531CA0 NtdllDefWindowProc_A,GetCapture,KiUserCallbackDispatcher,0_2_00531CA0
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00522408 NtdllDefWindowProc_A,0_2_00522408
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0051D2B8 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,0_2_0051D2B8
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0051D368 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,0_2_0051D368
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0040A5B4: CreateFileA,DeviceIoControl,CloseHandle,0_2_0040A5B4
      Source: C:\Users\user\Desktop\z39UartAssist.exeFile created: C:\Users\user\AppData\Roaming\Cmsoft\uartassist.sysJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0043E9B40_2_0043E9B4
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0043D04C0_2_0043D04C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0046B1500_2_0046B150
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0045E0180_2_0045E018
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004121D40_2_004121D4
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0046E1DC0_2_0046E1DC
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0049C2980_2_0049C298
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004023040_2_00402304
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0048846C0_2_0048846C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0048861C0_2_0048861C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0045A6D00_2_0045A6D0
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0047C68C0_2_0047C68C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00564A100_2_00564A10
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00490CCC0_2_00490CCC
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00492CCC0_2_00492CCC
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00456CB00_2_00456CB0
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00498D640_2_00498D64
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00448F500_2_00448F50
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0047D0800_2_0047D080
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004431880_2_00443188
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0044F34C0_2_0044F34C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004573380_2_00457338
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004593CC0_2_004593CC
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0048D4440_2_0048D444
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004AB4540_2_004AB454
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004535680_2_00453568
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004956680_2_00495668
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004596880_2_00459688
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004877440_2_00487744
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0045D7900_2_0045D790
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0046F80C0_2_0046F80C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0043D8080_2_0043D808
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0046D8300_2_0046D830
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0048FA740_2_0048FA74
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0055DB540_2_0055DB54
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00465CC00_2_00465CC0
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0046FC980_2_0046FC98
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004ADE840_2_004ADE84
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00465EBC0_2_00465EBC
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: String function: 00568B2C appears 372 times
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: String function: 004E23C4 appears 31 times
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: String function: 00568A48 appears 33 times
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: String function: 0055D764 appears 39 times
      Source: z39UartAssist.exeStatic PE information: invalid certificate
      Source: z39UartAssist.exe, 00000000.00000000.1730503720.0000000000639000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUartAssist. vs z39UartAssist.exe
      Source: z39UartAssist.exe, 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUartAssist. vs z39UartAssist.exe
      Source: z39UartAssist.exeBinary or memory string: OriginalFilenameUartAssist. vs z39UartAssist.exe
      Source: z39UartAssist.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
      Source: z39UartAssist.exeStatic PE information: Section: UPX1 ZLIB complexity 0.9978593495728234
      Source: classification engineClassification label: sus26.evad.winEXE@1/1@1/1
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0050B290 GetLastError,FormatMessageA,0_2_0050B290
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004C0904 FindResourceA,0_2_004C0904
      Source: C:\Users\user\Desktop\z39UartAssist.exeFile created: C:\Users\user\AppData\Roaming\CmsoftJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeMutant created: NULL
      Source: Yara matchFile source: 0.2.z39UartAssist.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\z39UartAssist.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeFile read: C:\Windows\win.iniJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: wsock32.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: devobj.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: riched32.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: dataexchange.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: d3d11.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: dcomp.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: dxgi.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: assist.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: napinsp.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: pnrpnsp.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: wshbth.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: nlaapi.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: winrnr.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeWindow found: window name: TComboBoxJump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeAutomated click: OK
      Source: C:\Users\user\Desktop\z39UartAssist.exeFile opened: C:\Windows\SysWOW64\RICHED32.DLLJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004A55DC FreeLibrary,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,0_2_004A55DC
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004A4FC8 push ecx; mov dword ptr [esp], edx0_2_004A4FC9
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004BA15C push 004BA494h; ret 0_2_004BA48C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0042A11C push ecx; mov dword ptr [esp], eax0_2_0042A121
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00486200 push 0048622Ch; ret 0_2_00486224
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004BA538 push ecx; mov dword ptr [esp], eax0_2_004BA539
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004265B8 push ecx; mov dword ptr [esp], ecx0_2_004265BC
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00436664 push 004366BAh; ret 0_2_004366B2
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004BA15C push 004BA494h; ret 0_2_004BA48C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004E88EC push ecx; mov dword ptr [esp], edx0_2_004E88F0
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00432A34 push ecx; mov dword ptr [esp], edx0_2_00432A39
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00432DFC push ecx; mov dword ptr [esp], edx0_2_00432E01
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00489114 push 00489140h; ret 0_2_00489138
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0042113C push 0042117Fh; ret 0_2_00421177
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0043B194 push 0043B1C0h; ret 0_2_0043B1B8
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0045B2D8 push ecx; mov dword ptr [esp], eax0_2_0045B2DD
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004852B0 push ecx; mov dword ptr [esp], edx0_2_004852B5
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0048D390 push ecx; mov dword ptr [esp], eax0_2_0048D393
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0043B3A4 push 0043B3D0h; ret 0_2_0043B3C8
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004C9548 push ecx; mov dword ptr [esp], edx0_2_004C954D
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00485510 push 0048553Ch; ret 0_2_00485534
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004BD69C push ecx; mov dword ptr [esp], edx0_2_004BD6A1
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004C7748 push ecx; mov dword ptr [esp], edx0_2_004C774A
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004CB79C push ecx; mov dword ptr [esp], ecx0_2_004CB79D
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00401960 push 0040198Ch; ret 0_2_00401984
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004BFAF4 push ecx; mov dword ptr [esp], edx0_2_004BFAF9
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00427AA8 push 00427ADBh; ret 0_2_00427AD3
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00433D78 push 00433DA4h; ret 0_2_00433D9C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004C3D98 push ecx; mov dword ptr [esp], edx0_2_004C3D9A
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00421D9C push 00421DC8h; ret 0_2_00421DC0
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004BFE7C push ecx; mov dword ptr [esp], edx0_2_004BFE81
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00489E10 push 00489E3Ch; ret 0_2_00489E34
      Source: initial sampleStatic PE information: section name: UPX0
      Source: initial sampleStatic PE information: section name: UPX1

      Persistence and Installation Behavior

      barindex
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: CreateFileA,DeviceIoControl,CloseHandle, \\.\PhysicalDrive00_2_0040A5B4
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: CreateFileA,DeviceIoControl,CloseHandle, \\.\PhysicalDrive00_2_0040A298
      Source: C:\Users\user\Desktop\z39UartAssist.exeFile created: C:\Users\user\AppData\Roaming\Cmsoft\uartassist.sysJump to behavior

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: CreateFileA,DeviceIoControl,CloseHandle, \\.\PhysicalDrive00_2_0040A5B4
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: CreateFileA,DeviceIoControl,CloseHandle, \\.\PhysicalDrive00_2_0040A298
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00534500 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,0_2_00534500
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0046C9F0 @TcmTrayIcon@DoMessage$qqrr17Messages@TMessage,@TcmTrayIcon@ShiftState$qv,GetCursorPos,@TcmTrayIcon@ShiftState$qv,GetCursorPos,@TcmTrayIcon@ShiftState$qv,GetCursorPos,IsIconic,PostMessageA,@TcmTrayIcon@ShiftState$qv,GetCursorPos,@TcmTrayIcon@ShiftState$qv,GetCursorPos,@TcmTrayIcon@ShiftState$qv,GetCursorPos,@TcmTrayIcon@ShiftState$qv,GetCursorPos,0_2_0046C9F0
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00446D9C IsIconic,_ChecksumView,0_2_00446D9C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0046CE7C @TcmTrayIcon@Restore$qqrv,IsIconic,ShowWindow,SetForegroundWindow,0_2_0046CE7C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0046CE24 @TcmTrayIcon@Minimize$qqrv,IsIconic,ShowWindow,0_2_0046CE24
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0051D2B8 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,0_2_0051D2B8
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0051D368 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,0_2_0051D368
      Source: C:\Users\user\Desktop\z39UartAssist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0046A64C0_2_0046A64C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004127500_2_00412750
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,0_2_0051C168
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00472254 SetupDiGetClassDevsA,SetupDiGetDeviceRegistryPropertyA,SetupDiEnumDeviceInfo,RegOpenKeyExA,RegEnumValueA,RegCloseKey,SetupDiDestroyDeviceInfoList,0_2_00472254
      Source: C:\Users\user\Desktop\z39UartAssist.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-86978
      Source: C:\Users\user\Desktop\z39UartAssist.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-87001
      Source: C:\Users\user\Desktop\z39UartAssist.exeAPI coverage: 9.3 %
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004127500_2_00412750
      Source: C:\Users\user\Desktop\z39UartAssist.exeFile opened: PhysicalDrive0Jump to behavior
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004D097C FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,0_2_004D097C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004E4360 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_004E4360
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004D0B9C FindFirstFileA,GetLastError,0_2_004D0B9C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0050B820 GetSystemInfo,0_2_0050B820
      Source: z39UartAssist.exe, 00000000.00000002.2977239467.0000000000894000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllfP6,
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004A55DC FreeLibrary,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,0_2_004A55DC
      Source: z39UartAssist.exe, z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Shell_TrayWnd
      Source: z39UartAssist.exe, z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ProgMan
      Source: z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: SeShutdownPrivilegeShell_TrayWndShell_TrayWndButtonShell_TrayWndReBarWindow32Shell_TrayWndTrayNotifyWndProgManSOFTWARE\Microsoft\Windows\CurrentVersionSoftware\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersProgramFilesDirDesktopStart MenuFavoritesSendToPrograms...\\Iphlpapi.dllGetAdaptersInfoIphlpapi.dllSendARPSYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\IPAddressSubnetMaskDefaultGateway--------%ld--
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0046A6A4 cpuid 0_2_0046A6A4
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,0_2_004E4518
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,0_2_004E4624
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: GetLocaleInfoA,0_2_00475224
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00472254 SetupDiGetClassDevsA,SetupDiGetDeviceRegistryPropertyA,SetupDiEnumDeviceInfo,RegOpenKeyExA,RegEnumValueA,RegCloseKey,SetupDiDestroyDeviceInfoList,0_2_00472254
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004D2760 GetLocalTime,0_2_004D2760
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_004660F8 GetTimeZoneInformation,0_2_004660F8
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00563464 GetVersion,GetCurrentThreadId,0_2_00563464
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00464470 closesocket,WaitForSingleObject,socket,htons,bind,listen,htons,connect,getsockname,htons,CreateThread,closesocket,0_2_00464470
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0047E908 @TcmSocket@Open$qqrv,IsWindow,SendMessageA,@TcmSocket@IsEmptyAddr$qqrp9TInetAddr,@TcmSocket@ShowError$qqrpci,CreateSemaphoreA,socket,@TcmSocket@ErrorCheck$qqripc,WSAAsyncSelect,@TcmSocket@ErrorCheck$qqripc,@TcmSocket@Bind$qqrp9TInetAddr,@TcmSocket@Listen$qqrp9TInetAddr,@TcmSocket@Connect$qqrv,SetTimer,@TcmSocket@IsEmptyAddr$qqrp9TInetAddr,@TcmSocket@Connect$qqrv,socket,@TcmSocket@Bind$qqrp9TInetAddr,@TcmSocket@Listen$qqrp9TInetAddr,WSAAsyncSelect,closesocket,@TcmSocket@DeclareConnect$qqro,WSAAsyncSelect,closesocket,SetTimer,0_2_0047E908
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0047ED7C @TcmSocket@Close$qqrv,WSAAsyncSelect,@TcmSocket@CloseClientAll$qqrv,@TcmSocket@ClearMultiListenPorts$qqrv,@TcmSocket@ClearMultiListenPorts$qqrv,KillTimer,closesocket,@TcmSocket@ErrorCheck$qqripc,@TcmSocket@DeclareConnect$qqro,0_2_0047ED7C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00480FA0 @TcmSocket@ClearMultiListenPorts$qqrv,WSAAsyncSelect,closesocket,0_2_00480FA0
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_00481014 @TcmSocket@SetMultiListenPorts$qqrpxc,@TcmSocket@ClearMultiListenPorts$qqrv,@TcmSocket@AddMultiListenPort$qqri,@TcmSocket@AddMultiListenPort$qqri,0_2_00481014
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0048118C @TcmSocket@AddMultiListenPort$qqri,0_2_0048118C
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0047F400 @TcmSocket@Bind$qqrp9TInetAddr,htons,bind,@TcmSocket@ErrorCheck$qqripc,htons,bind,@TcmSocket@ErrorCheck$qqripc,0_2_0047F400
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0047D6E0 @TcmSocket@ComboBox_BindServerClients$qqrp18Stdctrls@TComboBox,0_2_0047D6E0
      Source: C:\Users\user\Desktop\z39UartAssist.exeCode function: 0_2_0047F808 @TcmSocket@Listen$qqrp9TInetAddr,listen,@TcmSocket@ErrorCheck$qqripc,0_2_0047F808
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
      Native API
      1
      Windows Service
      1
      Windows Service
      1
      Masquerading
      21
      Input Capture
      2
      System Time Discovery
      Remote Services21
      Input Capture
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      Bootkit
      1
      Process Injection
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Query Registry
      Remote Desktop Protocol1
      Archive Collected Data
      2
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAt1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      Process Injection
      Security Account Manager131
      Security Software Discovery
      SMB/Windows Admin Shares2
      Clipboard Data
      2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Deobfuscate/Decode Files or Information
      NTDS1
      Virtualization/Sandbox Evasion
      Distributed Component Object ModelInput Capture12
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
      Obfuscated Files or Information
      LSA Secrets1
      Process Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Bootkit
      Cached Domain Credentials1
      Peripheral Device Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
      Software Packing
      DCSync11
      Application Window Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      DLL Side-Loading
      Proc Filesystem2
      File and Directory Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow44
      System Information Discovery
      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      z39UartAssist.exe5%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      www.cmsoft.cn
      114.55.6.143
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        http://www.cmsoft.cn/assistcenter/uartassist_upgrade/?ver=50014&ident=SYWVSLRYMZWXKN5D&stamp=01729767727false
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.cmsoft.cn/assistcenter/z39UartAssist.exe, z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
            unknown
            http://www.cmsoft.cnhttp://www.cmsoft.cn/assistcenter/http://www.scomm.cn/assistcenter/http://free.cz39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
              unknown
              http://free.scomm.cn/assistcenter/z39UartAssist.exe, z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                unknown
                http://free.cmsoft.cn/download/cmsoft/assistant/uartassist5.0.14.zipz39UartAssist.exe, 00000000.00000002.2978007112.000000000420C000.00000004.00001000.00020000.00000000.sdmpfalse
                  unknown
                  http://www.cmsoft.cn/assistcenter/uartassist_upgrade/?ver=50014&ident=SYWVSLRYMZWXKN5D&stamp=0172976z39UartAssist.exe, 00000000.00000002.2977572678.0000000002453000.00000004.00001000.00020000.00000000.sdmp, z39UartAssist.exe, 00000000.00000003.1750748185.000000000420C000.00000004.00001000.00020000.00000000.sdmpfalse
                    unknown
                    http://crl.gdca.com.cn/crl/GDCA_TrustAUTH_R5_ROOT.crl0z39UartAssist.exefalse
                      unknown
                      http://ocsp2.gdca.com.cn/ocsp0z39UartAssist.exefalse
                        unknown
                        http://www.gdca.com.cn/cert/GDCA_TrustAUTH_R5_ROOT.der0)z39UartAssist.exefalse
                          unknown
                          http://crl.gdca.com.cn/crl/GDCA_TrustAUTH_R4_Generic_CA.crl0z39UartAssist.exefalse
                            unknown
                            http://free.cmsoft.cn/tools/ntp/?handler=%dz39UartAssist.exe, z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                              unknown
                              http://www.cmsoft.cn/assistcenter/images/assist_dll3.rawz39UartAssist.exe, 00000000.00000003.1750748185.000000000420C000.00000004.00001000.00020000.00000000.sdmp, z39UartAssist.exe, 00000000.00000002.2977965266.00000000041F0000.00000004.00001000.00020000.00000000.sdmp, z39UartAssist.exe, 00000000.00000002.2978007112.000000000420C000.00000004.00001000.00020000.00000000.sdmpfalse
                                unknown
                                http://www.gdca.com.cn/cps/cps0Lz39UartAssist.exefalse
                                  unknown
                                  http://free.cmsoft.cn/assistcenter/help/UartAssistz39UartAssist.exe, 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmp, z39UartAssist.exe, 00000000.00000003.1750748185.000000000420C000.00000004.00001000.00020000.00000000.sdmp, z39UartAssist.exe, 00000000.00000002.2977965266.00000000041F0000.00000004.00001000.00020000.00000000.sdmp, z39UartAssist.exe, 00000000.00000002.2978007112.000000000420C000.00000004.00001000.00020000.00000000.sdmpfalse
                                    unknown
                                    http://www.cmsoft.cnz39UartAssist.exe, z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                      unknown
                                      http://free.cmsoft.cn/tools/ntp/?handler=%dtimestampz39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                        unknown
                                        http://www.gdca.com.cn/cps/cps0Fz39UartAssist.exefalse
                                          unknown
                                          http://www.cmsoft.cn/assistcenter/uartassist_upgrade/z39UartAssist.exe, 00000000.00000003.1750748185.000000000420C000.00000004.00001000.00020000.00000000.sdmp, z39UartAssist.exe, 00000000.00000002.2977965266.00000000041F0000.00000004.00001000.00020000.00000000.sdmp, z39UartAssist.exe, 00000000.00000002.2978007112.000000000420C000.00000004.00001000.00020000.00000000.sdmpfalse
                                            unknown
                                            http://free.cmsoft.cn/assistcenter/z39UartAssist.exe, z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                              unknown
                                              http://www.scomm.cn/assistcenter/z39UartAssist.exe, z39UartAssist.exe, 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                114.55.6.143
                                                www.cmsoft.cnChina
                                                37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
                                                Joe Sandbox version:41.0.0 Charoite
                                                Analysis ID:1541089
                                                Start date and time:2024-10-24 12:01:10 +02:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 5m 3s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:5
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:z39UartAssist.exe
                                                Detection:SUS
                                                Classification:sus26.evad.winEXE@1/1@1/1
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HCA Information:
                                                • Successful, ratio: 62%
                                                • Number of executed functions: 90
                                                • Number of non-executed functions: 256
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                • VT rate limit hit for: z39UartAssist.exe
                                                TimeTypeDescription
                                                06:02:07API Interceptor2x Sleep call for process: z39UartAssist.exe modified
                                                No context
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdbotnet.spc.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 47.112.91.238
                                                la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                • 8.183.101.227
                                                la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                                • 8.142.57.216
                                                la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                                • 139.242.143.221
                                                mips.elfGet hashmaliciousUnknownBrowse
                                                • 8.153.35.184
                                                ppc.elfGet hashmaliciousUnknownBrowse
                                                • 39.107.255.63
                                                arm5.elfGet hashmaliciousUnknownBrowse
                                                • 112.124.60.45
                                                arm.elfGet hashmaliciousUnknownBrowse
                                                • 47.113.142.168
                                                sh4.elfGet hashmaliciousUnknownBrowse
                                                • 42.120.21.77
                                                la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                                • 47.101.241.203
                                                No context
                                                No context
                                                Process:C:\Users\user\Desktop\z39UartAssist.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):126
                                                Entropy (8bit):3.3642727429526764
                                                Encrypted:false
                                                SSDEEP:3:lsyIDGn8rtnnnnnnnnnnnnnnnnnnnnnPYYrn:+685nnnnnnnnnnnnnnnnnnnnPYsn
                                                MD5:42EB5EEB99979253945C98EC4603134E
                                                SHA1:09120CDA3A19A6DE737D935728425048A7399DB7
                                                SHA-256:77787188495B9918144D511F4C3E9C7A3AC2C972219E12B142D3A7F267744982
                                                SHA-512:C972DC7FB459497AC67B03C6DB1E1BE9747AA6FCB2C2EDC87739293CCE435073F2D7A72FB218E979CCE8F757FFFA8746E8FC1CA902DDF3A16B607BA31CFC7B20
                                                Malicious:true
                                                Reputation:low
                                                Preview:[COMMON]..Profile=HBwcHHMFD10cHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcWg==....
                                                File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
                                                Entropy (8bit):7.96487512093428
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.66%
                                                • UPX compressed Win32 Executable (30571/9) 0.30%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • VXD Driver (31/22) 0.00%
                                                File name:z39UartAssist.exe
                                                File size:663'544 bytes
                                                MD5:b117bdf393de8ff72d5a0b68731fcf54
                                                SHA1:d8f63074a1ee7c0140d1316b985a3e4ae5017496
                                                SHA256:ccc1e602d6a8ceeae8f1009170e8d46bc2cbc57d3583f483745c0d5e855ffd0a
                                                SHA512:2ec3a3013e890d16ffc4d19e99a217a21d9b0ab057f6bde7dc5758f5269793ff5e5c3e0dffb9a4bdb43fa85d3a5e48d2eff6e36ffdda232a5a8d04e07ae7e55c
                                                SSDEEP:12288:aFWEXQXe8v5Wd5QLtwmueZOPnw5N3TAK/f15/gK00Xw1F4VVyBoSOy:a4EXQudd5QLK2Ff3/306w1FIG
                                                TLSH:BFE42308D5895EC8C853693E88BFDDF6EF3D9C18A6D60B0B687C7A6A3D373702954502
                                                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                Icon Hash:41c2212b2b96e001
                                                Entrypoint:0x637c60
                                                Entrypoint Section:UPX1
                                                Digitally signed:true
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                                                DLL Characteristics:
                                                Time Stamp:0x66C69C0F [Thu Aug 22 02:01:51 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:86256cb1ab86c0d66e6ed993b2903721
                                                Signature Valid:false
                                                Signature Issuer:CN=CMSOFT.CN, E=support@cmsoft.cn, C=China, S=\u91ce\u4eba\u5bb6\u56ed
                                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                Error Number:-2146762487
                                                Not Before, Not After
                                                • 21/05/2023 11:30:50 31/12/2039 23:59:59
                                                Subject Chain
                                                • CN=CMSOFT.CN, E=support@cmsoft.cn, C=China, S=\u91ce\u4eba\u5bb6\u56ed
                                                Version:3
                                                Thumbprint MD5:D0513EF735314925E41D0B7E9E9FD494
                                                Thumbprint SHA-1:87E9FE8FABE1155CF87671EA90F78FE468980E4B
                                                Thumbprint SHA-256:5B95F97FFB4816DC0911C9B843246C53C245836BD0A58B44D6D032D29B4AFFC6
                                                Serial:1185C26BBAEBC0924661FC6FDCBFACDA
                                                Instruction
                                                pushad
                                                mov esi, 0059F000h
                                                lea edi, dword ptr [esi-0019E000h]
                                                mov dword ptr [edi+0019E9E8h], 948643A7h
                                                push edi
                                                mov ebp, esp
                                                lea ebx, dword ptr [esp-00003E80h]
                                                xor eax, eax
                                                push eax
                                                cmp esp, ebx
                                                jne 00007F6154828F5Dh
                                                inc esi
                                                inc esi
                                                push ebx
                                                push 0023515Ah
                                                push edi
                                                add ebx, 04h
                                                push ebx
                                                push 00098C57h
                                                push esi
                                                add ebx, 04h
                                                push ebx
                                                push eax
                                                mov dword ptr [ebx], 00000003h
                                                push ebp
                                                push edi
                                                push esi
                                                push ebx
                                                sub esp, 7Ch
                                                mov edx, dword ptr [esp+00000090h]
                                                mov dword ptr [esp+74h], 00000000h
                                                mov byte ptr [esp+73h], 00000000h
                                                mov ebp, dword ptr [esp+0000009Ch]
                                                lea eax, dword ptr [edx+04h]
                                                mov dword ptr [esp+78h], eax
                                                mov eax, 00000001h
                                                movzx ecx, byte ptr [edx+02h]
                                                mov ebx, eax
                                                shl ebx, cl
                                                mov ecx, ebx
                                                dec ecx
                                                mov dword ptr [esp+6Ch], ecx
                                                movzx ecx, byte ptr [edx+01h]
                                                shl eax, cl
                                                dec eax
                                                mov dword ptr [esp+68h], eax
                                                mov eax, dword ptr [esp+000000A8h]
                                                movzx esi, byte ptr [edx]
                                                mov dword ptr [ebp+00h], 00000000h
                                                mov dword ptr [esp+60h], 00000000h
                                                mov dword ptr [eax], 00000000h
                                                mov eax, 00000300h
                                                mov dword ptr [esp+64h], esi
                                                mov dword ptr [esp+5Ch], 00000001h
                                                mov dword ptr [esp+58h], 00000001h
                                                mov dword ptr [esp+00h], 00000000h
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x1eb0000x836dUPX1
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x23f31c0x354.rsrc
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x2390000x631c.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0xa06000x19f8UPX0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x2388240x18UPX1
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                UPX00x10000x19e0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                UPX10x19f0000x9a0000x99a004d54dabcf0f6a8cd6b3194feb6546252False0.9978593495728234data7.99940224227282IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x2390000x70000x6800f0a4de259b9e4c928407ee4a4c5792eeFalse0.14629657451923078data3.688979499398818IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_CURSOR0x1f5de40x134data1.0357142857142858
                                                RT_CURSOR0x1f5f180x134data1.0357142857142858
                                                RT_CURSOR0x1f604c0x134data1.0357142857142858
                                                RT_CURSOR0x1f61800x134data1.0357142857142858
                                                RT_CURSOR0x1f62b40x134data1.0357142857142858
                                                RT_CURSOR0x1f63e80x134data1.0357142857142858
                                                RT_CURSOR0x1f651c0x134data1.0357142857142858
                                                RT_CURSOR0x1f66500x134data1.0357142857142858
                                                RT_BITMAP0x1f67840x190dataChineseChina1.0275
                                                RT_BITMAP0x1f69140x40dataChineseChina1.171875
                                                RT_BITMAP0x1f69540x1d0data1.0237068965517242
                                                RT_BITMAP0x1f6b240x1e4data1.0227272727272727
                                                RT_BITMAP0x1f6d080x1d0data1.0237068965517242
                                                RT_BITMAP0x1f6ed80x1d0data1.0237068965517242
                                                RT_BITMAP0x1f70a80x1d0data1.0237068965517242
                                                RT_BITMAP0x1f72780x1d0data1.0237068965517242
                                                RT_BITMAP0x1f74480x1d0data1.0237068965517242
                                                RT_BITMAP0x1f76180x1d0data1.0237068965517242
                                                RT_BITMAP0x1f77e80x1d0OpenPGP Secret Key1.0237068965517242
                                                RT_BITMAP0x1f79b80x1d0data1.0237068965517242
                                                RT_BITMAP0x1f7b880x42a8dataChineseChina1.0009376465072668
                                                RT_BITMAP0x1fbe300xc0data1.0572916666666667
                                                RT_BITMAP0x1fbef00xd8data1.0509259259259258
                                                RT_BITMAP0x1fbfc80xe0data1.0491071428571428
                                                RT_BITMAP0x1fc0a80x4e0dataChineseChina1.0088141025641026
                                                RT_BITMAP0x1fc5880xe0data1.0491071428571428
                                                RT_BITMAP0x1fc6680x54dataChineseChina1.130952380952381
                                                RT_BITMAP0x1fc6bc0xc8dataChineseChina1.055
                                                RT_BITMAP0x1fc7840x5cdataChineseChina1.1195652173913044
                                                RT_BITMAP0x1fc7e00x5cdataChineseChina1.1195652173913044
                                                RT_BITMAP0x1fc83c0xc0dataChineseChina1.0572916666666667
                                                RT_BITMAP0x1fc8fc0x54dataChineseChina1.130952380952381
                                                RT_BITMAP0x1fc9500xb0dataChineseChina1.0625
                                                RT_BITMAP0x1fca000x5cdataChineseChina1.1195652173913044
                                                RT_BITMAP0x1fca5c0xc8dataChineseChina1.055
                                                RT_BITMAP0x1fcb240xc8dataChineseChina1.055
                                                RT_BITMAP0x1fcbec0xe0data1.0491071428571428
                                                RT_BITMAP0x1fcccc0xc0data1.0572916666666667
                                                RT_BITMAP0x1fcd8c0xc0data1.0572916666666667
                                                RT_BITMAP0x1fce4c0x2f8dataChineseChina1.0144736842105264
                                                RT_BITMAP0x1fd1440x4d8dataChineseChina1.0088709677419354
                                                RT_BITMAP0x1fd61c0x2f8dataChineseChina1.0144736842105264
                                                RT_BITMAP0x1fd9140x338dataChineseChina1.0133495145631068
                                                RT_BITMAP0x1fdc4c0x110dataChineseChina1.0404411764705883
                                                RT_BITMAP0x1fdd5c0x2f8dataChineseChina1.0144736842105264
                                                RT_BITMAP0x1fe0540x4d8dataChineseChina1.0088709677419354
                                                RT_BITMAP0x1fe52c0x3a8dataChineseChina1.0117521367521367
                                                RT_BITMAP0x1fe8d40x4d8dataChineseChina1.0088709677419354
                                                RT_BITMAP0x1fedac0x1d8dataChineseChina1.0233050847457628
                                                RT_BITMAP0x1fef840x2c8dataChineseChina1.0154494382022472
                                                RT_BITMAP0x1ff24c0xd8dataChineseChina1.0509259259259258
                                                RT_BITMAP0x1ff3240x2f8dataChineseChina1.0144736842105264
                                                RT_BITMAP0x1ff61c0x2f8dataChineseChina1.0144736842105264
                                                RT_BITMAP0x1ff9140x268dataChineseChina1.0178571428571428
                                                RT_BITMAP0x1ffb7c0x268dataChineseChina1.0178571428571428
                                                RT_BITMAP0x1ffde40xe0data1.0491071428571428
                                                RT_BITMAP0x1ffec40xd8data1.0509259259259258
                                                RT_BITMAP0x1fff9c0xd8data1.0509259259259258
                                                RT_BITMAP0x2000740xc0data1.0572916666666667
                                                RT_BITMAP0x2001340xd8data1.0509259259259258
                                                RT_BITMAP0x20020c0xe0data1.0491071428571428
                                                RT_BITMAP0x2002ec0xd8data1.0509259259259258
                                                RT_BITMAP0x2003c40xe8data1.0474137931034482
                                                RT_BITMAP0x2004ac0xc0data1.0572916666666667
                                                RT_BITMAP0x20056c0x588dataChineseChina1.0077683615819208
                                                RT_BITMAP0x200af40x188dataEnglishUnited States1.028061224489796
                                                RT_BITMAP0x200c7c0x188dataEnglishUnited States1.028061224489796
                                                RT_BITMAP0x200e040x188dataEnglishUnited States1.028061224489796
                                                RT_BITMAP0x200f8c0x188dataEnglishUnited States1.028061224489796
                                                RT_BITMAP0x2011140x328dataChineseChina1.0136138613861385
                                                RT_BITMAP0x20143c0x328dataChineseChina1.0136138613861385
                                                RT_BITMAP0x2017640x328dataChineseChina1.0136138613861385
                                                RT_BITMAP0x201a8c0x328dataChineseChina1.0136138613861385
                                                RT_BITMAP0x201db40x3308dataChineseChina1.0008420085731782
                                                RT_BITMAP0x2050bc0xe0data1.0491071428571428
                                                RT_ICON0x23ade80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0, resolution 2835 x 2835 px/mChineseChina0.049362305148795464
                                                RT_ICON0x2093c40x10a8dataChineseChina1.002579737335835
                                                RT_ICON0x20a46c0x10a8dataChineseChina1.002579737335835
                                                RT_ICON0x20b5140x10a8dataChineseChina1.002579737335835
                                                RT_ICON0x20c5bc0x10a8dataChineseChina1.002579737335835
                                                RT_ICON0x20d6640x10a8dataChineseChina1.002579737335835
                                                RT_DIALOG0x20e70c0x52data1.1341463414634145
                                                RT_STRING0x20e7600x80data1.0859375
                                                RT_STRING0x20e7e00x314data1.013959390862944
                                                RT_STRING0x20eaf40xd8data1.0509259259259258
                                                RT_STRING0x20ebcc0x160data1.03125
                                                RT_STRING0x20ed2c0x240data1.0190972222222223
                                                RT_STRING0x20ef6c0x314data1.013959390862944
                                                RT_STRING0x20f2800x404data1.0107003891050583
                                                RT_STRING0x20f6840x4a4data1.0092592592592593
                                                RT_STRING0x20fb280x3e8data1.011
                                                RT_STRING0x20ff100xf4data1.0450819672131149
                                                RT_STRING0x2100040xc4data1.0561224489795917
                                                RT_STRING0x2100c80x2c0data1.015625
                                                RT_STRING0x2103880x3a4data1.011802575107296
                                                RT_STRING0x21072c0x374data1.012443438914027
                                                RT_STRING0x210aa00x308data1.0141752577319587
                                                RT_STRING0x210da80x40cdata1.0106177606177607
                                                RT_STRING0x2111b40x3b8data1.0115546218487395
                                                RT_STRING0x21156c0x454data1.009927797833935
                                                RT_STRING0x2119c00x23cdata1.0192307692307692
                                                RT_STRING0x211bfc0x100data1.04296875
                                                RT_STRING0x211cfc0x208data1.021153846153846
                                                RT_STRING0x211f040x4f0data1.0087025316455696
                                                RT_RCDATA0x2123f40x10Non-ISO extended-ASCII text, with no line terminators, with escape sequences1.5625
                                                RT_RCDATA0x2124040x71acdata1.0005498281786942
                                                RT_GROUP_CURSOR0x2195b00x14data1.45
                                                RT_GROUP_CURSOR0x2195c40x14data1.45
                                                RT_GROUP_CURSOR0x2195d80x14zlib compressed data1.45
                                                RT_GROUP_CURSOR0x2195ec0x14data1.45
                                                RT_GROUP_CURSOR0x2196000x14data1.45
                                                RT_GROUP_CURSOR0x2196140x14data1.45
                                                RT_GROUP_CURSOR0x2196280x14Non-ISO extended-ASCII text, with no line terminators1.45
                                                RT_GROUP_CURSOR0x21963c0x14Non-ISO extended-ASCII text, with no line terminators, with overstriking1.45
                                                RT_GROUP_ICON0x23f0140x14dataChineseChina1.1
                                                RT_GROUP_ICON0x2196640x14dataChineseChina1.4
                                                RT_GROUP_ICON0x2196780x14dataChineseChina1.45
                                                RT_GROUP_ICON0x21968c0x14dataChineseChina1.45
                                                RT_GROUP_ICON0x2196a00x14dataChineseChina1.4
                                                RT_GROUP_ICON0x2196b40x14dataChineseChina1.45
                                                RT_VERSION0x23f02c0x2f0SysEx File - IDPChineseChina0.5106382978723404
                                                DLLImport
                                                ADVAPI32.DLLRegCloseKey
                                                COMCTL32.DLL
                                                COMDLG32.DLLFindTextA
                                                GDI32.DLLArc
                                                IPHLPAPI.DLLGetAdaptersAddresses
                                                KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
                                                OLE32.DLLCoInitialize
                                                OLEAUT32.DLLVariantInit
                                                SETUPAPI.DLLSetupDiGetClassDevsA
                                                SHELL32.DLLSHGetMalloc
                                                USER32.DLLGetDC
                                                VERSION.DLLVerQueryValueA
                                                WINMM.DLLtimeSetEvent
                                                WINSPOOL.DRVClosePrinter
                                                WSOCK32.DLLbind
                                                Language of compilation systemCountry where language is spokenMap
                                                ChineseChina
                                                EnglishUnited States
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 24, 2024 12:02:09.491430044 CEST4973280192.168.2.4114.55.6.143
                                                Oct 24, 2024 12:02:09.496831894 CEST8049732114.55.6.143192.168.2.4
                                                Oct 24, 2024 12:02:09.496937037 CEST4973280192.168.2.4114.55.6.143
                                                Oct 24, 2024 12:02:09.501636982 CEST4973280192.168.2.4114.55.6.143
                                                Oct 24, 2024 12:02:09.506983995 CEST8049732114.55.6.143192.168.2.4
                                                Oct 24, 2024 12:02:10.464418888 CEST8049732114.55.6.143192.168.2.4
                                                Oct 24, 2024 12:02:10.464476109 CEST8049732114.55.6.143192.168.2.4
                                                Oct 24, 2024 12:02:10.464528084 CEST8049732114.55.6.143192.168.2.4
                                                Oct 24, 2024 12:02:10.464565992 CEST8049732114.55.6.143192.168.2.4
                                                Oct 24, 2024 12:02:10.464590073 CEST4973280192.168.2.4114.55.6.143
                                                Oct 24, 2024 12:02:10.464637041 CEST4973280192.168.2.4114.55.6.143
                                                Oct 24, 2024 12:02:10.464644909 CEST4973280192.168.2.4114.55.6.143
                                                Oct 24, 2024 12:02:10.470561028 CEST8049732114.55.6.143192.168.2.4
                                                Oct 24, 2024 12:02:10.470643997 CEST4973280192.168.2.4114.55.6.143
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 24, 2024 12:02:09.026721001 CEST5471453192.168.2.41.1.1.1
                                                Oct 24, 2024 12:02:09.488128901 CEST53547141.1.1.1192.168.2.4
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Oct 24, 2024 12:02:09.026721001 CEST192.168.2.41.1.1.10xb743Standard query (0)www.cmsoft.cnA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Oct 24, 2024 12:02:09.488128901 CEST1.1.1.1192.168.2.40xb743No error (0)www.cmsoft.cn114.55.6.143A (IP address)IN (0x0001)false
                                                • www.cmsoft.cn
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.449732114.55.6.143802084C:\Users\user\Desktop\z39UartAssist.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 24, 2024 12:02:09.501636982 CEST255OUTGET /assistcenter/uartassist_upgrade/?ver=50014&ident=SYWVSLRYMZWXKN5D&stamp=01729767727 HTTP/1.0
                                                Host: www.cmsoft.cn
                                                User-Agent: Mozilla/4.0
                                                Accept: */*
                                                Accept-Language: zh-cn
                                                Accept-Encoding: identity
                                                Connection: close
                                                Cache-Control: no-cache
                                                Oct 24, 2024 12:02:10.464418888 CEST1236INHTTP/1.1 200 OK
                                                Server: nginx
                                                Date: Thu, 24 Oct 2024 10:02:10 GMT
                                                Content-Type: text/html
                                                Content-Length: 2555
                                                Last-Modified: Fri, 20 Sep 2024 07:49:33 GMT
                                                Connection: close
                                                Vary: Accept-Encoding
                                                ETag: "66ed290d-9fb"
                                                Strict-Transport-Security: max-age=31536000
                                                Accept-Ranges: bytes
                                                Data Raw: 23 6d 65 73 73 61 67 65 3d 7b 0a 35 2e 30 2e 32 0a 20 28 31 29 20 d4 f6 bc d3 d7 d4 b6 af d3 a6 b4 f0 d1 d3 ca b1 b2 ce ca fd c9 e8 d6 c3 0a 20 28 32 29 20 d3 c5 bb af 4a 54 38 30 38 d6 d5 b6 cb c4 a3 c4 e2 c6 f7 a3 ac d4 f6 bc d3 b6 a8 ca b1 d0 c4 cc f8 c9 e8 d6 c3 0a 20 28 33 29 20 d3 c5 bb af b8 bd bc d3 ce bb c9 e8 d6 c3 a3 ac d4 f6 bc d3 d0 a3 d1 e9 c6 ab d2 c6 d2 d4 bc b0 b9 cc b6 a8 d6 a1 ce b2 0a 20 28 34 29 20 d4 f6 c7 bf d7 aa d2 e5 b7 fb d6 a7 b3 d6 a3 ac bf c9 d4 da b7 a2 cb cd b4 b0 bf da d6 b1 bd d3 b7 a2 cb cd bd c5 b1 be b4 fa c2 eb 0a 35 2e 30 2e 31 0a 20 28 31 29 20 d4 f6 bc d3 d7 d4 b6 af d3 a6 b4 f0 2f d7 d4 b6 a8 d2 e5 bd c5 b1 be 0a 20 28 32 29 20 d4 f6 bc d3 4a 54 38 30 38 d0 ad d2 e9 d6 d5 b6 cb c4 a3 c4 e2 0a 20 28 33 29 20 d4 f6 bc d3 4d 6f 64 62 75 73 d0 ad d2 e9 d6 d5 b6 cb b5 f7 ca d4 0a 20 28 34 29 20 d4 f6 bc d3 b8 a1 b5 e3 d7 aa bb bb bc c6 cb e3 c6 f7 0a 20 28 35 29 20 d7 a8 d2 b5 b0 e6 d4 f6 c7 bf d6 a7 b3 d6 0a 34 2e 33 2e 31 35 0a 20 28 31 29 20 bd d3 ca d5 b4 b0 [TRUNCATED]
                                                Data Ascii: #message={5.0.2 (1) (2) JT808 (3) (4) 5.0.1 (1) / (2) JT808 (3) Modbus (4) (5) 4.3.15 (1) (2) (3) (4) 4.3.9 (1) (2) (3) (4) 4.3.0 (1) (2) (3) ASCII(download right now)?}#url1=http://free.cmsoft.cn/download/cmsoft/assistant/uartassist5.0.14.zip#method=2 (redirect)#version=5.0.13#configs={qqgroup = 312280605tipcolor = #FF6600tipcycles=0uchidden=trueqqhidden=truebrandhidd
                                                Oct 24, 2024 12:02:10.464476109 CEST212INData Raw: 65 6e 3d 74 72 75 65 0a 7d 0a 0a 24 24 63 56 64 62 49 53 46 54 58 56 74 48 4a 52 63 66 5a 45 74 79 54 48 4a 44 52 68 63 66 66 48 6c 44 65 48 79 32 35 4e 43 78 4d 57 46 6b 32 39 43 70 39 58 72 62 30 4e 48 6b 65 64 72 77 31 37 65 30 32 61 50 79 65
                                                Data Ascii: en=true}$$cVdbISFTXVtHJRcfZEtyTHJDRhcffHlDeHy25NCxMWFk29Cp9Xrb0NHkedrw17e02aPyeqvvo9rdzqWner221MrVudnWeBcffHlOeHyiptDi1sWv9rbk0LHdtNzg1/Ov6d3ls8Oq8hcffHlBeHzYxtK6ofTc+7bk0LE9YTfb7a+22MSmsBcffHlGeHzYxtK6ofTc+7b
                                                Oct 24, 2024 12:02:10.464528084 CEST1236INData Raw: 6b 30 4c 47 39 74 4e 33 6c 30 2f 79 75 39 62 33 50 31 64 58 59 78 4b 61 77 46 78 39 38 65 55 74 34 66 4c 79 79 32 64 5a 6f 4e 31 70 57 57 31 65 38 78 37 37 34 31 73 57 76 39 72 37 77 30 63 47 69 72 36 44 2b 46 78 39 38 65 55 52 34 66 4b 54 32 70
                                                Data Ascii: k0LG9tN3l0/yu9b3P1dXYxKawFx98eUt4fLyy2dZoN1pWW1e8x7741sWv9r7w0cGir6D+Fx98eUR4fKT2peC8stnWsavVynwXH0tyTHJDQRcffHlDeHy8rrbkYWY3ej02QU5qOGFs1sLav77V0OCqrra52MSmsBcffHlOeHyxq9XKN1pWW1e8x77426aiptDi1sWv9rzNrq8XH3x5QXh8q++j2t3Opad62vDXt93Opae25NCxoq
                                                Oct 24, 2024 12:02:10.464565992 CEST166INData Raw: 36 55 6c 42 59 55 6c 74 6b 55 31 42 59 56 6c 4d 6d 57 32 78 62 4c 6c 68 61 56 6b 64 44 53 33 78 38 65 64 4b 6f 33 50 54 62 70 74 44 70 71 63 6d 30 73 4b 53 2f 77 63 44 62 79 36 4c 56 56 6c 4d 6f 65 42 63 66 63 57 4e 6a 50 53 35 61 4b 79 78 48 51
                                                Data Ascii: 6UlBYUltkU1BYVlMmW2xbLlhaVkdDS3x8edKo3PTbptDpqcm0sKS/wcDby6LVVlMoeBcfcWNjPS5aKyxHQUNOTklMRExLcHxEQ0hLTklOSEl8fBcfcWNjMitXXlsuR0hNS0lISUFMSRcfcStRWVhWVltSR2ZuazsXHxc=


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Target ID:0
                                                Start time:06:02:07
                                                Start date:24/10/2024
                                                Path:C:\Users\user\Desktop\z39UartAssist.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\z39UartAssist.exe"
                                                Imagebase:0x400000
                                                File size:663'544 bytes
                                                MD5 hash:B117BDF393DE8FF72D5A0B68731FCF54
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:Borland Delphi
                                                Yara matches:
                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:7.4%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:11.1%
                                                  Total number of Nodes:2000
                                                  Total number of Limit Nodes:60
                                                  execution_graph 82549 474f44 82550 474f5b 82549->82550 82572 52da24 82550->82572 82555 47504d LoadBitmapA 82557 474f64 82555->82557 82557->82555 82558 4750c3 82557->82558 82570 474f71 82557->82570 82580 5572a0 82557->82580 82588 52dca0 82557->82588 82592 52d308 KiUserCallbackDispatcher 82557->82592 82615 52da70 82557->82615 82559 4751ea 82558->82559 82564 4750cd 82558->82564 82619 5157a4 44 API calls 82559->82619 82561 4751f7 82620 52d308 KiUserCallbackDispatcher 82561->82620 82593 517868 82564->82593 82565 47510f 82566 47514b LoadBitmapA 82565->82566 82567 47516a 82565->82567 82566->82567 82567->82570 82599 558b14 82567->82599 82573 52da2f 82572->82573 82579 52da65 82572->82579 82574 52da45 82573->82574 82639 4d4714 38 API calls 82573->82639 82576 52da58 82574->82576 82640 530fc0 105 API calls 82574->82640 82576->82579 82621 530eec 82576->82621 82579->82557 82581 5572aa 82580->82581 82707 535334 82581->82707 82583 5572e6 82715 52dc7c 82583->82715 82587 557315 82587->82557 82589 52dcc3 82588->82589 82590 52dca8 82588->82590 82589->82557 82591 52ed14 100 API calls 82590->82591 82591->82589 82592->82557 82594 517873 82593->82594 82595 51789d 82593->82595 82787 5157a4 44 API calls 82594->82787 82595->82565 82597 517890 82597->82595 82788 5318b4 82597->82788 82601 558b2d 82599->82601 82600 4751be 82600->82570 82603 473168 82600->82603 82601->82600 82792 565d75 66 API calls 82601->82792 82604 47317f 82603->82604 82793 558efc 82604->82793 82606 4731ba 82799 568db0 82606->82799 82610 47321e 82612 47327a 82610->82612 82815 475224 GetLocaleInfoA 82610->82815 82806 4ca180 GetClassInfoA 82612->82806 82616 52da7c 82615->82616 82618 52da9c 82615->82618 82617 52ed14 100 API calls 82616->82617 82617->82618 82618->82557 82619->82561 82620->82570 82622 530f00 82621->82622 82641 52ed14 82622->82641 82624 530f12 82625 530f8d 82624->82625 82627 52ed14 100 API calls 82624->82627 82626 52ed14 100 API calls 82625->82626 82628 530fba 82626->82628 82629 530f35 82627->82629 82628->82579 82630 52ed14 100 API calls 82629->82630 82631 530f45 82630->82631 82632 52ed14 100 API calls 82631->82632 82633 530f55 82632->82633 82634 52ed14 100 API calls 82633->82634 82635 530f65 82634->82635 82635->82625 82636 52ed14 100 API calls 82635->82636 82637 530f86 82636->82637 82646 531a08 82637->82646 82639->82574 82640->82576 82642 52ed30 82641->82642 82643 52ed3b 82641->82643 82642->82643 82650 531ca0 82642->82650 82668 52ede0 82642->82668 82643->82624 82648 531a10 82646->82648 82647 531a43 82647->82625 82648->82647 82695 53190c 82648->82695 82651 531cb3 82650->82651 82652 531ccb 82650->82652 82653 531d25 82651->82653 82654 531cb5 82651->82654 82656 531cc6 82652->82656 82682 531c0c 82652->82682 82655 52ede0 98 API calls 82653->82655 82654->82656 82660 531dc2 GetCapture 82654->82660 82662 531d2e 82655->82662 82659 52ede0 98 API calls 82656->82659 82666 531d62 82656->82666 82659->82666 82660->82656 82661 531dcd 82660->82661 82661->82656 82665 52ed14 98 API calls 82661->82665 82662->82666 82681 531b78 100 API calls 82662->82681 82663 531d83 82663->82666 82667 531da6 NtdllDefWindowProc_A 82663->82667 82665->82656 82666->82643 82667->82666 82673 52edf6 82668->82673 82669 52ef4b 82670 52ef62 KiUserCallbackDispatcher 82669->82670 82694 52d6f0 100 API calls 82669->82694 82677 52eecd 82670->82677 82671 52ee84 82674 52eeb2 82671->82674 82678 52eea7 82671->82678 82673->82669 82673->82671 82676 52ee3c 82673->82676 82673->82677 82693 51e464 100 API calls 82674->82693 82676->82670 82676->82677 82677->82643 82678->82670 82678->82676 82679 52ef0e GetKeyboardState 82678->82679 82680 52ef2a 82679->82680 82680->82677 82681->82666 82690 5341f0 82682->82690 82684 531c1d GetCapture 82685 531c45 82684->82685 82688 531c28 82684->82688 82692 531b78 100 API calls 82685->82692 82686 531c91 82686->82656 82686->82663 82688->82686 82689 52ed14 99 API calls 82688->82689 82689->82686 82691 5341fa 82690->82691 82691->82684 82692->82688 82693->82676 82694->82670 82700 531921 82695->82700 82696 531993 82697 5319d8 82696->82697 82698 52ed14 100 API calls 82696->82698 82697->82647 82698->82697 82700->82696 82701 53190c 100 API calls 82700->82701 82702 4c0f34 82700->82702 82701->82700 82703 4c0f3e 82702->82703 82704 4c0f52 82703->82704 82706 4c0e70 38 API calls 82703->82706 82704->82700 82706->82704 82708 53533e 82707->82708 82723 52cc28 82708->82723 82710 535354 82729 50a3c4 82710->82729 82712 535360 82740 52c704 82712->82740 82714 535371 82714->82583 82716 52dc81 82715->82716 82717 52dc9e 82715->82717 82716->82717 82718 52ed14 100 API calls 82716->82718 82719 52dcf0 82717->82719 82718->82717 82720 52dcf5 82719->82720 82721 52dd0a 82719->82721 82722 52ed14 100 API calls 82720->82722 82721->82587 82722->82721 82724 52cc32 82723->82724 82744 4c9040 82724->82744 82726 52cc48 82748 5098ac 82726->82748 82728 52cc67 82728->82710 82730 50a3cb 82729->82730 82731 50a3e0 RtlInitializeCriticalSection 82730->82731 82732 5098ac 9 API calls 82731->82732 82733 50a3f5 82732->82733 82768 509dd8 82733->82768 82735 50a416 82772 50a0c4 82735->82772 82737 50a437 82776 4c1274 82737->82776 82739 50a467 82739->82712 82741 52c716 82740->82741 82742 52c70f 82740->82742 82741->82714 82786 52c6d0 62 API calls 82742->82786 82745 4c9047 82744->82745 82746 4c906a 82745->82746 82752 4c91f8 38 API calls 82745->82752 82746->82726 82749 5098b2 82748->82749 82753 508da8 82749->82753 82751 5098d4 82751->82728 82752->82746 82754 508dc3 82753->82754 82761 508d90 RtlEnterCriticalSection 82754->82761 82756 508dcd 82759 508e2a 82756->82759 82763 4e0e78 82756->82763 82762 508d9c RtlLeaveCriticalSection 82759->82762 82760 508e7b 82760->82751 82761->82756 82762->82760 82764 4e0e7d 82763->82764 82766 4e0e90 82763->82766 82764->82766 82767 4e0ff0 7 API calls 82764->82767 82766->82759 82767->82766 82769 509dde 82768->82769 82770 508da8 9 API calls 82769->82770 82771 509df9 82770->82771 82771->82735 82773 50a0ca 82772->82773 82774 508da8 9 API calls 82773->82774 82775 50a0e5 82774->82775 82775->82737 82783 4c12fc RtlEnterCriticalSection 82776->82783 82778 4c12ad 82784 4c1360 RtlLeaveCriticalSection 82778->82784 82779 4c1286 82779->82778 82785 4c0e70 38 API calls 82779->82785 82782 4c12ef 82782->82739 82783->82779 82784->82782 82785->82778 82786->82741 82787->82597 82789 5318cb 82788->82789 82790 5318bd 82788->82790 82789->82595 82791 52ed14 100 API calls 82790->82791 82791->82789 82792->82601 82794 558f15 82793->82794 82796 558f41 82794->82796 82816 558cb8 82794->82816 82797 558f4b 82796->82797 82819 5635d4 63 API calls 82796->82819 82797->82606 82820 4e2b98 82799->82820 82802 568d80 82803 568d91 82802->82803 82804 568d99 82802->82804 82832 4e2b44 82803->82832 82804->82610 82807 4ca1b0 82806->82807 82808 4ca1d9 CreateWindowExA 82807->82808 82809 4ca1be UnregisterClassA 82807->82809 82810 4ca1cf RegisterClassA 82807->82810 82811 4732b1 82808->82811 82812 4ca210 82808->82812 82809->82810 82810->82808 82811->82570 82837 4ca0c4 82812->82837 82814 4ca21b SetWindowLongA 82814->82811 82815->82612 82817 558b14 66 API calls 82816->82817 82818 558cc4 82817->82818 82818->82796 82819->82796 82821 4e2b9c 82820->82821 82823 4e2bac 82820->82823 82821->82823 82826 4e2c08 82821->82826 82822 47320e 82822->82802 82823->82822 82831 4e0e98 7 API calls 82823->82831 82827 4e2c0c 82826->82827 82828 4e2c30 82826->82828 82829 4e0e78 7 API calls 82827->82829 82828->82823 82830 4e2c19 82829->82830 82830->82823 82831->82822 82833 4e2b4a 82832->82833 82835 4e2b65 82832->82835 82833->82835 82836 4e0e98 7 API calls 82833->82836 82835->82804 82836->82835 82838 4ca0d4 VirtualAlloc 82837->82838 82839 4ca102 82837->82839 82838->82839 82839->82814 82840 443900 82841 443917 82840->82841 82842 443ba9 82841->82842 82873 43dea4 67 API calls 82841->82873 82844 443975 82844->82842 82845 4439c6 82844->82845 82846 4439d3 82844->82846 82874 43bfc4 82844->82874 82904 47296c 100 API calls 82845->82904 82855 443a6b 82846->82855 82905 52db50 82846->82905 82852 443b2e 82856 443b7f 82852->82856 82857 443b99 82852->82857 82854 568db0 7 API calls 82860 443a15 82854->82860 82859 443aa0 82855->82859 82863 43bfc4 160 API calls 82855->82863 82861 443b93 PostMessageA 82856->82861 82858 568d80 7 API calls 82857->82858 82858->82842 82862 443ae7 82859->82862 82864 43bfc4 160 API calls 82859->82864 82866 568d80 7 API calls 82860->82866 82861->82857 82862->82852 82865 43bfc4 160 API calls 82862->82865 82863->82859 82864->82862 82865->82852 82867 443a34 82866->82867 82868 568d80 7 API calls 82867->82868 82869 443a44 82868->82869 82869->82855 82870 443a5d 82869->82870 82871 43bfc4 160 API calls 82869->82871 82916 52db80 82870->82916 82871->82870 82873->82844 82875 43bfe6 82874->82875 82876 43bff7 82875->82876 82877 43c03e 82875->82877 82878 43c008 SetEvent 82876->82878 82903 43c032 82876->82903 82879 43c05e 82877->82879 82923 43bf00 82877->82923 82880 43c029 82878->82880 82882 52db50 100 API calls 82879->82882 82886 43c062 82879->82886 82881 43c015 Sleep 82880->82881 82880->82903 82931 51d7d0 23 API calls 82881->82931 82887 43c0fc 82882->82887 82886->82845 82888 568d80 7 API calls 82887->82888 82889 43c128 82888->82889 82891 43c16b 82889->82891 82892 43c150 82889->82892 82890 568d80 7 API calls 82890->82886 82891->82890 82893 43c233 82892->82893 82900 43c29b 82892->82900 82932 55d764 82893->82932 82895 568d80 7 API calls 82895->82886 82898 43c254 82899 568d80 7 API calls 82898->82899 82901 43c283 82899->82901 82900->82895 82902 568d80 7 API calls 82901->82902 82902->82903 82936 43c3e8 82903->82936 82904->82846 83721 52dac4 82905->83721 82908 4e2c34 7 API calls 82910 52db6b 82908->82910 82909 4439f4 82912 568cd0 82909->82912 82910->82909 83724 52dad4 100 API calls 82910->83724 82913 568ce6 82912->82913 83725 568f5c 82913->83725 82917 52db50 100 API calls 82916->82917 82920 52dba3 82917->82920 82918 52dbbf 82919 4e2b44 7 API calls 82918->82919 82921 52dbd4 82919->82921 82920->82918 83742 52db2c 82920->83742 82921->82855 82924 43bf13 82923->82924 82955 4adb44 82924->82955 82926 43bf2d 82928 43bf5d 82926->82928 82973 4aedf4 82926->82973 82928->82879 82931->82880 83656 55db54 82932->83656 82934 43c24c 82935 43c5c8 102 API calls 82934->82935 82935->82898 82937 43c3fd 82936->82937 82938 43c4ba 82937->82938 82939 43c475 82937->82939 82940 52db80 100 API calls 82938->82940 82941 52db80 100 API calls 82939->82941 82942 43c4ed 82940->82942 82943 43c4a8 82941->82943 82944 568d80 7 API calls 82942->82944 82946 568d80 7 API calls 82943->82946 82945 43c4b8 82944->82945 82947 52da70 100 API calls 82945->82947 82946->82945 82948 43c50a 82947->82948 83661 447e44 82948->83661 82954 43c51f 82954->82886 82956 4adb53 82955->82956 82995 51633c 82956->82995 82958 4adb7f 83017 509ca8 82958->83017 82961 568d80 7 API calls 82962 4adbc6 82961->82962 83021 509db0 82962->83021 82967 517868 105 API calls 82968 4adbfa 82967->82968 83028 534310 82968->83028 82972 4adc14 82972->82926 82974 4aee09 82973->82974 82975 52db80 100 API calls 82974->82975 82976 4aee38 82975->82976 82977 568d80 7 API calls 82976->82977 82978 4aee48 82977->82978 83145 4aef10 82978->83145 82996 516346 82995->82996 83037 515534 82996->83037 82998 51635c 83041 52d298 KiUserCallbackDispatcher 82998->83041 83000 51636d 83042 52d308 KiUserCallbackDispatcher 83000->83042 83002 51638e 83003 50a3c4 43 API calls 83002->83003 83004 5163ea 83003->83004 83005 52c704 62 API calls 83004->83005 83006 5163fb 83005->83006 83043 516fb0 83006->83043 83011 52dc7c 100 API calls 83012 51646e 83011->83012 83053 534330 83012->83053 83016 516483 83016->82958 83018 4adbb6 83017->83018 83019 509cb8 83017->83019 83018->82961 83133 509a30 83019->83133 83022 509dc2 83021->83022 83023 509a30 11 API calls 83022->83023 83024 4adbe0 83023->83024 83025 509d20 MulDiv 83024->83025 83140 509c68 83025->83140 83029 534318 83028->83029 83030 4adc07 83028->83030 83031 52ed14 100 API calls 83029->83031 83032 516f50 83030->83032 83031->83030 83033 516f72 83032->83033 83034 516f59 83032->83034 83144 52d56c KiUserCallbackDispatcher 83033->83144 83034->82972 83036 516f79 83036->82972 83038 51553a 83037->83038 83061 530074 83038->83061 83040 51554f 83040->82998 83041->83000 83042->83002 83044 516fd6 83043->83044 83045 51645c 83043->83045 83046 516fe6 83044->83046 83116 518020 38 API calls 83044->83116 83049 52dd14 83045->83049 83047 52da70 100 API calls 83046->83047 83047->83045 83050 516465 83049->83050 83051 52dd19 83049->83051 83050->83011 83051->83050 83052 52ed14 100 API calls 83051->83052 83052->83050 83054 516477 83053->83054 83055 534338 83053->83055 83057 51b4d0 83054->83057 83056 52ed14 100 API calls 83055->83056 83056->83054 83059 51b4e0 83057->83059 83058 51b505 83058->83016 83059->83058 83117 51e348 83059->83117 83062 530085 83061->83062 83063 52cc28 40 API calls 83062->83063 83064 5300a9 83063->83064 83065 4ca0c4 VirtualAlloc 83064->83065 83066 5300b4 83065->83066 83067 50a0c4 9 API calls 83066->83067 83068 5300c6 83067->83068 83080 50a274 83068->83080 83071 5300fb 83073 4e2b44 7 API calls 83071->83073 83072 530108 83084 51b8e0 42 API calls 83072->83084 83075 530106 83073->83075 83078 4e2b44 7 API calls 83075->83078 83076 530117 83077 4e2b98 7 API calls 83076->83077 83077->83075 83079 53016b 83078->83079 83079->83040 83081 50a286 83080->83081 83085 50a1f0 83081->83085 83084->83076 83092 509604 83085->83092 83093 509611 83092->83093 83094 50960b RtlEnterCriticalSection 83092->83094 83095 508f3c 83093->83095 83094->83093 83107 508d90 RtlEnterCriticalSection 83095->83107 83097 508f55 83098 508da8 9 API calls 83097->83098 83099 508f71 83098->83099 83108 508e8c 83099->83108 83101 508f8f 83115 508d9c RtlLeaveCriticalSection 83101->83115 83103 508fa4 83104 509614 83103->83104 83105 509621 83104->83105 83106 50961b RtlLeaveCriticalSection 83104->83106 83105->83071 83105->83072 83106->83105 83107->83097 83109 508ea2 83108->83109 83110 508f38 83108->83110 83111 508d90 RtlEnterCriticalSection 83109->83111 83110->83101 83113 508eb0 83111->83113 83112 508d9c RtlLeaveCriticalSection 83114 508f12 83112->83114 83113->83112 83114->83101 83115->83103 83116->83046 83118 51e3b7 83117->83118 83124 51e35b 83117->83124 83118->83058 83119 51e3be 83120 51e2ec 2 API calls 83119->83120 83120->83118 83122 51e3af 83129 51e2ec IsWindowVisible 83122->83129 83124->83119 83124->83122 83125 51e3a5 IsChild 83124->83125 83126 51b44c 83124->83126 83125->83122 83125->83124 83127 4c0f34 38 API calls 83126->83127 83128 51b45c 83127->83128 83128->83124 83130 51e343 83129->83130 83131 51e30f 83129->83131 83130->83118 83131->83130 83132 51e317 SetWindowPos 83131->83132 83132->83130 83134 509604 RtlEnterCriticalSection 83133->83134 83135 509a42 83134->83135 83136 508f3c 9 API calls 83135->83136 83137 509a5f 83136->83137 83138 509614 RtlLeaveCriticalSection 83137->83138 83139 509a74 83138->83139 83139->83018 83141 509c7a 83140->83141 83142 509a30 11 API calls 83141->83142 83143 4adbf0 83142->83143 83143->82967 83144->83036 83146 4aef20 83145->83146 83402 403fa0 83146->83402 83148 4aef4c 83149 52db80 100 API calls 83148->83149 83150 4aef80 83149->83150 83151 568d80 7 API calls 83150->83151 83152 4aef90 83151->83152 83406 403b88 83152->83406 83154 4aefc5 83155 568db0 7 API calls 83154->83155 83156 4af03a 83155->83156 83157 568d80 7 API calls 83156->83157 83158 4af04a 83157->83158 83159 52dca0 100 API calls 83158->83159 83160 4af05a 83159->83160 83161 568db0 7 API calls 83160->83161 83162 4af085 83161->83162 83163 568d80 7 API calls 83162->83163 83164 4af095 83163->83164 83414 4d05c8 83164->83414 83167 4d05c8 38 API calls 83168 4af0da 83167->83168 83417 568dd8 83168->83417 83170 4af10f 83171 568dd8 7 API calls 83170->83171 83172 4af137 83171->83172 83173 568dd8 7 API calls 83172->83173 83403 403faf 83402->83403 83425 4ef130 83403->83425 83405 403fd7 83405->83148 83407 403ba9 83406->83407 83440 403c60 83407->83440 83409 403bb7 83410 403c3e 83409->83410 83411 52db80 100 API calls 83409->83411 83410->83154 83412 403c2e 83411->83412 83413 568d80 7 API calls 83412->83413 83413->83410 83451 4d1660 83414->83451 83418 568df2 83417->83418 83477 4e2e48 83418->83477 83420 568e1e 83421 568db0 7 API calls 83420->83421 83422 568e2f 83421->83422 83423 568d80 7 API calls 83422->83423 83424 568e49 83423->83424 83424->83170 83426 4ef136 83425->83426 83431 535d44 83426->83431 83428 4ef14b 83439 52d308 KiUserCallbackDispatcher 83428->83439 83430 4ef16b 83430->83405 83432 535d4e 83431->83432 83433 530074 47 API calls 83432->83433 83434 535d64 83433->83434 83435 50a3c4 43 API calls 83434->83435 83436 535d70 83435->83436 83437 52c704 62 API calls 83436->83437 83438 535d81 83437->83438 83438->83428 83439->83430 83441 403c6f 83440->83441 83444 4ef4c8 83441->83444 83443 403c97 83443->83409 83445 4ef4ce 83444->83445 83446 535334 63 API calls 83445->83446 83447 4ef4e3 83446->83447 83450 52d308 KiUserCallbackDispatcher 83447->83450 83449 4ef507 83449->83443 83450->83449 83452 4d1684 83451->83452 83454 4d16af 83452->83454 83464 4d11b8 38 API calls 83452->83464 83455 4d1707 83454->83455 83462 4d16c4 83454->83462 83472 4e2c34 83455->83472 83457 4d16fd 83460 4e3180 7 API calls 83457->83460 83458 4af0c1 83458->83167 83459 4e2b44 7 API calls 83459->83462 83460->83458 83462->83457 83462->83459 83465 4e3180 83462->83465 83471 4d11b8 38 API calls 83462->83471 83464->83454 83466 4e318d 83465->83466 83469 4e31bd 83465->83469 83468 4e2c08 7 API calls 83466->83468 83470 4e3199 83466->83470 83467 4e2b44 7 API calls 83467->83470 83468->83469 83469->83467 83470->83462 83471->83462 83473 4e2c08 7 API calls 83472->83473 83474 4e2c44 83473->83474 83475 4e2b44 7 API calls 83474->83475 83476 4e2c5c 83475->83476 83476->83458 83478 4e2e4c 83477->83478 83479 4e2ead 83477->83479 83480 4e2b98 83478->83480 83481 4e2e54 83478->83481 83486 4e2c08 7 API calls 83480->83486 83487 4e2bac 83480->83487 83481->83479 83482 4e2e63 83481->83482 83484 4e2b98 7 API calls 83481->83484 83485 4e2c08 7 API calls 83482->83485 83483 4e2bda 83483->83420 83484->83482 83489 4e2e7d 83485->83489 83486->83487 83487->83483 83492 4e0e98 7 API calls 83487->83492 83490 4e2b98 7 API calls 83489->83490 83491 4e2ea9 83490->83491 83491->83420 83492->83483 83659 55db8f 83656->83659 83657 55e44c 83657->82934 83659->83657 83660 5607f8 WideCharToMultiByte 83659->83660 83660->83659 83662 447e58 83661->83662 83663 447e64 83662->83663 83664 447ea9 83662->83664 83666 52db80 100 API calls 83663->83666 83665 52db80 100 API calls 83664->83665 83667 447edc 83665->83667 83668 447e97 83666->83668 83670 568d80 7 API calls 83667->83670 83669 568d80 7 API calls 83668->83669 83671 447ea7 83669->83671 83670->83671 83672 52db50 100 API calls 83671->83672 83673 447f0a 83672->83673 83674 568db0 7 API calls 83673->83674 83675 447f19 83674->83675 83676 568d80 7 API calls 83675->83676 83677 447f29 83676->83677 83699 44806c 83677->83699 83679 447f4e 83680 44802d 83679->83680 83703 413378 102 API calls 83679->83703 83682 43c511 83680->83682 83704 522508 83680->83704 83684 444bd8 83682->83684 83685 444bec 83684->83685 83686 444c82 83685->83686 83687 4d05c8 38 API calls 83685->83687 83688 568d80 7 API calls 83686->83688 83689 444c3f 83687->83689 83690 43c518 83688->83690 83691 569364 7 API calls 83689->83691 83698 4480d0 100 API calls 83690->83698 83692 444c57 83691->83692 83720 568dc4 7 API calls 83692->83720 83694 444c62 83695 568d80 7 API calls 83694->83695 83696 444c72 83695->83696 83697 568d80 7 API calls 83696->83697 83697->83686 83698->82954 83700 448073 83699->83700 83701 448091 LoadIconA 83700->83701 83702 4480c5 83700->83702 83701->83702 83702->83679 83703->83680 83705 522515 83704->83705 83706 52250d 83704->83706 83705->83682 83708 52247c KillTimer 83706->83708 83709 5224a5 83708->83709 83717 5224e0 83708->83717 83712 5224b2 SetTimer 83709->83712 83709->83717 83710 4e2b44 7 API calls 83711 5224fa 83710->83711 83711->83705 83713 5224c4 83712->83713 83712->83717 83718 4e4e74 38 API calls 83713->83718 83715 5224d1 83719 4d4658 7 API calls 83715->83719 83717->83710 83718->83715 83719->83717 83720->83694 83722 52ed14 100 API calls 83721->83722 83723 52dad2 83722->83723 83723->82908 83724->82909 83728 568f08 83725->83728 83735 55d69c 83728->83735 83733 55d69c WideCharToMultiByte 83734 443a08 83733->83734 83734->82854 83736 55d6a7 83735->83736 83737 55db54 WideCharToMultiByte 83736->83737 83738 55d6c6 83737->83738 83739 568f8c 83738->83739 83740 4e3180 7 API calls 83739->83740 83741 568f2f 83740->83741 83741->83733 83743 52ed14 100 API calls 83742->83743 83744 52db3e 83743->83744 83745 52ed14 100 API calls 83744->83745 83746 52db4e 83745->83746 83746->82918 83747 46c480 83748 46c48f 83747->83748 83749 4c9040 38 API calls 83748->83749 83750 46c4ba 83749->83750 83765 522380 83750->83765 83752 46c4ec 83753 522508 40 API calls 83752->83753 83754 46c55f 83753->83754 83771 522528 83754->83771 83759 46c603 83760 46c5a1 RegisterClipboardFormatA 83761 46c5c2 83760->83761 83762 4ca180 6 API calls 83761->83762 83763 46c5ea 83762->83763 83778 510bdc 83763->83778 83766 522386 83765->83766 83767 4c9040 38 API calls 83766->83767 83768 52239b 83767->83768 83769 4ca180 6 API calls 83768->83769 83770 5223b1 83769->83770 83770->83752 83772 52247c 40 API calls 83771->83772 83773 46c583 83772->83773 83774 522518 83773->83774 83775 46c595 83774->83775 83776 52251d 83774->83776 83775->83759 83775->83760 83777 52247c 40 API calls 83776->83777 83777->83775 83781 510c18 83778->83781 83782 510be6 83781->83782 83783 510c28 83781->83783 83782->83759 83783->83782 83790 4c37c4 38 API calls 83783->83790 83785 510c47 83785->83782 83786 510c61 83785->83786 83787 510c54 83785->83787 83791 50bd78 41 API calls 83786->83791 83792 50b224 38 API calls 83787->83792 83790->83785 83791->83782 83792->83782 83793 476780 83794 47678d 83793->83794 83795 4767f7 83794->83795 83796 531ca0 100 API calls 83794->83796 83797 531c0c 100 API calls 83794->83797 83796->83795 83797->83795 83798 484f00 83799 484f1b 83798->83799 83800 484f86 83799->83800 83807 50af1c 83799->83807 83802 4e2b44 7 API calls 83800->83802 83803 484fa6 83802->83803 83804 484f39 83810 50af40 83804->83810 83814 50b014 83807->83814 83811 50af4a 83810->83811 83812 50b014 55 API calls 83811->83812 83813 484f5b DrawTextA 83812->83813 83813->83800 83820 50af2f GetClipBox 83814->83820 83821 50b02d 83814->83821 83815 50b051 83816 50b062 83815->83816 83825 50b0b0 14 API calls 83815->83825 83818 50b06e 83816->83818 83826 50b0dc 6 API calls 83816->83826 83818->83820 83827 50b10c 10 API calls 83818->83827 83820->83804 83821->83815 83824 4d4714 38 API calls 83821->83824 83824->83815 83825->83816 83826->83818 83827->83820 83828 47750c 83831 4f2fb0 83828->83831 83834 531300 83831->83834 83840 531333 83834->83840 83835 5313ac GetClassInfoA 83836 5313d3 83835->83836 83837 531411 83836->83837 83838 5313f1 RegisterClassA 83836->83838 83839 5313e4 UnregisterClassA 83836->83839 83845 531435 83837->83845 83882 4d5c08 40 API calls 83837->83882 83838->83837 83842 53140c 83838->83842 83839->83838 83840->83835 83849 531360 83840->83849 83879 4e4e74 38 API calls 83840->83879 83881 4d5c08 40 API calls 83842->83881 83843 531395 83880 4d4694 38 API calls 83843->83880 83848 4d1130 7 API calls 83845->83848 83850 53143d 83848->83850 83849->83835 83859 534500 IsIconic 83850->83859 83852 531449 83866 509a94 83852->83866 83854 531453 83855 52ed14 100 API calls 83854->83855 83856 531461 83855->83856 83857 4e2b44 7 API calls 83856->83857 83858 477511 83857->83858 83860 534518 GetWindowPlacement 83859->83860 83861 53453d GetWindowRect 83859->83861 83862 53454a GetWindowLongA 83860->83862 83861->83862 83863 534585 83862->83863 83864 53455f GetWindowLongA 83862->83864 83863->83852 83864->83863 83865 534573 ScreenToClient ScreenToClient 83864->83865 83865->83863 83867 509ac9 83866->83867 83868 509bfc 83866->83868 83883 508d90 RtlEnterCriticalSection 83867->83883 83888 4e2b68 7 API calls 83868->83888 83871 509ad3 83873 509bdd 83871->83873 83884 4d033c 83871->83884 83872 509c1c 83872->83854 83887 508d9c RtlLeaveCriticalSection 83873->83887 83875 509bf4 83875->83854 83877 509bce CreateFontIndirectA 83877->83873 83878 509b6a 83878->83877 83879->83843 83880->83849 83881->83837 83882->83845 83883->83871 83885 4d0349 83884->83885 83886 4d0361 CompareStringA 83885->83886 83886->83878 83887->83875 83888->83872 83889 43d04c 83890 43d069 83889->83890 83891 52db80 100 API calls 83890->83891 83892 43d09e 83891->83892 83893 568d80 7 API calls 83892->83893 83894 43d0ae 83893->83894 83895 52db80 100 API calls 83894->83895 83896 43d0e3 83895->83896 83897 568d80 7 API calls 83896->83897 83898 43d0f3 83897->83898 83899 52db80 100 API calls 83898->83899 83900 43d128 83899->83900 83901 568d80 7 API calls 83900->83901 83902 43d138 83901->83902 83903 52db80 100 API calls 83902->83903 83904 43d16d 83903->83904 83905 568d80 7 API calls 83904->83905 83906 43d17d 83905->83906 83907 52db80 100 API calls 83906->83907 83908 43d1b2 83907->83908 83909 568d80 7 API calls 83908->83909 83910 43d1c2 83909->83910 83911 52db80 100 API calls 83910->83911 83912 43d1f7 83911->83912 83913 568d80 7 API calls 83912->83913 83914 43d207 83913->83914 83915 52db50 100 API calls 83914->83915 83916 43d225 83915->83916 83917 568db0 7 API calls 83916->83917 83918 43d234 83917->83918 83919 568d80 7 API calls 83918->83919 83920 43d244 83919->83920 83921 52db50 100 API calls 83920->83921 83922 43d260 83921->83922 83923 568db0 7 API calls 83922->83923 83924 43d273 83923->83924 83925 568d80 7 API calls 83924->83925 83926 43d283 83925->83926 83927 52db50 100 API calls 83926->83927 83928 43d2a1 83927->83928 83929 568db0 7 API calls 83928->83929 83930 43d2b0 83929->83930 83931 568d80 7 API calls 83930->83931 83932 43d2c0 83931->83932 83933 52db50 100 API calls 83932->83933 83934 43d2dc 83933->83934 83935 568db0 7 API calls 83934->83935 83936 43d2ef 83935->83936 83937 568d80 7 API calls 83936->83937 83938 43d2ff 83937->83938 83939 52db50 100 API calls 83938->83939 83940 43d31d 83939->83940 83941 568db0 7 API calls 83940->83941 83942 43d32c 83941->83942 83943 568d80 7 API calls 83942->83943 83944 43d33c 83943->83944 83945 52db50 100 API calls 83944->83945 83946 43d358 83945->83946 83947 568db0 7 API calls 83946->83947 83948 43d36b 83947->83948 83949 568d80 7 API calls 83948->83949 83950 43d37b 83949->83950 83951 52db50 100 API calls 83950->83951 83952 43d399 83951->83952 83953 568db0 7 API calls 83952->83953 83954 43d3a8 83953->83954 83955 568d80 7 API calls 83954->83955 83956 43d3b8 83955->83956 83957 52db50 100 API calls 83956->83957 83958 43d3d4 83957->83958 83959 568db0 7 API calls 83958->83959 83960 43d3e7 83959->83960 83961 568d80 7 API calls 83960->83961 83962 43d3f7 83961->83962 83963 52db50 100 API calls 83962->83963 83964 43d415 83963->83964 83965 568db0 7 API calls 83964->83965 83966 43d424 83965->83966 83967 568d80 7 API calls 83966->83967 83968 43d434 83967->83968 83969 52db50 100 API calls 83968->83969 83970 43d450 83969->83970 83971 568db0 7 API calls 83970->83971 83972 43d463 83971->83972 83973 568d80 7 API calls 83972->83973 83974 43d473 83973->83974 83975 52db50 100 API calls 83974->83975 83976 43d491 83975->83976 83977 568db0 7 API calls 83976->83977 83978 43d4a0 83977->83978 83979 568d80 7 API calls 83978->83979 83980 43d4b0 83979->83980 83981 52db50 100 API calls 83980->83981 83982 43d4cc 83981->83982 83983 568db0 7 API calls 83982->83983 83984 43d4df 83983->83984 83985 568d80 7 API calls 83984->83985 83986 43d4ef 83985->83986 83987 43c3e8 103 API calls 83986->83987 83988 43d4f6 83987->83988 83993 4f1268 SendMessageA SendMessageA 83988->83993 83990 43d503 83994 4f1268 SendMessageA SendMessageA 83990->83994 83992 43d510 83993->83990 83994->83992 83995 4766c8 LoadBitmapA 83996 4766ea 83995->83996 83997 515800 83998 5158f2 83997->83998 83999 515817 83997->83999 83999->83998 84018 514db0 83999->84018 84002 515851 84004 51541c 44 API calls 84002->84004 84003 515877 84005 514db0 2 API calls 84003->84005 84006 515863 84004->84006 84007 515885 84005->84007 84008 51541c 44 API calls 84006->84008 84009 515889 84007->84009 84010 5158af 84007->84010 84012 515875 84008->84012 84013 51541c 44 API calls 84009->84013 84021 51541c 84010->84021 84014 51589b 84013->84014 84016 51541c 44 API calls 84014->84016 84016->84012 84017 51541c 44 API calls 84017->84012 84033 514d30 84018->84033 84020 514dbe 84020->84002 84020->84003 84022 515442 84021->84022 84023 51545b 84022->84023 84024 514d30 2 API calls 84022->84024 84025 514d30 2 API calls 84023->84025 84024->84023 84026 5154a9 84025->84026 84043 515314 84026->84043 84028 5154c3 84047 515198 41 API calls 84028->84047 84030 5154f4 84031 514d30 2 API calls 84030->84031 84032 5154ff 84031->84032 84032->84017 84034 5341f0 84033->84034 84035 514d4d GetWindowLongA 84034->84035 84036 514d8a 84035->84036 84037 514d6a 84035->84037 84042 514cb4 GetWindowLongA 84036->84042 84041 514cb4 GetWindowLongA 84037->84041 84040 514d76 84040->84020 84041->84040 84042->84040 84045 515351 84043->84045 84048 509578 84045->84048 84046 5153f6 84046->84028 84047->84030 84049 509587 84048->84049 84050 50957c GetSysColor 84048->84050 84049->84046 84050->84049 84051 447d90 84052 447da4 84051->84052 84053 568d80 7 API calls 84052->84053 84054 447df1 84053->84054 84055 52db80 100 API calls 84054->84055 84056 447e24 84055->84056 84057 568d80 7 API calls 84056->84057 84058 447e34 84057->84058 84059 46b150 84060 46b160 84059->84060 84061 568db0 7 API calls 84060->84061 84062 46b212 84061->84062 84063 568d80 7 API calls 84062->84063 84064 46b222 84063->84064 84065 47b910 84066 47b96c 84065->84066 84070 47b923 84065->84070 84067 47b975 GetCursorPos 84066->84067 84066->84070 84067->84070 84068 52ede0 100 API calls 84069 47b9fa 84068->84069 84070->84068 84071 47a990 84072 47a9ac 84071->84072 84137 568b64 84072->84137 84074 47a9be 84075 47a9d9 84074->84075 84078 47a9fc 84074->84078 84076 568d80 7 API calls 84075->84076 84077 47a9ec 84076->84077 84141 4cb2cc 84078->84141 84080 47aa0c 84081 47aa2c 84080->84081 84082 47abc4 84080->84082 84085 568dd8 7 API calls 84081->84085 84084 47abbf 84082->84084 84086 568dd8 7 API calls 84082->84086 84083 568d80 7 API calls 84083->84077 84084->84083 84087 47aa57 84085->84087 84088 47abfb 84086->84088 84145 4cb4f4 84087->84145 84181 4cb3d0 84088->84181 84093 568d80 7 API calls 84094 47aa75 84093->84094 84096 568d80 7 API calls 84094->84096 84095 568d80 7 API calls 84097 47ac1b 84095->84097 84100 47aa85 84096->84100 84098 568d80 7 API calls 84097->84098 84101 47ac2b 84098->84101 84099 47aa9a 84102 4d05c8 38 API calls 84099->84102 84109 47ab38 84099->84109 84100->84084 84100->84099 84172 4cb934 RegQueryValueExA 84100->84172 84101->84084 84107 4d05c8 38 API calls 84101->84107 84104 47aab9 84102->84104 84110 569364 7 API calls 84104->84110 84105 47ab60 84106 568d80 7 API calls 84105->84106 84114 47ab71 84106->84114 84108 47ac67 84107->84108 84113 569364 7 API calls 84108->84113 84174 4cb33c 84109->84174 84112 47aad5 84110->84112 84115 568d80 7 API calls 84112->84115 84116 47ac83 84113->84116 84114->84109 84173 4cb7b0 39 API calls 84114->84173 84118 47aae5 84115->84118 84197 4cb7e0 39 API calls 84116->84197 84170 4cb934 RegQueryValueExA 84118->84170 84120 47ab96 84124 568d80 7 API calls 84120->84124 84122 47aaf6 84125 47ab0a 84122->84125 84171 4cb7f4 40 API calls 84122->84171 84123 47ac93 84126 568d80 7 API calls 84123->84126 84124->84099 84129 568d80 7 API calls 84125->84129 84128 47aca3 84126->84128 84130 568d80 7 API calls 84128->84130 84129->84109 84131 47acb3 84130->84131 84198 4cb79c 39 API calls 84131->84198 84133 47acda 84134 568d80 7 API calls 84133->84134 84135 47acea 84134->84135 84136 4cb33c 9 API calls 84135->84136 84136->84084 84138 568b78 84137->84138 84139 4e2b98 7 API calls 84138->84139 84140 568b8c 84139->84140 84140->84074 84142 4cb2d2 84141->84142 84199 4cb36c 84142->84199 84144 4cb2ea 84144->84080 84205 4e2bdc 84145->84205 84147 4cb51d 84149 4cb53d 84147->84149 84209 4e3094 7 API calls 84147->84209 84150 4cb55f RegOpenKeyExA 84149->84150 84151 4cb571 84150->84151 84156 4cb5ad 84150->84156 84152 4cb59b 84151->84152 84210 4e2ebc 7 API calls 84151->84210 84211 4cb398 9 API calls 84152->84211 84155 4cb5a8 84159 4e2b44 7 API calls 84155->84159 84157 4cb5ca RegOpenKeyExA 84156->84157 84158 4cb5dc 84157->84158 84164 4cb615 84157->84164 84160 4cb606 84158->84160 84212 4e2ebc 7 API calls 84158->84212 84161 47aa64 84159->84161 84213 4cb398 9 API calls 84160->84213 84161->84093 84165 4cb62f RegOpenKeyExA 84164->84165 84165->84155 84166 4cb641 84165->84166 84167 4cb66b 84166->84167 84214 4e2ebc 7 API calls 84166->84214 84215 4cb398 9 API calls 84167->84215 84170->84122 84171->84125 84172->84105 84173->84120 84175 4cb346 84174->84175 84176 4cb367 84174->84176 84177 4cb34c RegCloseKey 84175->84177 84178 4cb354 RegFlushKey 84175->84178 84176->84084 84179 4cb35a 84177->84179 84178->84179 84180 4e2b44 7 API calls 84179->84180 84180->84176 84182 4e2bdc 7 API calls 84181->84182 84184 4cb3fc 84182->84184 84183 4cb41c 84186 4cb457 84183->84186 84187 4cb42d 84183->84187 84184->84183 84217 4e3094 7 API calls 84184->84217 84190 4cb47d RegCreateKeyExA 84186->84190 84188 4cb449 RegOpenKeyExA 84187->84188 84189 4cb489 84188->84189 84191 4cb4bf 84189->84191 84192 4cb4b2 84189->84192 84218 4e2ebc 7 API calls 84189->84218 84190->84189 84193 4e2b44 7 API calls 84191->84193 84219 4cb398 9 API calls 84192->84219 84196 47ac0a 84193->84196 84196->84095 84197->84123 84198->84133 84200 4cb379 84199->84200 84201 4cb393 84199->84201 84202 4cb37f RegCloseKey 84200->84202 84203 4cb389 84200->84203 84201->84144 84202->84203 84204 4cb33c 9 API calls 84203->84204 84204->84201 84207 4e2be0 84205->84207 84206 4e2c04 84206->84147 84207->84206 84216 4e0e98 7 API calls 84207->84216 84209->84149 84211->84155 84213->84155 84215->84155 84216->84206 84217->84183 84219->84191 84220 474a90 84223 474a0c 84220->84223 84224 558b14 66 API calls 84223->84224 84225 474a20 84224->84225 84226 474a78 PostMessageA 84225->84226 84229 474a3e timeSetEvent 84225->84229 84227 474a89 84226->84227 84229->84227 84230 484c10 84231 52db50 100 API calls 84230->84231 84232 484c39 84231->84232 84233 484d12 84232->84233 84234 484c43 84232->84234 84240 484c9b 84233->84240 84243 52d308 KiUserCallbackDispatcher 84233->84243 84235 52db50 100 API calls 84234->84235 84237 484c55 84235->84237 84237->84240 84242 52d308 KiUserCallbackDispatcher 84237->84242 84238 484d58 84244 4e2b68 7 API calls 84240->84244 84242->84240 84243->84240 84244->84238 84245 401998 84246 4019ae 84245->84246 84247 4019c0 84246->84247 84270 4434dc 70 API calls 84246->84270 84252 4019c4 84247->84252 84253 51d8fc 84247->84253 84254 51d90f 84253->84254 84271 447ba4 84254->84271 84270->84247 84272 447bb3 84271->84272 84277 4081c0 84272->84277 84274 447bdb 84281 43e9b4 84274->84281 84278 4081cf 84277->84278 84469 516178 84278->84469 84280 4081f7 84280->84274 84282 43e9d1 84281->84282 84626 46a484 84282->84626 84286 43e9e9 84633 561648 84286->84633 84288 43e9f0 84289 568db0 7 API calls 84288->84289 84290 43ea14 84289->84290 84291 568d80 7 API calls 84290->84291 84292 43ea24 84291->84292 84293 568db0 7 API calls 84292->84293 84294 43ea47 84293->84294 84295 568d80 7 API calls 84294->84295 84296 43ea57 84295->84296 84640 403910 84296->84640 84470 51618e 84469->84470 84471 4d6070 12 API calls 84470->84471 84472 5161b8 84471->84472 84473 5162a2 84472->84473 84475 5161f8 84472->84475 84474 4d6178 13 API calls 84473->84474 84476 5162bb 84474->84476 84483 4c0b14 84475->84483 84476->84280 84478 51621e 84482 516267 84478->84482 84492 4e4e74 38 API calls 84478->84492 84480 516255 84493 4d4694 38 API calls 84480->84493 84482->84280 84484 4d6070 12 API calls 84483->84484 84485 4c0b2a 84484->84485 84494 4c0a6c 84485->84494 84487 4c0b8a 84490 4c0ba2 84487->84490 84507 4c0a10 38 API calls 84487->84507 84490->84478 84492->84480 84493->84482 84495 4c0aea 84494->84495 84498 4c0a96 84494->84498 84496 4e2b44 7 API calls 84495->84496 84497 4c0b01 84496->84497 84497->84487 84506 4c09e0 38 API calls 84497->84506 84498->84495 84499 4c0a6c 52 API calls 84498->84499 84500 4c0aae 84499->84500 84508 4e42d4 84500->84508 84504 4c0adc 84516 4c0904 84504->84516 84506->84487 84507->84490 84524 4e42ac VirtualQuery 84508->84524 84511 4e4324 84512 4e434b 84511->84512 84513 4e432e 84511->84513 84512->84504 84513->84512 84526 4e42dc 84513->84526 84517 4c0915 84516->84517 84518 4c0924 FindResourceA 84517->84518 84519 4c0934 84518->84519 84523 4c0960 84518->84523 84549 4c3ec8 84519->84549 84521 4c0945 84553 4c3928 84521->84553 84523->84495 84525 4c0ad7 84524->84525 84525->84511 84527 4e42ec GetModuleFileNameA 84526->84527 84528 4e4308 84526->84528 84530 4e4518 GetModuleFileNameA RegOpenKeyExA 84527->84530 84528->84504 84531 4e459b 84530->84531 84532 4e455b RegOpenKeyExA 84530->84532 84548 4e4360 12 API calls 84531->84548 84532->84531 84533 4e4579 RegOpenKeyExA 84532->84533 84533->84531 84535 4e4624 lstrcpyn GetThreadLocale GetLocaleInfoA 84533->84535 84539 4e473e 84535->84539 84540 4e465b 84535->84540 84536 4e45c0 RegQueryValueExA 84537 4e4602 RegCloseKey 84536->84537 84538 4e45e0 RegQueryValueExA 84536->84538 84537->84528 84538->84537 84541 4e45fe 84538->84541 84539->84528 84540->84539 84542 4e466b lstrlen 84540->84542 84541->84537 84543 4e4683 84542->84543 84543->84539 84544 4e46a8 lstrcpyn LoadLibraryExA 84543->84544 84545 4e46d0 84543->84545 84544->84545 84545->84539 84546 4e46da lstrcpyn LoadLibraryExA 84545->84546 84546->84539 84547 4e470c lstrcpyn LoadLibraryExA 84546->84547 84547->84539 84548->84536 84550 4c3ed2 84549->84550 84558 4c3f90 FindResourceA 84550->84558 84552 4c3f00 84552->84521 84570 4c404c 84553->84570 84555 4c3944 84574 4c5eb4 84555->84574 84557 4c395f 84557->84523 84559 4c3fbc LoadResource 84558->84559 84560 4c3fb5 84558->84560 84561 4c3fcf 84559->84561 84562 4c3fd6 SizeofResource LockResource 84559->84562 84568 4c3f20 38 API calls 84560->84568 84569 4c3f20 38 API calls 84561->84569 84565 4c3ff4 84562->84565 84565->84552 84566 4c3fbb 84566->84559 84567 4c3fd5 84567->84562 84568->84566 84569->84567 84571 4c4056 84570->84571 84572 4e0e78 7 API calls 84571->84572 84573 4c406f 84572->84573 84573->84555 84601 4c629c 84574->84601 84577 4d6070 12 API calls 84578 4c5efc 84577->84578 84579 4c5f2c 84578->84579 84580 4c5f61 84578->84580 84619 4c62c0 38 API calls 84579->84619 84622 4c62c0 38 API calls 84580->84622 84583 4c5f72 84585 4c5f88 84583->84585 84586 4c5f7b 84583->84586 84584 4c5f37 84620 4c03bc 40 API calls 84584->84620 84624 4c62c0 38 API calls 84585->84624 84623 4c62c0 38 API calls 84586->84623 84590 4c5f3f 84621 4c62c0 38 API calls 84590->84621 84591 4c5fa3 84625 4c5e54 38 API calls 84591->84625 84594 4c5f54 84606 4c010c 84594->84606 84596 4c5fda 84617 52d9dc 84596->84617 84597 4c60cc 84597->84557 84598 4c608c 84598->84597 84599 4c0f34 38 API calls 84598->84599 84599->84598 84602 4c4c14 38 API calls 84601->84602 84603 4c62a9 84602->84603 84604 4c5eed 84603->84604 84605 4c46ec 38 API calls 84603->84605 84604->84577 84605->84604 84607 4c0119 84606->84607 84608 4c0018 RtlEnterCriticalSection 84607->84608 84615 4c0150 84608->84615 84609 4c01f3 84611 4c00d0 RtlLeaveCriticalSection 84609->84611 84610 4c0f34 38 API calls 84610->84615 84612 4c020a 84611->84612 84612->84596 84613 4bfb54 38 API calls 84613->84615 84614 4c0f34 38 API calls 84616 4c01b2 84614->84616 84615->84610 84615->84613 84615->84616 84616->84609 84616->84614 84618 52d9f6 KiUserCallbackDispatcher 84617->84618 84618->84598 84619->84584 84620->84590 84621->84594 84622->84583 84623->84594 84624->84591 84625->84594 85100 4d2760 GetLocalTime 84626->85100 84630 43e9d6 84631 565180 GetLocalTime 84630->84631 84632 5651bf 84631->84632 84632->84286 85120 564770 84633->85120 84635 561650 84636 564770 2 API calls 84635->84636 84637 56165b 84636->84637 85124 561674 84637->85124 85132 559e70 84640->85132 84642 403927 GetTempPathA 84643 403954 84642->84643 84644 568db0 7 API calls 84643->84644 84645 403963 84644->84645 84646 568d80 7 API calls 84645->84646 84647 403973 84646->84647 85133 568fd0 84647->85133 84650 568dd8 7 API calls 84651 4039b1 84650->84651 84652 568dd8 7 API calls 84651->84652 84653 4039d9 84652->84653 84654 568db0 7 API calls 84653->84654 84655 4039e6 84654->84655 84656 568d80 7 API calls 84655->84656 84657 4039f6 84656->84657 84658 568d80 7 API calls 84657->84658 84659 403a06 84658->84659 84660 568d80 7 API calls 84659->84660 84661 403a16 84660->84661 84662 568d80 7 API calls 84661->84662 84663 403a26 84662->84663 84664 568d80 7 API calls 84663->84664 84665 403a36 84664->84665 85145 51df54 84665->85145 84669 403a68 84670 568fd0 8 API calls 84669->84670 84671 403a8c 84670->84671 84672 568dd8 7 API calls 84671->84672 84673 403aa0 84672->84673 84674 568dd8 7 API calls 84673->84674 84675 403ac8 84674->84675 84676 568db0 7 API calls 84675->84676 84677 403ad5 84676->84677 84678 568d80 7 API calls 84677->84678 84679 403ae5 84678->84679 84680 568d80 7 API calls 84679->84680 84681 403af5 84680->84681 84682 568d80 7 API calls 84681->84682 84683 403b05 84682->84683 84684 568d80 7 API calls 84683->84684 84685 403b15 84684->84685 84686 568d80 7 API calls 84685->84686 84687 403b25 84686->84687 84688 568d80 7 API calls 84687->84688 84689 403b35 84688->84689 84690 568d80 7 API calls 84689->84690 84691 403b45 84690->84691 85152 401d40 84691->85152 84694 568db0 7 API calls 84695 403b68 84694->84695 84696 568d80 7 API calls 84695->84696 84697 403b78 84696->84697 84698 447060 84697->84698 84699 447073 84698->84699 84700 4cb2cc 10 API calls 84699->84700 84701 447091 84700->84701 84702 4cb3d0 11 API calls 84701->84702 84703 4470c3 84702->84703 84704 568d80 7 API calls 84703->84704 84705 4470d4 84704->84705 84709 447188 84705->84709 85267 4cb934 RegQueryValueExA 84705->85267 84707 447103 84708 568d80 7 API calls 84707->84708 84715 447114 84708->84715 84710 568dd8 7 API calls 84709->84710 84712 4471e0 84710->84712 84711 447180 84713 4cb33c 9 API calls 84711->84713 84714 4cb3d0 11 API calls 84712->84714 84713->84709 84716 4471ef 84714->84716 84715->84711 85268 4cb724 84715->85268 84718 568d80 7 API calls 84716->84718 84719 447200 84718->84719 84720 568d80 7 API calls 84719->84720 85109 4d24c0 85100->85109 85105 46a498 85106 46a4a4 85105->85106 85107 46a4a9 85105->85107 85119 4660f8 GetTimeZoneInformation 85106->85119 85107->84630 85110 4d24d8 85109->85110 85111 4d24e6 85110->85111 85117 4d009c 38 API calls 85110->85117 85113 4d2320 85111->85113 85114 4d2343 85113->85114 85115 46a48c 85114->85115 85118 4d009c 38 API calls 85114->85118 85115->85105 85117->85111 85118->85115 85119->85107 85121 564776 85120->85121 85123 564785 85121->85123 85131 564798 RtlEnterCriticalSection RtlLeaveCriticalSection 85121->85131 85123->84635 85125 564770 2 API calls 85124->85125 85126 56167a 85125->85126 85127 564770 2 API calls 85126->85127 85128 561687 85127->85128 85129 564770 2 API calls 85128->85129 85130 561665 85129->85130 85130->84288 85131->85123 85132->84642 85134 568fe6 85133->85134 85135 568b64 7 API calls 85134->85135 85136 568ff6 85135->85136 85191 4d02d0 85136->85191 85139 568db0 7 API calls 85140 569016 85139->85140 85141 568d80 7 API calls 85140->85141 85142 569030 85141->85142 85143 568d80 7 API calls 85142->85143 85144 403999 85143->85144 85144->84650 85197 4e1268 85145->85197 85148 4d0d58 85149 4d0d6b 85148->85149 85223 4e3054 85149->85223 85230 559e70 85152->85230 85154 401d5a SHGetSpecialFolderPathA 85155 401d70 85154->85155 85156 401db3 SHGetSpecialFolderPathA 85154->85156 85251 4d09f4 85155->85251 85157 401dc9 85156->85157 85158 401e0c SHGetSpecialFolderPathA 85156->85158 85165 4d09f4 GetFileAttributesA 85157->85165 85159 401e61 85158->85159 85160 401e22 85158->85160 85162 4e1268 18 API calls 85159->85162 85166 4d09f4 GetFileAttributesA 85160->85166 85164 401e79 85162->85164 85168 4d0d58 7 API calls 85164->85168 85169 401de7 85165->85169 85170 401e40 85166->85170 85167 568d80 7 API calls 85171 401daa 85167->85171 85172 401e8e 85168->85172 85173 568d80 7 API calls 85169->85173 85174 568d80 7 API calls 85170->85174 85171->85156 85179 401e5c 85171->85179 85175 568db0 7 API calls 85172->85175 85176 401e03 85173->85176 85174->85179 85177 401e99 85175->85177 85176->85158 85176->85179 85178 568d80 7 API calls 85177->85178 85180 401eb3 85178->85180 85179->85159 85231 4d0a18 85179->85231 85181 568d80 7 API calls 85180->85181 85182 401ec3 85181->85182 85182->84694 85185 568d80 7 API calls 85186 401f1e 85185->85186 85186->85159 85187 401f27 85186->85187 85188 568db0 7 API calls 85187->85188 85189 401f48 85188->85189 85190 568d80 7 API calls 85189->85190 85190->85182 85192 4d02de 85191->85192 85193 4e2c34 7 API calls 85192->85193 85194 4d02f2 85193->85194 85195 4d02ff 85194->85195 85196 4d02f6 CharLowerBuffA 85194->85196 85195->85139 85196->85195 85198 4e2b44 7 API calls 85197->85198 85199 4e127c 85198->85199 85200 4e129e GetCommandLineA 85199->85200 85201 4e1280 GetModuleFileNameA 85199->85201 85206 4e12a5 85200->85206 85202 4e2c34 7 API calls 85201->85202 85203 4e129c 85202->85203 85205 403a53 85203->85205 85205->85148 85206->85205 85207 4e111c 85206->85207 85208 4e112e 85207->85208 85209 4e1126 CharNextA 85208->85209 85214 4e1148 85208->85214 85209->85208 85210 4e1197 85213 4e3180 7 API calls 85210->85213 85211 4e1152 CharNextA 85211->85214 85212 4e1183 CharNextA 85212->85214 85222 4e11a0 85213->85222 85214->85210 85214->85211 85214->85212 85215 4e115c CharNextA 85214->85215 85216 4e1179 CharNextA 85214->85216 85215->85214 85216->85214 85217 4e11ff 85217->85206 85218 4e11ac CharNextA 85218->85222 85219 4e11e4 CharNextA 85219->85222 85220 4e11b6 CharNextA 85220->85222 85221 4e11da CharNextA 85221->85222 85222->85217 85222->85218 85222->85219 85222->85220 85222->85221 85222->85222 85224 4e3059 85223->85224 85225 4e3086 85223->85225 85224->85225 85228 4e306d 85224->85228 85226 4e2b44 7 API calls 85225->85226 85227 4d0d7c 85226->85227 85227->84669 85229 4e2c34 7 API calls 85228->85229 85229->85227 85230->85154 85232 4d0a2d 85231->85232 85233 4d0a5b 85232->85233 85263 4d4714 38 API calls 85232->85263 85255 4d526c 85233->85255 85237 4e2bdc 7 API calls 85239 4d0a76 85237->85239 85238 4d0ac6 85264 4e2b68 7 API calls 85238->85264 85239->85238 85240 4d09f4 GetFileAttributesA 85239->85240 85242 4d0a8b 85240->85242 85242->85238 85244 4d0d58 7 API calls 85242->85244 85243 401f0d 85243->85185 85245 4d0a9a 85244->85245 85245->85238 85246 4d0d58 7 API calls 85245->85246 85247 4d0ab2 85246->85247 85248 4d0a18 40 API calls 85247->85248 85249 4d0aba 85248->85249 85249->85238 85260 4d0ebc 85249->85260 85252 4e2ff4 85251->85252 85253 4d09fe GetFileAttributesA 85252->85253 85254 401d8e 85253->85254 85254->85167 85256 4e2b98 7 API calls 85255->85256 85257 4d527b 85256->85257 85258 4d0a6b 85257->85258 85259 4e3180 7 API calls 85257->85259 85258->85237 85259->85258 85265 4e2ff4 85260->85265 85263->85233 85264->85243 85266 4d0ec8 CreateDirectoryA 85265->85266 85266->85238 85267->84707 85334 4cb6fc 85268->85334 85344 4cb6ac 85334->85344 85345 4cb6c5 85344->85345 85346 4cb6d9 RegQueryValueExA 85345->85346 86876 46cf1c 86877 46cf44 86876->86877 86878 46cf25 86876->86878 86879 510bdc 41 API calls 86878->86879 86880 46cf30 86879->86880 86880->86877 86881 46cf39 Shell_NotifyIcon 86880->86881 86881->86877 86882 4784dc 86883 4784e9 86882->86883 86884 4c9040 38 API calls 86883->86884 86885 478511 86884->86885 86886 47863f CreateEventA CreateEventA CreateEventA CreateEventA 86885->86886 86896 559954 86886->86896 86889 559954 86890 47877b CreateEventA CreateMutexA CreateMutexA 86889->86890 86891 4787c8 86890->86891 86892 4ca180 6 API calls 86891->86892 86893 478806 86892->86893 86894 558cb8 66 API calls 86893->86894 86895 478822 86894->86895 86897 478750 CreateEventA 86896->86897 86897->86889 86898 531a48 86904 531ca0 100 API calls 86898->86904 86899 531a77 86905 52c550 70 API calls 86899->86905 86901 531a89 86906 50e070 72 API calls 86901->86906 86903 531a8e 86904->86899 86905->86901 86906->86903 86907 46b3d8 86908 46b3ed 86907->86908 86909 46b435 86907->86909 86908->86909 86910 558cb8 66 API calls 86908->86910 86910->86909 86911 46bf98 86912 46bfa4 86911->86912 86913 4c9040 38 API calls 86912->86913 86914 46bfcf 86913->86914 86915 46bff7 86914->86915 86916 46bfe0 WSAStartup 86914->86916 86917 4ca180 6 API calls 86915->86917 86918 46c01a 86915->86918 86916->86915 86917->86918 86919 484d68 86921 484d7e 86919->86921 86920 52ede0 100 API calls 86922 484e8e 86920->86922 86921->86920 86923 51d4f0 86924 51d512 86923->86924 86925 51d54f 86923->86925 86934 51d4a4 86924->86934 86926 4e2b98 7 API calls 86925->86926 86933 51d54d 86926->86933 86928 51d51c 86931 51d538 SetWindowTextA 86928->86931 86928->86933 86929 4e2b44 7 API calls 86930 51d571 86929->86930 86932 4e2b44 7 API calls 86931->86932 86932->86933 86933->86929 86935 51d4d9 86934->86935 86936 51d4b9 GetWindowTextA 86934->86936 86938 4e2b98 7 API calls 86935->86938 86937 4e2c34 7 API calls 86936->86937 86939 51d4d7 86937->86939 86938->86939 86939->86928 86940 46c0e4 86941 46c104 86940->86941 86943 46c0fd 86940->86943 86942 558cb8 66 API calls 86941->86942 86942->86943 86950 469fa0 86943->86950 86946 46c177 86947 46c135 CreateFileA 86948 46c157 WriteFile CloseHandle 86947->86948 86949 46c170 86947->86949 86948->86946 86949->86946 86953 464d20 GetTickCount 86950->86953 86957 464d3e 86953->86957 86955 464d87 htons 86955->86957 86956 464dbd socket 86956->86957 86974 464dad 86956->86974 86957->86955 86957->86956 86967 464f52 send 86957->86967 86969 55d764 WideCharToMultiByte 86957->86969 86970 4650e5 closesocket 86957->86970 86971 465151 select 86957->86971 86972 4652bb closesocket 86957->86972 86957->86974 86978 464ff2 86957->86978 86980 4652a2 GetTickCount 86957->86980 86983 465272 closesocket 86957->86983 86984 46521e closesocket 86957->86984 86986 469db0 86957->86986 86996 4648c0 86957->86996 87000 464bdc GetLocalTime 86957->87000 87002 464a78 RtlEnterCriticalSection RtlLeaveCriticalSection GetLocalTime 86957->87002 86960 4648c0 ioctlsocket 86963 464ed5 GetTickCount 86960->86963 86961 464dfb 86961->86960 86962 464e5a select 86961->86962 86964 464ea8 86961->86964 86962->86961 86962->86964 86963->86957 86963->86974 86999 468eb8 87 API calls 86964->86999 86966 464eb6 closesocket 86966->86974 86967->86957 86969->86957 86970->86974 86971->86957 86971->86972 86972->86974 86973 4650cc send 86973->86957 86974->86946 86974->86947 86976 465084 send 86976->86957 86977 46509d send 86976->86977 86977->86957 86979 4650b6 send 86977->86979 86978->86957 86978->86973 86978->86976 86981 55d764 WideCharToMultiByte 86978->86981 87001 464bdc GetLocalTime 86978->87001 86979->86957 86980->86972 86980->86978 86982 465068 send 86981->86982 86982->86957 86983->86957 86984->86974 86987 469dc2 86986->86987 86988 469e08 gethostname 86986->86988 86987->86988 86989 469dc7 inet_addr 86987->86989 86990 469e17 gethostbyname 86988->86990 86991 469dde 86988->86991 86989->86991 86992 469dd4 gethostbyname 86989->86992 86990->86991 86993 469e24 86990->86993 86991->86957 86992->86991 86994 469de7 WSAGetLastError 86992->86994 86993->86991 86994->86991 86995 469df3 MessageBoxA 86994->86995 86995->86991 86997 4648e0 connect 86996->86997 86998 4648cb ioctlsocket 86996->86998 86997->86961 86998->86997 86999->86966 87000->86957 87001->86978 87002->86957 87003 46c220 87004 46c2e1 87003->87004 87005 46c23b 87003->87005 87005->87004 87006 558cb8 66 API calls 87005->87006 87007 46c276 87006->87007 87008 46c2c1 CreateThread 87007->87008 87008->87004 87009 46c190 SendMessageA 87008->87009 87010 46c1b4 87009->87010 87011 46c1fa SendMessageA 87010->87011 87012 46c1e9 SendMessageA 87010->87012 87013 46c215 87011->87013 87012->87011 87020 51e3f8 87026 51e43c 87020->87026 87023 51e435 87024 51e42e 87029 51e5f0 8 API calls 87024->87029 87027 51e44b KillTimer 87026->87027 87028 51e408 SetTimer 87026->87028 87027->87028 87028->87023 87028->87024 87029->87023 87030 46c2ec 87031 46c2fd 87030->87031 87032 46c2ff 87030->87032 87031->87032 87034 46b70c 87031->87034 87035 46b727 87034->87035 87036 46b9ea 87035->87036 87052 46b94b 87035->87052 87053 46b745 87035->87053 87037 46ba40 87036->87037 87038 46ba0d 87036->87038 87036->87052 87040 46ba45 87037->87040 87041 46ba78 87037->87041 87042 568db0 7 API calls 87038->87042 87039 46b971 87039->87032 87043 568db0 7 API calls 87040->87043 87044 568db0 7 API calls 87041->87044 87045 46ba2e 87042->87045 87046 46ba66 87043->87046 87047 46ba99 87044->87047 87048 568d80 7 API calls 87045->87048 87049 568d80 7 API calls 87046->87049 87050 568d80 7 API calls 87047->87050 87054 46ba3e 87048->87054 87049->87054 87050->87054 87051 568d80 7 API calls 87051->87052 87052->87039 87069 4a4fc8 87052->87069 87061 46b845 87053->87061 87073 568ba0 7 API calls 87053->87073 87057 568d80 7 API calls 87054->87057 87055 46b90f 87055->87051 87057->87052 87058 46b7f0 87059 568db0 7 API calls 87058->87059 87060 46b7fd 87059->87060 87062 568d80 7 API calls 87060->87062 87061->87052 87061->87055 87063 568d80 7 API calls 87061->87063 87064 46b80d 87062->87064 87063->87055 87065 568db0 7 API calls 87064->87065 87066 46b835 87065->87066 87067 568d80 7 API calls 87066->87067 87067->87061 87070 4a4fea 87069->87070 87071 4a4fda 87069->87071 87070->87039 87074 4a50fc 87071->87074 87073->87058 87075 4a5117 87074->87075 87076 4ccd74 11 API calls 87075->87076 87077 4a5125 87076->87077 87078 568d80 7 API calls 87077->87078 87086 4a52e2 87077->87086 87079 4a5190 87078->87079 87080 568d80 7 API calls 87079->87080 87081 4a51a0 87080->87081 87082 568d80 7 API calls 87081->87082 87084 4a51b0 87082->87084 87083 4a52a4 87085 568d80 7 API calls 87083->87085 87084->87083 87094 4a5044 87084->87094 87085->87086 87086->87070 87088 4a523b 87089 568d80 7 API calls 87088->87089 87090 4a5284 87089->87090 87091 568d80 7 API calls 87090->87091 87092 4a5294 87091->87092 87093 568d80 7 API calls 87092->87093 87093->87083 87095 4a505a 87094->87095 87096 568f8c 7 API calls 87095->87096 87097 4a507b 87096->87097 87098 568db0 7 API calls 87097->87098 87099 4a50c8 87098->87099 87100 568d80 7 API calls 87099->87100 87101 4a50e2 87100->87101 87101->87088 87102 47306c 87103 473077 87102->87103 87104 4730a6 timeKillEvent 87102->87104 87105 473080 87103->87105 87106 47308f 87103->87106 87112 4749dc SendMessageA 87105->87112 87111 4749f0 SendMessageA 87106->87111 87109 47308d 87110 47309f 87109->87110 87110->87104 87111->87110 87112->87109 87113 40712c 87114 407144 87113->87114 87115 407153 87114->87115 87116 40745a 87114->87116 87219 4075a4 39 API calls 87115->87219 87118 40742a 87116->87118 87119 52db50 100 API calls 87116->87119 87120 40747d 87119->87120 87200 5690e0 7 API calls 87120->87200 87121 407162 87124 568db0 7 API calls 87121->87124 87123 407490 87125 568d80 7 API calls 87123->87125 87126 407194 87124->87126 87127 4074a0 87125->87127 87128 568d80 7 API calls 87126->87128 87201 569618 87127->87201 87130 4071a4 87128->87130 87132 568db0 7 API calls 87130->87132 87131 4074b3 87205 4a99ec 87131->87205 87134 4071d4 87132->87134 87136 568d80 7 API calls 87134->87136 87135 4074ea 87229 569688 SysFreeString 87135->87229 87138 4071e4 87136->87138 87138->87118 87141 4071f3 87138->87141 87139 4074fb 87140 568d80 7 API calls 87139->87140 87146 40750b 87140->87146 87220 52626c 9 API calls 87141->87220 87142 40757d 87144 568d80 7 API calls 87142->87144 87144->87118 87145 40720b 87221 4d0dc4 7 API calls 87145->87221 87146->87142 87230 568aa8 66 API calls 87146->87230 87149 40752a 87231 568f78 7 API calls 87149->87231 87150 40722a 87152 568fd0 8 API calls 87150->87152 87153 40723d 87152->87153 87154 568d80 7 API calls 87153->87154 87161 40724d 87154->87161 87155 407572 87156 52db80 100 API calls 87155->87156 87156->87142 87157 40729e 87159 4d09e4 4 API calls 87157->87159 87158 407535 87158->87155 87232 568dc4 7 API calls 87158->87232 87167 4072d9 87159->87167 87161->87157 87163 4072a0 87161->87163 87164 40726d 87161->87164 87162 407562 87165 568d80 7 API calls 87162->87165 87223 568dc4 7 API calls 87163->87223 87222 568dc4 7 API calls 87164->87222 87165->87155 87166 52db80 100 API calls 87168 407404 87166->87168 87170 407325 87167->87170 87171 407308 87167->87171 87198 4073d4 87167->87198 87172 568d80 7 API calls 87168->87172 87225 473600 7 API calls 87170->87225 87224 473600 7 API calls 87171->87224 87178 407414 87172->87178 87174 4072c1 87180 568d80 7 API calls 87174->87180 87175 40728e 87181 568d80 7 API calls 87175->87181 87179 568d80 7 API calls 87178->87179 87199 4073f7 87179->87199 87180->87157 87181->87157 87182 407323 87226 4733d0 143 API calls 87182->87226 87184 407386 87185 568d80 7 API calls 87184->87185 87186 407397 87185->87186 87187 568d80 7 API calls 87186->87187 87188 4073a7 87187->87188 87189 4073b0 87188->87189 87190 4073ab 87188->87190 87227 55bb30 78 API calls 87189->87227 87191 4073ae 87190->87191 87190->87198 87193 568d80 7 API calls 87191->87193 87195 4073e7 87193->87195 87194 4073cb 87228 55b7c4 73 API calls 87194->87228 87197 568d80 7 API calls 87195->87197 87197->87199 87198->87166 87199->87118 87200->87123 87202 56962c 87201->87202 87233 4e3370 87202->87233 87263 4a9bd4 GetFileAttributesA 87205->87263 87207 4a9a1f 87208 4a9a2b 87207->87208 87209 4e2b44 7 API calls 87207->87209 87210 4a9a3a SHGetMalloc 87208->87210 87209->87208 87211 4a9ba6 87210->87211 87212 4a9a4b 87210->87212 87211->87135 87212->87211 87213 4a9aa0 87212->87213 87214 4a9a84 SHGetDesktopFolder 87212->87214 87264 514544 GetCurrentThreadId 87213->87264 87214->87213 87216 4a9b04 SetErrorMode SHBrowseForFolder SetErrorMode 87266 5145f8 9 API calls 87216->87266 87218 4a9b49 87218->87135 87219->87121 87220->87145 87221->87150 87222->87175 87223->87174 87224->87182 87225->87182 87226->87184 87227->87194 87228->87198 87229->87139 87230->87149 87231->87158 87232->87162 87239 4e32c0 87233->87239 87234 4e32d9 87259 4e3260 SysFreeString 87234->87259 87235 4e32e2 87236 4e3315 87235->87236 87249 4e2c80 MultiByteToWideChar 87235->87249 87260 4e3538 SysAllocStringLen SysFreeString 87236->87260 87239->87234 87239->87235 87241 4e32e0 87241->87131 87242 4e3300 87242->87236 87244 4e3306 87242->87244 87243 4e3320 87261 4e2c80 MultiByteToWideChar 87243->87261 87250 4e334c 87244->87250 87247 4e332e 87262 4e3538 SysAllocStringLen SysFreeString 87247->87262 87249->87242 87251 4e3354 SysAllocStringLen 87250->87251 87252 4e3260 87250->87252 87253 4e3364 SysFreeString 87251->87253 87256 4e3230 87251->87256 87254 4e3266 SysFreeString 87252->87254 87255 4e3274 87252->87255 87253->87241 87254->87255 87255->87241 87257 4e324c 87256->87257 87258 4e323c SysAllocStringLen 87256->87258 87257->87241 87258->87256 87258->87257 87259->87241 87260->87243 87261->87247 87262->87241 87263->87207 87265 51459e 87264->87265 87265->87216 87266->87218 87267 5636a0 87280 5644a4 RtlEnterCriticalSection 87267->87280 87269 5636ac 87272 5636c4 87269->87272 87281 564438 87269->87281 87271 563702 87291 5644b4 RtlLeaveCriticalSection 87271->87291 87272->87271 87274 5636dd 87272->87274 87289 5644b4 RtlLeaveCriticalSection 87274->87289 87275 563707 87277 5636ee 87290 56434c ExitProcess 87277->87290 87279 563701 87279->87271 87280->87269 87282 564444 87281->87282 87283 56447f 87281->87283 87292 564364 87282->87292 87283->87272 87286 564364 46 API calls 87287 564469 87286->87287 87287->87283 87288 564364 46 API calls 87287->87288 87288->87283 87289->87277 87290->87279 87291->87275 87294 564373 87292->87294 87293 56442f 87293->87286 87294->87293 87296 4e42dc 30 API calls 87294->87296 87297 408780 87294->87297 87296->87294 87298 40878c 87297->87298 87299 40878e 87297->87299 87298->87294 87302 40672c 87299->87302 87303 40672d 87302->87303 87306 4067b8 87303->87306 87305 40674c 87305->87294 87307 4067d0 87306->87307 87308 522380 44 API calls 87307->87308 87309 406818 87308->87309 87310 522528 40 API calls 87309->87310 87311 40683a 87310->87311 87312 522518 40 API calls 87311->87312 87313 406849 87312->87313 87314 522508 40 API calls 87313->87314 87315 406855 87314->87315 87315->87305 87316 44443c 87317 444452 87316->87317 87318 44446d 87317->87318 87319 444462 87317->87319 87320 444548 87317->87320 87324 444472 87318->87324 87337 49f7e0 242 API calls 87318->87337 87321 444467 87319->87321 87322 444489 87319->87322 87339 4414ac 150 API calls 87320->87339 87321->87318 87327 4449a9 87321->87327 87322->87324 87338 443bf4 159 API calls 87322->87338 87325 444550 87325->87324 87327->87324 87329 4449c4 87327->87329 87340 568ba0 7 API calls 87329->87340 87331 4449d8 87332 568db0 7 API calls 87331->87332 87333 4449e7 87332->87333 87334 568d80 7 API calls 87333->87334 87335 4449f7 87334->87335 87336 444a0c PostMessageA 87335->87336 87336->87324 87337->87324 87338->87324 87339->87325 87340->87331 87341 4c3ab4 87342 4c3abd 87341->87342 87345 4c3af8 87342->87345 87344 4c3ad9 87346 4c3b05 87345->87346 87347 4c3b1e 87346->87347 87348 4c3b5f 87346->87348 87357 4d08dc 87347->87357 87361 4d085c CreateFileA 87348->87361 87351 4c3b28 87355 4c3b58 87351->87355 87360 4d4750 38 API calls 87351->87360 87352 4c3b69 87352->87355 87362 4d4750 38 API calls 87352->87362 87355->87344 87356 4c3b99 87356->87355 87363 4d08b8 87357->87363 87359 4d08e1 87359->87351 87360->87355 87361->87352 87362->87356 87364 4e2ff4 87363->87364 87365 4d08d4 CreateFileA 87364->87365 87365->87359 87366 46c83c 87367 46c844 87366->87367 87368 46c89b 87366->87368 87367->87368 87369 46c853 Shell_NotifyIcon 87367->87369 87370 46c878 Shell_NotifyIcon 87367->87370 87374 51d80c 87369->87374 87380 51d868 39 API calls 87370->87380 87373 46c876 87375 51d835 87374->87375 87376 51d81b 87374->87376 87379 4e0e78 7 API calls 87375->87379 87377 51d84a 87376->87377 87378 51d822 SendMessageA 87376->87378 87377->87373 87378->87377 87379->87377 87380->87368 87381 4e0db4 87382 4e0ddb 87381->87382 87383 4e0dc8 87381->87383 87385 4e0dfc 87382->87385 87386 4e0df2 RtlEnterCriticalSection 87382->87386 87410 4e01c4 RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 87383->87410 87397 4e0be4 13 API calls 87385->87397 87386->87385 87387 4e0dcd 87387->87382 87389 4e0dd1 87387->87389 87390 4e0e05 87391 4e0e09 87390->87391 87398 4e08b0 87390->87398 87393 4e0e5a RtlLeaveCriticalSection 87391->87393 87394 4e0e64 87391->87394 87393->87394 87395 4e0e15 87395->87391 87411 4e0a40 9 API calls 87395->87411 87397->87390 87399 4e08cd 87398->87399 87400 4e08c4 87398->87400 87403 4e08f6 RtlEnterCriticalSection 87399->87403 87404 4e0900 87399->87404 87409 4e08d5 87399->87409 87418 4e01c4 RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 87400->87418 87402 4e08c9 87402->87399 87402->87409 87403->87404 87404->87409 87412 4e07bc 87404->87412 87407 4e0a2b 87407->87395 87408 4e0a21 RtlLeaveCriticalSection 87408->87407 87409->87395 87410->87387 87411->87391 87415 4e07cc 87412->87415 87413 4e07f8 87417 4e081c 87413->87417 87424 4e05d0 87413->87424 87415->87413 87415->87417 87419 4e0730 87415->87419 87417->87407 87417->87408 87418->87402 87428 4dff84 87419->87428 87421 4e0740 87423 4e074d 87421->87423 87437 4e06a4 9 API calls 87421->87437 87423->87415 87425 4e0625 87424->87425 87426 4e05ee 87424->87426 87425->87426 87453 4e0520 87425->87453 87426->87417 87432 4dffa0 87428->87432 87430 4dffaa 87438 4dfe70 87430->87438 87432->87430 87433 4dffb6 87432->87433 87435 4dfffb 87432->87435 87442 4dfcdc 87432->87442 87450 4dfbd8 LocalAlloc 87432->87450 87433->87421 87451 4dfdb8 VirtualFree 87435->87451 87437->87423 87440 4dfeb6 87438->87440 87439 4dfee6 87439->87433 87440->87439 87441 4dfed2 VirtualAlloc 87440->87441 87441->87439 87441->87440 87443 4dfceb VirtualAlloc 87442->87443 87445 4dfd18 87443->87445 87446 4dfd3b 87443->87446 87452 4dfb90 LocalAlloc 87445->87452 87446->87432 87448 4dfd24 87448->87446 87449 4dfd28 VirtualFree 87448->87449 87449->87446 87450->87432 87451->87433 87452->87448 87454 4e0536 87453->87454 87455 4e0575 87454->87455 87456 4e0561 87454->87456 87465 4e05be 87454->87465 87458 4e0138 3 API calls 87455->87458 87466 4e0138 87456->87466 87459 4e0573 87458->87459 87459->87465 87476 4e03fc 9 API calls 87459->87476 87461 4e0599 87462 4e05b3 87461->87462 87477 4e0450 9 API calls 87461->87477 87478 4dfc48 LocalAlloc 87462->87478 87465->87426 87467 4e015e 87466->87467 87475 4e01b7 87466->87475 87479 4dff04 87467->87479 87471 4e017b 87472 4e0192 87471->87472 87484 4dfdb8 VirtualFree 87471->87484 87472->87475 87485 4dfc48 LocalAlloc 87472->87485 87475->87459 87476->87461 87477->87462 87478->87465 87480 4dff3b 87479->87480 87481 4dff7b 87480->87481 87482 4dff55 VirtualFree 87480->87482 87483 4dfbd8 LocalAlloc 87481->87483 87482->87480 87483->87471 87484->87472 87485->87475 87486 4759bc 87487 4759d3 87486->87487 87488 4759db 87487->87488 87489 4759f0 87487->87489 87490 475a0a 87487->87490 87489->87488 87492 52da70 100 API calls 87489->87492 87493 52196c 65 API calls 87490->87493 87513 475ab1 87490->87513 87491 52da70 100 API calls 87494 475b08 LoadBitmapA 87491->87494 87492->87488 87495 475a25 87493->87495 87501 475b45 87494->87501 87497 521d80 101 API calls 87495->87497 87498 475a47 87497->87498 87499 521d40 101 API calls 87498->87499 87500 475a54 87499->87500 87504 52dd5c 100 API calls 87500->87504 87502 475b74 87501->87502 87503 475b54 87501->87503 87506 568db0 7 API calls 87502->87506 87505 568db0 7 API calls 87503->87505 87507 475a63 87504->87507 87505->87488 87506->87488 87508 52dca0 100 API calls 87507->87508 87509 475a70 87508->87509 87514 52d308 KiUserCallbackDispatcher 87509->87514 87511 475a90 87515 52d298 KiUserCallbackDispatcher 87511->87515 87513->87491 87514->87511 87515->87513 87516 542ca8 87517 542cb3 87516->87517 87518 542ccb 87516->87518 87519 542cb7 87517->87519 87520 542ccd 87517->87520 87525 5433ac 87519->87525 87532 542b24 87520->87532 87526 52db50 100 API calls 87525->87526 87527 5433d0 87526->87527 87528 542b24 38 API calls 87527->87528 87529 5433db 87528->87529 87530 4e2b44 7 API calls 87529->87530 87531 543408 87530->87531 87531->87518 87533 542b35 87532->87533 87534 542b38 87532->87534 87536 543090 SendMessageA 87533->87536 87534->87533 87535 4c0f34 38 API calls 87534->87535 87535->87534 87536->87518 87537 4163bc 87538 4163c5 87537->87538 87539 4163ca 87537->87539 87541 4a55dc 87538->87541 87542 4a55ef 87541->87542 87543 568dd8 7 API calls 87542->87543 87544 4a561d 87543->87544 87545 568d80 7 API calls 87544->87545 87546 4a562d 87545->87546 87547 4d09e4 4 API calls 87546->87547 87551 4a563b 87547->87551 87548 4a56d9 87549 4a56e8 FreeLibrary 87548->87549 87550 4a56ee LoadLibraryA 87548->87550 87549->87550 87555 4a5714 GetProcAddress 87550->87555 87559 4a584a 87550->87559 87551->87548 87552 568dd8 7 API calls 87551->87552 87554 4a5671 87552->87554 87556 568db0 7 API calls 87554->87556 87557 4a583e FreeLibrary 87555->87557 87568 4a572f 87555->87568 87558 4a567c 87556->87558 87557->87559 87560 568d80 7 API calls 87558->87560 87561 568d80 7 API calls 87559->87561 87562 4a568c 87560->87562 87563 4a5883 87561->87563 87564 568d80 7 API calls 87562->87564 87563->87539 87565 4a569c 87564->87565 87566 4d09e4 4 API calls 87565->87566 87567 4a56a4 87566->87567 87567->87548 87569 568db0 7 API calls 87567->87569 87568->87557 87572 4a5788 6 API calls 87568->87572 87570 4a56c9 87569->87570 87571 568d80 7 API calls 87570->87571 87571->87548 87573 4a5813 87572->87573 87574 568d80 7 API calls 87573->87574 87575 4a5831 87574->87575 87575->87563 87576 4f13f0 87577 4f1402 87576->87577 87578 4f1410 87576->87578 87578->87577 87579 4f1463 87578->87579 87580 4f14c0 87578->87580 87579->87577 87582 4f1475 GetCursorPos 87579->87582 87580->87577 87581 4f14ca SendMessageA 87580->87581 87581->87577 87583 4f1488 87582->87583 87584 4f149e SendMessageA 87583->87584 87587 52e208 162 API calls 87584->87587 87586 4f14be 87586->87577 87587->87586

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 118 43e9b4-43eaee call 559e70 call 46a484 call 565180 call 561648 call 568b2c call 568db0 call 568d80 call 568b2c call 568db0 call 568d80 call 403910 call 447060 call 447964 call 413b0c call 568b2c @TcmAutoUpgrader@SetLocalVersionText$qqr17System@AnsiString call 568d80 call 443658 153 43eaf0-43eaf2 118->153 154 43eaf6-43eb0a call 4f80c8 118->154 155 43eaf4-43eb3b call 47529c 153->155 156 43eb0c-43eb20 call 4f80c8 153->156 161 43eb59-43eb61 154->161 170 43eb3d-43eb4a call 4f80c8 155->170 171 43eb4c-43eb54 call 4f80c8 155->171 156->161 164 43eb63-43eb65 161->164 165 43eb6d-43eb7a call 4f80c8 161->165 167 43eb67-43eb69 164->167 168 43eb7c-43eb89 call 4f80c8 164->168 179 43ebab-43eced call 444b8c call 4f87bc * 4 call 4f8194 call 4f87bc call 4f8194 call 4f87bc call 4f8194 call 4f87bc call 4f80c8 * 2 call 403898 * 3 165->179 172 43eb8b-43eb98 call 4f80c8 167->172 173 43eb6b-43eba6 call 4f80c8 167->173 168->179 170->161 171->161 172->179 173->179 217 43ed24-43ef90 call 4d05c8 call 52db80 call 568d80 call 54703c call 4efd78 call 4f0bec call 568b2c call 568db0 call 568d80 call 534424 call 546f90 call 4f0bd8 @TContextPopupMenu@$bctr$qqrp18Classes@TComponent @TContextPopupMenu@RegisterCharsetMenuItem$qqrp15Menus@TMenuItemi * 2 @TContextPopupMenu@SetCharset$qqri call 4f6278 call 4f80c8 call 4f6278 * 3 call 4f837c * 4 179->217 218 43ecef-43ed1e call 403898 179->218 263 43ef92-43efa2 217->263 264 43efa4-43efac 217->264 218->217 265 43efb4-43efc1 call 558b14 263->265 264->265 269 43efc3-43efe2 call 4aba00 265->269 270 43efe4 265->270 272 43efe7-43f57c call 52db08 * 2 @TcmForm@setToggleState$qqr16TFormToggleState @TAssistSplitter@Instantiate$qqrp18Classes@TComponentp20Controls@TWinControlt2ynpqqrp14System@TObject$v call 49e4b4 call 4403ec call 49fef4 call 49ed2c call 403ff8 LoadBitmapA call 557884 call 568a68 call 52dd5c call 52dca0 call 52dd5c call 52dcf0 call 52d308 call 543a34 269->272 270->272 304 43f663-43f66a 272->304 305 43f582-43f58b 272->305 306 43f67f-43f6aa call 52c7cc * 2 304->306 307 43f66c-43f673 304->307 308 43f591-43f5a2 call 517a38 call 51b138 305->308 309 43f62e-43f634 305->309 326 43f6b0-43f6b4 306->326 327 43f7be-43f7f2 call 44257c call 447c1c call 5341f0 PostMessageA 306->327 307->306 310 43f675-43f67a call 49ee90 307->310 308->309 328 43f5a8-43f5ae 308->328 313 43f636-43f63c 309->313 314 43f649-43f64e 309->314 310->306 313->314 319 43f63e-43f644 @TcmForm@ExecuteMaximize$qqrv 313->319 314->304 315 43f650-43f652 314->315 315->304 320 43f654-43f65e call 49f848 315->320 319->314 320->304 330 43f701-43f714 call 5488d0 326->330 331 43f6b6-43f6fc call 4611fc call 4ad90c call 568d80 326->331 328->309 332 43f5b0-43f5c2 call 517a38 call 51b104 328->332 343 43f760-43f7b9 call 568b2c call 569364 call 4ad90c call 568d80 * 2 330->343 344 43f716-43f75e call 548900 call 568b64 call 4ad90c call 568d80 330->344 331->327 332->309 354 43f5c4-43f5e6 332->354 343->327 344->327 354->314 363 43f5e8-43f5f9 354->363 363->314 366 43f5fb-43f62c call 52d308 * 2 363->366 366->314
                                                  APIs
                                                    • Part of subcall function 00565180: GetLocalTime.KERNEL32(?,00000000), ref: 0056518E
                                                    • Part of subcall function 00403910: GetTempPathA.KERNEL32(000000C8,?), ref: 00403933
                                                    • Part of subcall function 00413B0C: @TcmAutoUpgrader@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST ref: 00413B46
                                                  • @TcmAutoUpgrader@SetLocalVersionText$qqr17System@AnsiString.Z39UARTASSIST ref: 0043EAB4
                                                  • @TContextPopupMenu@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST ref: 0043EE1F
                                                  • @TContextPopupMenu@RegisterCharsetMenuItem$qqrp15Menus@TMenuItemi.Z39UARTASSIST ref: 0043EE39
                                                  • @TContextPopupMenu@RegisterCharsetMenuItem$qqrp15Menus@TMenuItemi.Z39UARTASSIST ref: 0043EE4C
                                                  • @TContextPopupMenu@SetCharset$qqri.Z39UARTASSIST ref: 0043EE72
                                                  • @TcmForm@setToggleState$qqr16TFormToggleState.Z39UARTASSIST ref: 0043F03F
                                                    • Part of subcall function 004F80C8: CheckMenuItem.USER32(00000000,?,?), ref: 004F8100
                                                  • @TAssistSplitter@Instantiate$qqrp18Classes@TComponentp20Controls@TWinControlt2ynpqqrp14System@TObject$v.Z39UARTASSIST(?,?), ref: 0043F089
                                                    • Part of subcall function 00406300: @TAssistSplitter@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST ref: 0040632A
                                                    • Part of subcall function 00406300: @TAssistSplitter@SetBackgroudColor$qqr15Graphics@TColor.Z39UARTASSIST ref: 00406344
                                                  • LoadBitmapA.USER32(?,ICON_INFO), ref: 0043F107
                                                    • Part of subcall function 0052D308: KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406375), ref: 0052D31B
                                                  • @TcmForm@ExecuteMaximize$qqrv.Z39UARTASSIST ref: 0043F644
                                                  • PostMessageA.USER32(00000000,0000040B,00000000,00000000), ref: 0043F7DD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Menu$Classes@ContextPopup$AssistComponentMenu@$AutoCharsetItem$qqrp15ItemiLocalMenus@RegisterSplitter@System@Toggle$AnsiBackgroudBitmapCallbackCharset$qqriCheckColorColor$qqr15Componentp20Controls@Controlt2ynpqqrp14DispatcherExecuteFormForm@Form@setGraphics@Instantiate$qqrp18ItemLoadMaximize$qqrvMenu@$bctr$qqrp18MessageObject$vPathPostSplitter@$bctr$qqrp18StateState$qqr16StringTempText$qqr17TimeUpgrader@Upgrader@$bctr$qqrp18UserVersion
                                                  • String ID: 5.0.14$@W$ICON_INFO$UartAssist$Welcome to $h*D$hh:mm:ss$t$t1D$x#D$yyyy-MM-dd$^$/D
                                                  • API String ID: 982550687-2054703135
                                                  • Opcode ID: a1cf65d3c65cf964d5493d99c6c1c4aec530ee67ad43b3b58900f33f44068b47
                                                  • Instruction ID: 8006cb96a45ce60304b63df073c5dd9c845c0fd3bb7955d7e64e89ae2f88272b
                                                  • Opcode Fuzzy Hash: a1cf65d3c65cf964d5493d99c6c1c4aec530ee67ad43b3b58900f33f44068b47
                                                  • Instruction Fuzzy Hash: 17824774A012058FDB14DF19C885B99BBF1FF88308F1481BAE9499F366CB35A949CF58

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 451 4a55dc-4a563d call 559e70 call 568b2c call 568dd8 call 568d80 call 4d09e4 462 4a56d9-4a56e6 451->462 463 4a5643-4a56a6 call 568b2c call 568dd8 call 568db0 call 568d80 * 2 call 4d09e4 451->463 465 4a56e8-4a56e9 FreeLibrary 462->465 466 4a56ee-4a56f2 462->466 463->462 501 4a56a8-4a56d4 call 568b2c call 568db0 call 568d80 463->501 465->466 468 4a56f9 466->468 469 4a56f4-4a56f7 466->469 471 4a56fe-4a570e LoadLibraryA 468->471 469->471 473 4a584a-4a5887 call 4a55ac call 568d80 471->473 474 4a5714-4a5729 GetProcAddress 471->474 493 4a588e-4a5894 473->493 477 4a583e-4a5845 FreeLibrary 474->477 478 4a572f-4a5733 474->478 477->473 481 4a573d 478->481 482 4a5735-4a573b 478->482 485 4a573f-4a5744 481->485 482->485 488 4a574b 485->488 489 4a5746-4a5749 485->489 490 4a5750-4a5759 488->490 489->490 497 4a575b-4a5761 490->497 498 4a5763 490->498 500 4a5765-4a576a 497->500 498->500 502 4a576c-4a576f 500->502 503 4a5771 500->503 501->462 506 4a5776-4a5782 call 469630 502->506 503->506 506->477 512 4a5788-4a5811 GetProcAddress * 6 506->512 513 4a581e-4a583c call 568d80 512->513 514 4a5813-4a5819 512->514 513->493 514->513
                                                  APIs
                                                  • FreeLibrary.KERNEL32(00000000), ref: 004A56E9
                                                  • LoadLibraryA.KERNEL32(005934ED), ref: 004A56FF
                                                  • GetProcAddress.KERNEL32(00000000,dll_mem_crc16), ref: 004A571A
                                                  • GetProcAddress.KERNEL32(00000000,dll_get_version), ref: 004A5794
                                                  • GetProcAddress.KERNEL32(00000000,LoadBitmapfromMemory), ref: 004A57AA
                                                  • GetProcAddress.KERNEL32(00000000,LoadPNGfromStream), ref: 004A57BF
                                                  • GetProcAddress.KERNEL32(00000000,MPHexEditor_ShowModal), ref: 004A57D5
                                                  • GetProcAddress.KERNEL32(00000000,WebBrowser_Navigate), ref: 004A57EB
                                                  • GetProcAddress.KERNEL32(00000000,WebBrowser_Invoke), ref: 004A5800
                                                  • FreeLibrary.KERNEL32(00000000,00000000,dll_mem_crc16,005934ED), ref: 004A5845
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$Library$Free$Load
                                                  • String ID: 8$LoadBitmapfromMemory$LoadPNGfromStream$MPHexEditor_ShowModal$WebBrowser_Invoke$WebBrowser_Navigate$assist.dll$assist.dll$assist.sys$dll_get_version$dll_mem_crc16
                                                  • API String ID: 930031478-1472578398
                                                  • Opcode ID: dd11d352923aed193548225b94b709e6722d2f0e64a095c52ebc41c45e260c62
                                                  • Instruction ID: 0a79c0f14bd496bb61fbe507f8be70998eee5db6c9d603e49caabc13073f6f31
                                                  • Opcode Fuzzy Hash: dd11d352923aed193548225b94b709e6722d2f0e64a095c52ebc41c45e260c62
                                                  • Instruction Fuzzy Hash: 9A71927090020ADBCF11EBA4D989AEEBBB8FF55300F11456BE40967351DB389F09DB65

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 518 4e4518-4e4559 GetModuleFileNameA RegOpenKeyExA 519 4e459b-4e45de call 4e4360 RegQueryValueExA 518->519 520 4e455b-4e4577 RegOpenKeyExA 518->520 525 4e4602-4e461c RegCloseKey 519->525 526 4e45e0-4e45fc RegQueryValueExA 519->526 520->519 521 4e4579-4e4595 RegOpenKeyExA 520->521 521->519 523 4e4624-4e4655 lstrcpyn GetThreadLocale GetLocaleInfoA 521->523 527 4e473e-4e4745 523->527 528 4e465b-4e465f 523->528 526->525 529 4e45fe 526->529 530 4e466b-4e4681 lstrlen 528->530 531 4e4661-4e4665 528->531 529->525 532 4e4684-4e4687 530->532 531->527 531->530 533 4e4689-4e4691 532->533 534 4e4693-4e469b 532->534 533->534 536 4e4683 533->536 534->527 535 4e46a1-4e46a6 534->535 537 4e46a8-4e46ce lstrcpyn LoadLibraryExA 535->537 538 4e46d0-4e46d2 535->538 536->532 537->538 538->527 539 4e46d4-4e46d8 538->539 539->527 540 4e46da-4e470a lstrcpyn LoadLibraryExA 539->540 540->527 541 4e470c-4e473c lstrcpyn LoadLibraryExA 540->541 541->527
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000105,?,0056B0A8), ref: 004E4534
                                                  • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,?,0056B0A8), ref: 004E4552
                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,?,0056B0A8), ref: 004E4570
                                                  • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 004E458E
                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,004E461D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 004E45D7
                                                  • RegQueryValueExA.ADVAPI32(?,004E4784,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,004E461D,?,80000001), ref: 004E45F5
                                                  • RegCloseKey.ADVAPI32(?,004E4624,00000000,?,?,00000000,004E461D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 004E4617
                                                  • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 004E4634
                                                  • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 004E4641
                                                  • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 004E4647
                                                  • lstrlen.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 004E4672
                                                  • lstrcpyn.KERNEL32(00000000,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 004E46B9
                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000000,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 004E46C9
                                                  • lstrcpyn.KERNEL32(00000000,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 004E46F1
                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000000,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 004E4701
                                                  • lstrcpyn.KERNEL32(00000000,?,00000105,?,00000000,00000002,00000000,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 004E4727
                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000000,?,00000105,?,00000000,00000002,00000000,?,00000105,?,00000000,00000003,?), ref: 004E4737
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                  • String ID: .$Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                  • API String ID: 1759228003-3917250287
                                                  • Opcode ID: 6a6085b507c2613188efa4bace852e6db6a483e9875522edd7ee92092e92043c
                                                  • Instruction ID: a1e44367fbbf4686bfe3d1403c0c72d710c958931c86e67c6fc404c743da46f4
                                                  • Opcode Fuzzy Hash: 6a6085b507c2613188efa4bace852e6db6a483e9875522edd7ee92092e92043c
                                                  • Instruction Fuzzy Hash: E1517971A4025D7AEF21D6B58C46FEF7BBCAB85741F4001A2B604E7181E6789E44CB94

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 542 472254-472297 call 559e70 SetupDiGetClassDevsA 545 47280e-47281d 542->545 546 47229d-4722b0 call 413168 542->546 549 472448-47245e SetupDiEnumDeviceInfo 546->549 550 4722b5-4722ef SetupDiGetDeviceRegistryPropertyA call 559bad 549->550 551 472464-472470 549->551 557 472445 550->557 558 4722f5-4722f8 550->558 555 472476-472492 RegOpenKeyExA 551->555 556 47251e-47253f 551->556 555->556 559 472498-4724a8 555->559 566 472541-472560 556->566 567 4725ab-4725b1 556->567 557->549 560 4722fe-47230b call 559b95 558->560 561 4723d9-472440 call 56109c call 4d05c8 call 569364 call 471f00 call 568d80 * 2 558->561 564 4724ea-472513 RegEnumValueA 559->564 560->557 576 472311-4723d7 call 568b2c * 2 call 568dd8 call 568b2c call 568dd8 call 471f00 call 568d80 * 5 560->576 561->557 570 472515-472519 RegCloseKey 564->570 571 4724aa-4724e5 call 568b2c call 471f00 call 568d80 564->571 586 472567 566->586 587 472562-472565 566->587 574 4725b3-4725cc call 559bb4 567->574 575 4725d2-4725f7 call 5598e4 567->575 570->556 571->564 574->575 590 4727de-4727e5 574->590 592 47260a-472612 575->592 593 4725f9-4725fe 575->593 576->557 594 47256c-4725a9 call 56109c call 568d80 586->594 587->594 601 4727e7-4727ff 590->601 602 472805-472809 SetupDiDestroyDeviceInfoList 590->602 592->590 598 472618-47264a 592->598 593->592 594->566 594->567 613 472751-472760 598->613 614 472650-472700 call 50ad7c call 568d80 * 2 598->614 601->602 602->545 624 472762-472769 613->624 625 4727d1-4727d9 call 472854 613->625 653 472716-472722 614->653 654 472702-47270e 614->654 624->625 626 47276b-4727cc call 4d05c8 call 569364 call 52db80 call 568d80 * 2 624->626 625->590 626->625 657 472724-47272a 653->657 658 472730-47274b 653->658 654->653 657->658 658->613 658->614
                                                  APIs
                                                  • SetupDiGetClassDevsA.SETUPAPI(0059B0AC,00000000,00000000,00000002), ref: 0047228B
                                                  • SetupDiGetDeviceRegistryPropertyA.SETUPAPI(000000FF,?,0000000C,00000000,?,00000104,00000000), ref: 004722D2
                                                  • SetupDiEnumDeviceInfo.SETUPAPI(000000FF,?,?), ref: 00472457
                                                  • RegOpenKeyExA.ADVAPI32(80000002,Hardware\DeviceMap\SerialComm,00000000,00020019,?), ref: 0047248B
                                                  • RegEnumValueA.ADVAPI32(?,00000000,?,00000040,00000000,00000000,?,00000040,80000002,Hardware\DeviceMap\SerialComm,00000000,00020019,?), ref: 0047250C
                                                  • RegCloseKey.ADVAPI32(?,?,00000001,?,00000040,00000000,00000000,?,00000040,?,00000000,?,00000040,00000000,00000000,?), ref: 00472519
                                                  • SetupDiDestroyDeviceInfoList.SETUPAPI(?), ref: 00472809
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Setup$Device$EnumInfo$ClassCloseDestroyDevsListOpenPropertyRegistryValue
                                                  • String ID: (COM$4K$@$@$COM$COM$Hardware\DeviceMap\SerialComm$h
                                                  • API String ID: 3611252246-4248320136
                                                  • Opcode ID: 72697b564033dc1d8b31d3da65b65c9c3be64cfd0cf3a5f16a97dc534eed7eeb
                                                  • Instruction ID: 2649c9aed43a251bb5fe1b7b9409f8a0e45de31ffb2c0ad08769cc63df75a942
                                                  • Opcode Fuzzy Hash: 72697b564033dc1d8b31d3da65b65c9c3be64cfd0cf3a5f16a97dc534eed7eeb
                                                  • Instruction Fuzzy Hash: 20023D74E002199FCB14DFA4C985BEEB7B5FF48304F20816AE909A7252DB74AE46CF54

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 898 4e4624-4e4655 lstrcpyn GetThreadLocale GetLocaleInfoA 899 4e473e-4e4745 898->899 900 4e465b-4e465f 898->900 901 4e466b-4e4681 lstrlen 900->901 902 4e4661-4e4665 900->902 903 4e4684-4e4687 901->903 902->899 902->901 904 4e4689-4e4691 903->904 905 4e4693-4e469b 903->905 904->905 907 4e4683 904->907 905->899 906 4e46a1-4e46a6 905->906 908 4e46a8-4e46ce lstrcpyn LoadLibraryExA 906->908 909 4e46d0-4e46d2 906->909 907->903 908->909 909->899 910 4e46d4-4e46d8 909->910 910->899 911 4e46da-4e470a lstrcpyn LoadLibraryExA 910->911 911->899 912 4e470c-4e473c lstrcpyn LoadLibraryExA 911->912 912->899
                                                  APIs
                                                  • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 004E4634
                                                  • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 004E4641
                                                  • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 004E4647
                                                  • lstrlen.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 004E4672
                                                  • lstrcpyn.KERNEL32(00000000,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 004E46B9
                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000000,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 004E46C9
                                                  • lstrcpyn.KERNEL32(00000000,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 004E46F1
                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000000,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 004E4701
                                                  • lstrcpyn.KERNEL32(00000000,?,00000105,?,00000000,00000002,00000000,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 004E4727
                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000000,?,00000105,?,00000000,00000002,00000000,?,00000105,?,00000000,00000003,?), ref: 004E4737
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
                                                  • String ID: .$Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                  • API String ID: 1599918012-3917250287
                                                  • Opcode ID: 5642b653f104c87a34190c793bf55d685bd789574837a80296629cfbf3510c82
                                                  • Instruction ID: 402fe8e366e20405a04fa69c854b64db1027a754bcec6d49567d926d60afba60
                                                  • Opcode Fuzzy Hash: 5642b653f104c87a34190c793bf55d685bd789574837a80296629cfbf3510c82
                                                  • Instruction Fuzzy Hash: EB31AB71E0025D2AEF25D6B5DC4AFEF7BFC5B85380F0441F2A648E7185EA789E848B50
                                                  APIs
                                                  • PostMessageA.USER32(?,00000464,00000000,00000000), ref: 004721AA
                                                  • RegisterDeviceNotificationA.USER32(?,00000020,00000000), ref: 004721F9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeviceMessageNotificationPostRegister
                                                  • String ID: $|*G
                                                  • API String ID: 1660816118-4069222751
                                                  • Opcode ID: c1ca511793141a2b4c1757e3a43df32ac7c1a9d1542795c70eeb51950b3a2c70
                                                  • Instruction ID: 1b7022f1b62546d623e90b5473392de711495219b60717ac6dc26e6521d1a631
                                                  • Opcode Fuzzy Hash: c1ca511793141a2b4c1757e3a43df32ac7c1a9d1542795c70eeb51950b3a2c70
                                                  • Instruction Fuzzy Hash: D8411675A002059BD728CF58D884BDAFBF5FF98300F24866EE6889B341C772A945CBD4
                                                  APIs
                                                  • CreateFileA.KERNEL32(?,00000000,00000003,00000000,00000003,00000000,00000000), ref: 0040A5F6
                                                  • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00001000,?,00000000), ref: 0040A638
                                                  • CloseHandle.KERNEL32(00000000,00000000,002D1400,?,0000000C,?,00001000,?,00000000,?,00000000,00000003,00000000,00000003,00000000,00000000), ref: 0040A666
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseControlCreateDeviceFileHandle
                                                  • String ID: \\.\PhysicalDrive0
                                                  • API String ID: 33631002-1180397377
                                                  • Opcode ID: 71b245b3cce3ad6ed13dd5098edcd237b44a6c60628cded3cf606c99298eef98
                                                  • Instruction ID: f610eac4f3080639976a76cabc5bc351fdb566711a164c697a638a15b6bf445a
                                                  • Opcode Fuzzy Hash: 71b245b3cce3ad6ed13dd5098edcd237b44a6c60628cded3cf606c99298eef98
                                                  • Instruction Fuzzy Hash: 1431C335A40209ABDB00DB65CC82FAFB7B9FB89760F140126F904BB3D1DA759D418BA5
                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,?,?,004D09EE,?,00406A3D), ref: 004D0997
                                                  • FindClose.KERNEL32(00000000,00000000,?,?,?,004D09EE,?,00406A3D), ref: 004D09A2
                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 004D09BB
                                                  • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 004D09CC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileTime$Find$CloseDateFirstLocal
                                                  • String ID:
                                                  • API String ID: 2659516521-0
                                                  • Opcode ID: 55f75d935bf554deb310207c3fb4b47479307ec569e5fcd68e9baffba3f9d912
                                                  • Instruction ID: c7c4f722a64da47354d29372549cef8d25a3ef1d791e11ee7ae127461722c244
                                                  • Opcode Fuzzy Hash: 55f75d935bf554deb310207c3fb4b47479307ec569e5fcd68e9baffba3f9d912
                                                  • Instruction Fuzzy Hash: CBF018B1D0020DA6CF10EAE58C99ADF77ACAB45324F1007D3B519E3291EA749B054794
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Capture
                                                  • String ID:
                                                  • API String ID: 1145282425-3916222277
                                                  • Opcode ID: f0d8ae3e318030af4d124136efec2b1f6ecdd57fd829452a5f22e6367a5cad07
                                                  • Instruction ID: 5ad16c352f497a87538122d8a892b32801d1715b967a36099bdfaf900a9a342e
                                                  • Opcode Fuzzy Hash: f0d8ae3e318030af4d124136efec2b1f6ecdd57fd829452a5f22e6367a5cad07
                                                  • Instruction Fuzzy Hash: 5B31C130700A4297C720AA3CCC89B5A6FE5BF83310F158D39B456CBB92DA34DE05C769
                                                  APIs
                                                  • @TcmDownloader@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST ref: 0046B189
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Classes@ComponentDownloader@$bctr$qqrp18
                                                  • String ID: AutoUpgrade
                                                  • API String ID: 2020136150-756189993
                                                  • Opcode ID: 96e9b9b0e8ddbb25682c98873902b0212c81c6a834885420eccfcbc1f273ea30
                                                  • Instruction ID: 97c19fa33b3ee49f161006a371f95edc360b12283082cc70c8d89b039cc71115
                                                  • Opcode Fuzzy Hash: 96e9b9b0e8ddbb25682c98873902b0212c81c6a834885420eccfcbc1f273ea30
                                                  • Instruction Fuzzy Hash: 804150B1600655CFDB14DF29C48175ABBF6FF8A304B0486AAD845DF359D730E806CBA6
                                                  APIs
                                                  • GetKeyboardState.USER32(?,?,?,?,?,00472CCF), ref: 0052EF15
                                                  • KiUserCallbackDispatcher.NTDLL(?,?,?,?,00472CCF), ref: 0052EF68
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CallbackDispatcherKeyboardStateUser
                                                  • String ID:
                                                  • API String ID: 4281813569-0
                                                  • Opcode ID: 5f612f760ad0bced47cd9558801d29a2c0138559b3a422f7948d5f74e952c41c
                                                  • Instruction ID: fa5ce2fdf13aa0e3b25171b7e7f7c4a87f6b98bb9c0ea12ac14e928ef7df135d
                                                  • Opcode Fuzzy Hash: 5f612f760ad0bced47cd9558801d29a2c0138559b3a422f7948d5f74e952c41c
                                                  • Instruction Fuzzy Hash: A441CE30A00625CFDB20DF28E68A6A9BFE9BF47700F1844A5E455DB2D1C770DE85CB56
                                                  APIs
                                                  • FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 004C0926
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FindResource
                                                  • String ID:
                                                  • API String ID: 1635176832-0
                                                  • Opcode ID: f3f3a25696deafbf42814b3943e34ce8e29dcf650049079e444d85fee10f1d28
                                                  • Instruction ID: 80a274cc4f5c446239568964f609e2ab7a88182ad992e322c01d7432691aff6c
                                                  • Opcode Fuzzy Hash: f3f3a25696deafbf42814b3943e34ce8e29dcf650049079e444d85fee10f1d28
                                                  • Instruction Fuzzy Hash: D801F776304300BBE710EF2AEC92F2AB7ADEB8A714711403EF500D7352DA799C019714
                                                  APIs
                                                  • GetSystemInfo.KERNEL32(?,00000000,00000000,00000000,?,?,?,0050F030,?,?,00000000,0050F057), ref: 0050B830
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoSystem
                                                  • String ID:
                                                  • API String ID: 31276548-0
                                                  • Opcode ID: b53cf9cefce9f071b2e099d77d03ddf86a6ac356d889bf6f0b38cd09207a6768
                                                  • Instruction ID: 4d9b580e751b97ea1eb64bbb6623148b06ef696b79dca1c21f6cca5dd4455c98
                                                  • Opcode Fuzzy Hash: b53cf9cefce9f071b2e099d77d03ddf86a6ac356d889bf6f0b38cd09207a6768
                                                  • Instruction Fuzzy Hash: FFF06271D01109DFDB10DF98C4D889CBBB8FB5630175082A9D408E7292EB30E694D781
                                                  APIs
                                                  • GetTimeZoneInformation.KERNEL32(?,0046A4A9,?,0046A494), ref: 004660FF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InformationTimeZone
                                                  • String ID:
                                                  • API String ID: 565725191-0
                                                  • Opcode ID: 2adf4f9eff68a7ce87f8b3a769e8103df1dae65cc01e18ae1313eb9a6b9eafd5
                                                  • Instruction ID: 2c2c044b0c30796dcad2614d41bb67523dd3fdcd679579d814183eaba617f24b
                                                  • Opcode Fuzzy Hash: 2adf4f9eff68a7ce87f8b3a769e8103df1dae65cc01e18ae1313eb9a6b9eafd5
                                                  • Instruction Fuzzy Hash: 25C08C2090815057E2012321DC172847E04AB43B28FCB0725C1E8402A7F62F0138498B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 63a20488e03fdd28344ff6f68dd4148cbef4997637c47a5589e4f2538f95722b
                                                  • Instruction ID: 4b904afc313b2872121d39465507a369b306bb0bec701edd8adb8812729c57e6
                                                  • Opcode Fuzzy Hash: 63a20488e03fdd28344ff6f68dd4148cbef4997637c47a5589e4f2538f95722b
                                                  • Instruction Fuzzy Hash: 99D1907060030A8FCB24EF54C4857EEF7B5FF84304F14866AE8565B746DB70A90ACBA5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 464d20-464d3b GetTickCount 1 464d3e-464d70 call 46467c 0->1 4 464db5-464db8 1->4 5 464d72-464d85 call 469db0 1->5 6 4652e8-4652ee 4->6 9 464d87-464dcd htons call 559954 socket 5->9 10 464dad-464db0 5->10 14 464dd7-464df5 call 4648c0 connect 9->14 15 464dcf-464dd2 9->15 10->6 18 464eca-464ee2 call 4648c0 GetTickCount 14->18 19 464dfb-464e42 14->19 15->6 26 464ee4-464ee7 18->26 27 464eec-464ef8 18->27 21 464e44-464e53 19->21 22 464e5a-464e75 select 19->22 21->22 24 464e77-464ea4 call 569b10 22->24 25 464ea8-464ec5 call 468eb8 closesocket 22->25 24->25 36 464ea6 24->36 25->6 26->6 30 464f7e-464f82 27->30 31 464efe-464f0b 27->31 37 464f84-464f88 30->37 38 464f99-464f9d 30->38 34 464f12 31->34 35 464f0d-464f10 31->35 42 464f17-464f35 call 55d764 34->42 35->42 36->18 39 464fa4-464fac 37->39 40 464f8a-464f97 call 559a88 37->40 38->39 41 464f9f-464fa1 38->41 44 464fb3 39->44 45 464fae-464fb1 39->45 40->39 41->39 52 464f37-464f50 call 464bdc 42->52 53 464f52-464f79 send 42->53 48 464fb8-464fc6 44->48 45->48 50 464fcd 48->50 51 464fc8-464fcb 48->51 54 464fd2-464ff0 call 55d764 50->54 51->54 52->53 56 4650e1-4650e3 53->56 66 464ff2-46500b call 464bdc 54->66 67 46500d-465023 54->67 59 4650f6-465139 56->59 60 4650e5-4650f1 closesocket 56->60 62 465151-46516c select 59->62 63 46513b-46514a 59->63 60->6 64 465172-465182 call 569b46 62->64 65 4652bb-4652ca closesocket 62->65 63->62 75 465187-46518b 64->75 71 4652dc-4652de 65->71 72 4652cc-4652cf 65->72 66->67 69 4650cc-4650df send 67->69 70 465029-465037 67->70 69->56 76 465084-46509b send 70->76 77 465039-465082 call 5598e4 call 55d764 send 70->77 80 4652e6 71->80 81 4652e0-4652e4 71->81 78 4652d1-4652d4 72->78 79 4652d8-4652da 72->79 75->65 82 465191-465198 75->82 76->56 84 46509d-4650b4 send 76->84 77->56 78->79 79->6 80->6 81->6 85 46519e-4651c1 call 46472c 82->85 86 46529c-4652a0 82->86 84->56 88 4650b6-4650ca send 84->88 95 465257-46525d 85->95 96 4651c7-4651ce 85->96 86->65 89 4652a2-4652ac GetTickCount 86->89 88->56 89->65 92 4652ae-4652b6 89->92 92->59 99 465267-465270 95->99 100 46525f-465265 95->100 97 4651f3-4651f9 96->97 98 4651d0-4651d4 96->98 104 4651fe-465202 97->104 105 4651fb 97->105 98->97 101 4651d6-4651f1 call 464a78 98->101 102 465298-46529a 99->102 103 465272-465293 closesocket 99->103 100->99 100->102 101->97 102->65 102->86 103->1 106 465204-465206 104->106 107 46521e-46522a closesocket 104->107 105->104 109 46522f-465233 106->109 110 465208-46521c call 5598e4 106->110 107->6 113 465247-46524c 109->113 114 465235-46523b 109->114 110->109 117 46524f-465255 113->117 114->113 116 46523d-465245 114->116 116->117 117->86
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00464D2C
                                                    • Part of subcall function 00469DB0: inet_addr.WS2_32(?), ref: 00469DC8
                                                    • Part of subcall function 00469DB0: gethostbyname.WS2_32(?), ref: 00469DD5
                                                  • htons.WS2_32(?), ref: 00464D92
                                                  • socket.WS2_32(00000002,00000001,00000006), ref: 00464DC3
                                                  • connect.WS2_32(?,?,00000010), ref: 00464DEF
                                                  • select.WS2_32(?,00000000,?,00000000,?), ref: 00464E6E
                                                  • GetTickCount.KERNEL32 ref: 00464ED8
                                                  Strings
                                                  • application/x-www-form-urlencoded, xrefs: 00464FB3, 00464FB8
                                                  • http connect error,%s!, xrefs: 00464EAC
                                                  • , xrefs: 004650BA
                                                  • , xrefs: 0046505D
                                                  • POST %s HTTP/1.0Host: %sUser-Agent: Mozilla/4.0Accept: */*Accept-Language: zh-cnAccept-Encoding: identityContent-Type: %sContent-Length: %d, xrefs: 00464FD3
                                                  • GET %s HTTP/1.0Host: %sUser-Agent: Mozilla/4.0Accept: */*Accept-Language: zh-cnAccept-Encoding: identityConnection: closeCache-Control: no-cache, xrefs: 00464F18
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CountTick$connectgethostbynamehtonsinet_addrselectsocket
                                                  • String ID: $$GET %s HTTP/1.0Host: %sUser-Agent: Mozilla/4.0Accept: */*Accept-Language: zh-cnAccept-Encoding: identityConnection: closeCache-Control: no-cache$POST %s HTTP/1.0Host: %sUser-Agent: Mozilla/4.0Accept: */*Accept-Language: zh-cnAccept-Encoding: identityContent-Type: %sContent-Length: %d$application/x-www-form-urlencoded$http connect error,%s!
                                                  • API String ID: 339190699-2168922042
                                                  • Opcode ID: 7653dfadc84f4d2fd0e2aca89bfa6cbb27445b70d837578952bb3e6522ba5fdc
                                                  • Instruction ID: d72251cee2c87af9a7cb6a3a30595b8b0597c38c789139082b4eb5e9bbb71a03
                                                  • Opcode Fuzzy Hash: 7653dfadc84f4d2fd0e2aca89bfa6cbb27445b70d837578952bb3e6522ba5fdc
                                                  • Instruction Fuzzy Hash: 8202B171A006099FCF14DFA8DC91BEE77B9BB88304F10425AF905A7281E7789D85CF5A

                                                  Control-flow Graph

                                                  APIs
                                                  • @cmSerialCommDriver32@TcmUart@MapBaudRatesValue$qqri.Z39UARTASSIST ref: 0043BA87
                                                  • @cmSerialCommDriver32@TcmUart@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST ref: 0043BB25
                                                  • @cmSerialCommDriver32@TcmUart@SetLicense$qqri.Z39UARTASSIST ref: 0043BB39
                                                  • @cmSerialCommDriver32@TcmUart@fSetInBufSize$qqri.Z39UARTASSIST ref: 0043BB48
                                                  • @cmSerialCommDriver32@TcmUart@fSetOutBufSize$qqri.Z39UARTASSIST ref: 0043BB57
                                                  • @cmSerialCommDriver32@TcmUart@SetDatagramMaxLength$qqri.Z39UARTASSIST ref: 0043BB98
                                                  • @cmSerialCommDriver32@TcmUart@SetDatagramPartitionTime$qqri.Z39UARTASSIST ref: 0043BBA9
                                                  • @cmSerialCommDriver32@TcmUart@SetAutoWrap$qqro.Z39UARTASSIST ref: 0043BBD5
                                                  • @cmSerialCommDriver32@TcmUart@LoadSettings$qqr17System@AnsiString.Z39UARTASSIST ref: 0043BBF7
                                                  • @cmSerialCommDriver32@TcmUart@fSetDTR$qqro.Z39UARTASSIST ref: 0043BC1E
                                                  • @cmSerialCommDriver32@TcmUart@fSetRTS$qqro.Z39UARTASSIST ref: 0043BC35
                                                  • @cmSerialCommDriver32@TcmUart@fGetParity$qqrv.Z39UARTASSIST ref: 0043BC7D
                                                  • @cmSerialCommDriver32@TcmUart@fGetDataBits$qqrv.Z39UARTASSIST ref: 0043BC98
                                                  • @cmSerialCommDriver32@TcmUart@fGetStopBits$qqrv.Z39UARTASSIST ref: 0043BCB3
                                                    • Part of subcall function 0043C75C: @Cmcheckbutton@TcmCheckButton@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST ref: 0043C87B
                                                    • Part of subcall function 0043C75C: @Cmcheckbutton@TcmCheckButton@AutoAdjustSize$qv.Z39UARTASSIST(00000000), ref: 0043C8B7
                                                    • Part of subcall function 004720C4: PostMessageA.USER32(?,00000464,00000000,00000000), ref: 004721AA
                                                    • Part of subcall function 004720C4: RegisterDeviceNotificationA.USER32(?,00000020,00000000), ref: 004721F9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommDriver32@Serial$Uart@f$Uart@$AutoBits$qqrvCheckClasses@Cmcheckbutton@ComponentDatagramSize$qqri$AdjustAnsiBaudButton@Button@$bctr$qqrp18DataDeviceLength$qqriLicense$qqriLoadMessageNotificationParity$qqrvPartitionPostR$qqroRatesRegisterS$qqroSettings$qqr17Size$qvStopStringSystem@Time$qqriUart@$bctr$qqrp18Value$qqriWrap$qqro
                                                  • String ID: 11.52$5678$Customize...$NONEODDEVENMARKSPACE$NONEXON/XOFFRTS/CTSDTR/DSRRTS/CTS/XON/XOFFDTR/DSR/XON/XOFF$UartAssist$h
                                                  • API String ID: 2842964971-1447752763
                                                  • Opcode ID: fd334d896ec102cd3222618b030ed368b5457cb5e3f6919cc1f1e7dee5f0bd06
                                                  • Instruction ID: affcc8d9f42149f95959a73eef81fd2fb94bab275bd6e42adfbdb16d29bba79a
                                                  • Opcode Fuzzy Hash: fd334d896ec102cd3222618b030ed368b5457cb5e3f6919cc1f1e7dee5f0bd06
                                                  • Instruction Fuzzy Hash: 66D1F974A001058FCB00EF54D489AADB7F1FF58304F2491BAE9096F366DB35A90ADB95

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 660 43bfc4-43bfec call 559e70 663 43bff7-43c006 660->663 664 43bfee-43bff5 660->664 666 43c032-43c039 @cmSerialCommDriver32@TcmUart@Close$qqrv 663->666 667 43c008-43c013 SetEvent 663->667 664->663 665 43c03e-43c04c 664->665 669 43c073-43c081 665->669 670 43c04e-43c055 665->670 668 43c3bb-43c3c2 666->668 671 43c029-43c030 667->671 674 43c3c4-43c3c9 668->674 675 43c3ce-43c3d8 call 43c3e8 668->675 676 43c083-43c091 669->676 677 43c0e0-43c100 call 52db50 669->677 670->669 673 43c057-43c059 call 43bf00 670->673 671->666 672 43c015-43c024 Sleep call 51d7d0 671->672 672->671 685 43c05e-43c060 673->685 674->675 684 43c3df-43c3e5 675->684 680 43c093-43c09c 676->680 681 43c0cf-43c0db 676->681 690 43c102-43c105 677->690 691 43c107 677->691 687 43c0a6 680->687 688 43c09e-43c0a4 680->688 681->684 685->669 692 43c062-43c06e 685->692 693 43c0ac-43c0b3 687->693 688->693 694 43c10d-43c132 call 568b2c call 568d80 690->694 691->694 692->684 695 43c0b5-43c0bb 693->695 696 43c0bd 693->696 703 43c134-43c137 694->703 704 43c139 694->704 698 43c0c3-43c0ca call 568a48 695->698 696->698 698->681 705 43c13f-43c14e call 4662e4 703->705 704->705 708 43c150-43c231 call 56109c @cmSerialCommDriver32@TcmUart@fSetBaudRate$qqrul @cmSerialCommDriver32@TcmUart@fSetParity$qqr11TCommParity @cmSerialCommDriver32@TcmUart@fSetDataBits$qqr13TCommDataBits @cmSerialCommDriver32@TcmUart@fSetStopBits$qqr13TCommStopBits @cmSerialCommDriver32@TcmUart@fSetFCtrl$qqr12TFlowControl @cmSerialCommDriver32@TcmUart@Open$qqrv 705->708 709 43c16b-43c16f 705->709 728 43c233-43c3b5 call 55d764 call 43c5c8 call 568b2c @cmSerialCommDriver32@TcmUart@SaveSettings$qqr17System@AnsiString call 568d80 * 2 708->728 729 43c29b-43c29f 708->729 711 43c171-43c17a 709->711 712 43c1ad-43c1c7 call 568d80 709->712 714 43c184 711->714 715 43c17c-43c182 711->715 712->684 718 43c18a-43c191 714->718 715->718 720 43c193-43c199 718->720 721 43c19b 718->721 723 43c1a1-43c1a8 call 568a48 720->723 721->723 723->712 728->668 730 43c2a5-43c2b6 call 472238 729->730 731 43c389-43c3a3 call 568d80 729->731 739 43c2f9-43c302 @cmSerialCommDriver32@TcmUart@fGetDataBits$qqrv 730->739 740 43c2b8-43c2c1 730->740 731->684 742 43c304-43c30d @cmSerialCommDriver32@TcmUart@fGetStopBits$qqrv 739->742 743 43c30f-43c318 739->743 744 43c2c3-43c2c9 740->744 745 43c2cb 740->745 742->743 747 43c34d-43c356 742->747 748 43c322 743->748 749 43c31a-43c320 743->749 750 43c2d1-43c2d8 744->750 745->750 754 43c360 747->754 755 43c358-43c35e 747->755 753 43c328-43c32f 748->753 749->753 756 43c2e2 750->756 757 43c2da-43c2e0 750->757 759 43c331-43c337 753->759 760 43c339 753->760 762 43c366-43c36d 754->762 755->762 761 43c2e8-43c2f4 call 568a48 756->761 757->761 764 43c33f-43c34b call 568a48 759->764 760->764 761->731 766 43c377 762->766 767 43c36f-43c375 762->767 764->731 768 43c37d-43c384 call 568a48 766->768 767->768 768->731
                                                  APIs
                                                  • SetEvent.KERNEL32(00000470), ref: 0043C00E
                                                  • Sleep.KERNEL32(00000005,00000470), ref: 0043C017
                                                  • @cmSerialCommDriver32@TcmUart@Close$qqrv.Z39UARTASSIST ref: 0043C034
                                                  • @cmSerialCommDriver32@TcmUart@fSetBaudRate$qqrul.Z39UARTASSIST ref: 0043C164
                                                  • @cmSerialCommDriver32@TcmUart@fSetParity$qqr11TCommParity.Z39UARTASSIST ref: 0043C1DE
                                                  • @cmSerialCommDriver32@TcmUart@fSetDataBits$qqr13TCommDataBits.Z39UARTASSIST ref: 0043C1F5
                                                  • @cmSerialCommDriver32@TcmUart@fSetStopBits$qqr13TCommStopBits.Z39UARTASSIST ref: 0043C20C
                                                  • @cmSerialCommDriver32@TcmUart@fSetFCtrl$qqr12TFlowControl.Z39UARTASSIST ref: 0043C223
                                                  • @cmSerialCommDriver32@TcmUart@Open$qqrv.Z39UARTASSIST ref: 0043C22A
                                                  • @cmSerialCommDriver32@TcmUart@SaveSettings$qqr17System@AnsiString.Z39UARTASSIST ref: 0043C26E
                                                  • @cmSerialCommDriver32@TcmUart@fGetDataBits$qqrv.Z39UARTASSIST ref: 0043C2FB
                                                  • @cmSerialCommDriver32@TcmUart@fGetStopBits$qqrv.Z39UARTASSIST ref: 0043C306
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Comm$Driver32@Serial$Uart@f$DataStopUart@$BitsBits$qqr13Bits$qqrv$AnsiBaudClose$qqrvControlCtrl$qqr12EventFlowOpen$qqrvParityParity$qqr11Rate$qqrulSaveSettings$qqr17SleepStringSystem@
                                                  • String ID: $COM%d$UartAssist
                                                  • API String ID: 280170023-1321719275
                                                  • Opcode ID: 4a485d5cbba37bd7a87e9f2a1160d363c07e4640d0211e4129aa15afa504b640
                                                  • Instruction ID: ba76a419cecc9c9df252450a025dccb89f3bf706ce4b5f19a4d84fdfe03afed5
                                                  • Opcode Fuzzy Hash: 4a485d5cbba37bd7a87e9f2a1160d363c07e4640d0211e4129aa15afa504b640
                                                  • Instruction Fuzzy Hash: 5EC1F330604245DFDB18DB64D4C4BEEB7B1BF49304F10916BE80AA7392DB786D49DB49

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 775 46b70c-46b737 call 559e70 778 46baee-46baf2 775->778 779 46b73d-46b73f 775->779 780 46baf4-46baf9 778->780 781 46bb05-46bb0a 778->781 782 46b745-46b750 779->782 783 46b9ea-46b9ee 779->783 785 46bb14-46bb1a 780->785 786 46bafb-46bb00 call 4a4fc8 780->786 781->785 787 46bb0c-46bb0e 781->787 788 46b758-46b75e 782->788 783->778 784 46b9f4-46ba0b 783->784 789 46ba40-46ba43 784->789 790 46ba0d-46ba3e call 568b2c call 568db0 call 568d80 784->790 791 46bb1c-46bb25 call 558ae0 785->791 792 46bb28-46bb2b 785->792 799 46bb03 786->799 787->785 793 46b760-46b763 788->793 794 46b76f-46b772 788->794 800 46ba45-46ba76 call 568b2c call 568db0 call 568d80 789->800 801 46ba78-46baa4 call 568b2c call 568db0 call 568d80 789->801 837 46baa9-46bab1 790->837 791->792 795 46bb32-46bb38 792->795 793->794 803 46b765-46b768 793->803 796 46b774-46b78c call 559bad 794->796 797 46b752-46b756 794->797 815 46b792-46b7ad call 467f18 796->815 816 46b84f-46b853 796->816 797->788 799->785 800->837 801->837 803->794 805 46b76a-46b76d 803->805 805->794 805->796 815->816 836 46b7b3-46b7c6 call 469588 815->836 822 46b956-46b95a 816->822 823 46b859-46b881 @TcmAutoUpgrader@ReadConfigValue$qqrpc 816->823 826 46b9b7-46b9bb 822->826 827 46b95c-46b960 822->827 830 46b887-46b889 823->830 831 46b93b-46b951 call 568d80 823->831 826->778 840 46b9c1-46b9c9 826->840 827->826 835 46b962-46b96f call 568e7c 827->835 838 46b890 830->838 839 46b88b-46b88e 830->839 831->778 835->826 856 46b971-46b994 835->856 836->816 857 46b7cc-46b849 call 4687ec call 568ba0 call 568db0 call 568d80 @TcmAutoUpgrader@ReadConfigValue$qqrpc call 568db0 call 568d80 836->857 844 46bab7 837->844 845 46bab3-46bab5 837->845 846 46b895-46b8a5 call 466eac 838->846 839->846 847 46b9cf 840->847 848 46b9cb-46b9cd 840->848 852 46babc-46bac0 844->852 845->852 846->831 861 46b8ab-46b8ae 846->861 849 46b9d4-46b9e5 call 568a48 847->849 848->849 849->778 858 46bac7 852->858 859 46bac2-46bac5 852->859 863 46b996-46b998 856->863 864 46b99a 856->864 857->816 896 46b84b 857->896 860 46bacc-46bae8 call 568a48 call 568d80 858->860 859->860 860->778 867 46b917-46b91f 861->867 868 46b8b0-46b8d9 @TcmAutoUpgrader@ReadConfigValue$qqrpc 861->868 869 46b99f-46b9b2 @TcmDownloader@AsyncDownLoad$qqrpct1iynpqqrp14System@TObjectpcipv$vpv 863->869 864->869 874 46b925 867->874 875 46b921-46b923 867->875 872 46b8df 868->872 873 46b8db-46b8dd 868->873 869->795 878 46b8e4-46b8e9 872->878 873->878 879 46b92a-46b936 call 568a48 874->879 875->879 883 46b8f0 878->883 884 46b8eb-46b8ee 878->884 879->831 887 46b8f5-46b915 @TcmAutoUpgrader@NavigateUpgrade$qqripct2 call 568d80 883->887 884->887 887->831 896->816
                                                  APIs
                                                  • @TcmAutoUpgrader@ReadConfigValue$qqrpc.Z39UARTASSIST ref: 0046B825
                                                  • @TcmAutoUpgrader@ReadConfigValue$qqrpc.Z39UARTASSIST ref: 0046B871
                                                  • @TcmAutoUpgrader@ReadConfigValue$qqrpc.Z39UARTASSIST ref: 0046B8C8
                                                  • @TcmAutoUpgrader@NavigateUpgrade$qqripct2.Z39UARTASSIST(0058277B), ref: 0046B8FA
                                                  • @TcmDownloader@AsyncDownLoad$qqrpct1iynpqqrp14System@TObjectpcipv$vpv.Z39UARTASSIST(00000000,?,?,00019000), ref: 0046B9A4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AutoUpgrader@$ConfigReadValue$qqrpc$AsyncDownDownloader@Load$qqrpct1iynpqqrp14NavigateObjectpcipv$vpvSystem@Upgrade$qqripct2
                                                  • String ID: Fail to connect server!$Fail to locate upgrade page!$Fail to read upgrade information!$Fail to read upgrade information!$message$t$url1$version
                                                  • API String ID: 387212806-832274262
                                                  • Opcode ID: 4b04a97d81e62627801e56d9c497b2fd147c0c5fae695deb258bc14f9525bc8f
                                                  • Instruction ID: 8d78701ae245634ab6f12c96e6c941b2b6328d5beba58b2c4c39deb57bbe8849
                                                  • Opcode Fuzzy Hash: 4b04a97d81e62627801e56d9c497b2fd147c0c5fae695deb258bc14f9525bc8f
                                                  • Instruction Fuzzy Hash: 15D16370A00209CBCF15EF94C4857EEBBB5FF44314F14516AD801AB396E7789D8ACB96

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1074 478140-478146 1075 4781bc-4781c7 1074->1075 1076 478148 1074->1076 1085 4781cc-4781ce 1075->1085 1077 47814a-478159 1076->1077 1078 4781b9-4781bb 1076->1078 1080 4781cf-4781df 1077->1080 1081 47815b 1077->1081 1078->1075 1082 4781e1-478203 1080->1082 1083 478250-478251 1080->1083 1084 47815d 1081->1084 1081->1085 1089 478205 1082->1089 1090 478279-47828a 1082->1090 1087 4782b4 1083->1087 1088 478253-478259 1083->1088 1084->1078 1085->1080 1099 4782b5-4782b6 1087->1099 1091 478297-4782a6 1088->1091 1092 47825b 1088->1092 1097 478207-478214 1089->1097 1098 478268-478278 1089->1098 1094 4782e0-4782f7 1090->1094 1095 47828c-478296 1090->1095 1096 4782a7 1091->1096 1093 47825d-47825f 1092->1093 1093->1098 1113 478340-478351 1094->1113 1114 4782f9-4782fd 1094->1114 1095->1091 1100 47830a 1096->1100 1101 4782a9-4782b2 1096->1101 1097->1093 1102 478216-47822c 1097->1102 1098->1090 1103 4782ff-478304 1099->1103 1104 4782b8-4782c0 1099->1104 1107 47830b-47830c 1100->1107 1108 47837a-47837d 1100->1108 1101->1087 1102->1096 1109 47822e-47824e 1102->1109 1106 478305-478309 1103->1106 1110 4782c3-4782cb 1104->1110 1106->1100 1115 478353-478357 1107->1115 1116 47830f 1107->1116 1111 4783e4-4783e8 1108->1111 1112 47837f 1108->1112 1109->1083 1109->1110 1110->1099 1118 4782cd-4782de 1110->1118 1123 4783ed-4783f5 1111->1123 1112->1106 1119 478381-47838d 1112->1119 1113->1115 1122 4783c6-4783d0 1113->1122 1114->1103 1124 4783be-4783c2 1115->1124 1125 478359-478371 1115->1125 1120 478372-478378 1116->1120 1121 478311 1116->1121 1118->1094 1126 478403-47840b 1119->1126 1127 47838f 1119->1127 1120->1108 1120->1123 1121->1107 1130 478313-478317 1121->1130 1129 4783d1-4783df 1122->1129 1131 4783f7-4783fa 1123->1131 1132 4783ff 1123->1132 1128 4783c4 1124->1128 1124->1129 1125->1120 1137 47840e-478422 1126->1137 1135 478400 1127->1135 1136 478391-478393 1127->1136 1128->1122 1138 478442-47846c 1129->1138 1139 4783e1 1129->1139 1130->1113 1133 478470-478481 1131->1133 1134 4783fc 1131->1134 1132->1135 1145 478482-478491 1133->1145 1140 4783fe 1134->1140 1141 47846d-47846f 1134->1141 1135->1126 1136->1137 1142 478395-4783ad 1136->1142 1143 478424-478428 1137->1143 1138->1141 1139->1111 1140->1132 1141->1133 1142->1132 1146 4783af 1142->1146 1143->1145 1147 47842a-478432 1143->1147 1148 4784f4-4784fc call 559e70 1145->1148 1149 478492-478493 1145->1149 1146->1143 1150 4783b1-4783bc 1146->1150 1152 478434-47843f 1147->1152 1153 47849d-47849e 1147->1153 1155 4784fd-478500 1148->1155 1154 478495-47849c 1149->1154 1149->1155 1150->1124 1152->1138 1156 478501-478605 call 4c9040 @cmSerialCommDriver32@TcmUart@SetDatagramMaxLength$qqri @cmSerialCommDriver32@TcmUart@SetDatagramPartitionTime$qqri call 559954 1153->1156 1157 4784a0-4784c6 1153->1157 1154->1153 1155->1156 1167 478607-47860c 1156->1167 1168 47860e 1156->1168 1161 4784ca-4784cb 1157->1161 1162 4784c8-4784c9 1157->1162 1169 478610-478634 1167->1169 1168->1169 1170 478636-47863b 1169->1170 1171 47863d 1169->1171 1172 47863f-478839 CreateEventA * 4 call 559954 CreateEventA call 559954 CreateEventA CreateMutexA * 2 call 468f60 * 2 call 4ca180 call 558cb8 1170->1172 1171->1172 1185 478840-478843 1172->1185 1186 47883b call 5696e9 1172->1186 1186->1185
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b8ace226716800852f712658ad57b38dbea41617156009a71b37e603e51f3515
                                                  • Instruction ID: 84f9610a5f14daf85f821dcf6f951e06386dde3bfbf2d55e278d5580a646cabe
                                                  • Opcode Fuzzy Hash: b8ace226716800852f712658ad57b38dbea41617156009a71b37e603e51f3515
                                                  • Instruction Fuzzy Hash: EF32AA305493C1AFD712CB648AA9B997FB0AF03300F2941DBD4849F2E3D6799E0AD756

                                                  Control-flow Graph

                                                  APIs
                                                  • @cmSerialCommDriver32@TcmUart@SetDatagramMaxLength$qqri.Z39UARTASSIST ref: 00478544
                                                  • @cmSerialCommDriver32@TcmUart@SetDatagramPartitionTime$qqri.Z39UARTASSIST ref: 0047854F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommDatagramDriver32@SerialUart@$Length$qqriPartitionTime$qqri
                                                  • String ID:
                                                  • API String ID: 129507699-0
                                                  • Opcode ID: 8db1af9f65cc043ac36ffa78d7f0e3dd490ba193370632c6b3a3d7b34e0607f5
                                                  • Instruction ID: 8d9e2877218a601bbdee3d069e7bac28b1f50627a02ebd1abd1b10765272caec
                                                  • Opcode Fuzzy Hash: 8db1af9f65cc043ac36ffa78d7f0e3dd490ba193370632c6b3a3d7b34e0607f5
                                                  • Instruction Fuzzy Hash: F5C15834A04289EFEB10CBA8C985B9DBBB2BF45314F2442D8E5546F3D2C771AE06DB45

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1222 469db0-469dc0 1223 469dc2-469dc5 1222->1223 1224 469e08-469e15 gethostname 1222->1224 1223->1224 1225 469dc7-469dd2 inet_addr 1223->1225 1226 469e17-469e22 gethostbyname 1224->1226 1227 469e2b-469e32 1224->1227 1225->1227 1228 469dd4-469ddc gethostbyname 1225->1228 1226->1227 1229 469e24-469e29 1226->1229 1230 469de7-469df1 WSAGetLastError 1228->1230 1231 469dde-469de5 1228->1231 1229->1227 1230->1227 1232 469df3-469e06 MessageBoxA 1230->1232 1231->1227 1232->1227
                                                  APIs
                                                  • inet_addr.WS2_32(?), ref: 00469DC8
                                                  • gethostbyname.WS2_32(?), ref: 00469DD5
                                                  • WSAGetLastError.WS2_32(?,00000000,?), ref: 00469DE7
                                                  • MessageBoxA.USER32(00000000,Either the application has not called WSAStartup, or WSAStartup failed!,warning!,00000000), ref: 00469E01
                                                  • gethostname.WS2_32(?,00000040), ref: 00469E0E
                                                  • gethostbyname.WS2_32(?), ref: 00469E1B
                                                  Strings
                                                  • Either the application has not called WSAStartup, or WSAStartup failed!, xrefs: 00469DFA
                                                  • warning!, xrefs: 00469DF5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: gethostbyname$ErrorLastMessagegethostnameinet_addr
                                                  • String ID: Either the application has not called WSAStartup, or WSAStartup failed!$warning!
                                                  • API String ID: 2360276748-338537607
                                                  • Opcode ID: 4a5bb411cef8ee5223d4fcf7347db644d4b672685caa5f0eebc4ea4963c48acf
                                                  • Instruction ID: f7b26dd89af9ba87d0a28e10178e3b786cb13a13e9ad78bf08d23fc492d4b983
                                                  • Opcode Fuzzy Hash: 4a5bb411cef8ee5223d4fcf7347db644d4b672685caa5f0eebc4ea4963c48acf
                                                  • Instruction Fuzzy Hash: 8201B930B007115AD634FA64CC85F5B779CAF4A720F180256FE059B3D5F7B59C01829A

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1233 474f44-474f6b call 559e70 call 52da24 1238 474f71-474f7d 1233->1238 1239 474f6d-474f6f 1233->1239 1241 47521d-475223 1238->1241 1239->1238 1240 474f82-474f9a 1239->1240 1242 474f9d-475009 call 5572a0 call 557a18 call 52dca0 call 557990 call 52d2e4 call 52d308 call 52d2bc 1240->1242 1258 47503f 1242->1258 1259 47500b-47500d 1242->1259 1261 475041-47504b 1258->1261 1259->1258 1260 47500f-475018 1259->1260 1262 47501f-475028 1260->1262 1263 47501a-47501e 1260->1263 1264 475071-475075 call 52da70 1261->1264 1265 47504d-475064 LoadBitmapA call 557884 1261->1265 1267 47502d-47503d 1262->1267 1268 47502a 1262->1268 1263->1262 1270 47507a-4750bd call 559954 call 52ce7c 1264->1270 1271 475069-47506f call 568a68 1265->1271 1267->1261 1268->1267 1270->1242 1278 4750c3-4750c7 1270->1278 1271->1270 1279 4750cd-4750da 1278->1279 1280 4751ea-475207 call 5157a4 call 52d308 call 52d03c 1278->1280 1282 475102-475149 call 517868 call 517ef0 call 517e94 call 52d03c @TcmForm@limit_max_height$qqrv 1279->1282 1283 4750dc-4750fd call 52d554 call 52c7cc 1279->1283 1296 47520c-475216 call 52ddc0 1280->1296 1302 475170-4751b2 @TcmForm@UpdateLanguage$qqrv 1282->1302 1303 47514b-47516b LoadBitmapA call 557884 call 568a68 1282->1303 1283->1282 1296->1241 1302->1296 1305 4751b4-4751c4 call 558b14 1302->1305 1303->1302 1310 4751c6-4751cf call 473168 1305->1310 1311 4751df 1305->1311 1314 4751d4-4751dd 1310->1314 1313 4751e2-4751e8 1311->1313 1313->1296 1314->1313
                                                  APIs
                                                  • LoadBitmapA.USER32(00584DB8,?), ref: 0047505C
                                                  • @TcmForm@limit_max_height$qqrv.Z39UARTASSIST ref: 00475137
                                                  • LoadBitmapA.USER32(00000000,dlgRestore), ref: 00475159
                                                  • @TcmForm@UpdateLanguage$qqrv.Z39UARTASSIST ref: 00475172
                                                    • Part of subcall function 0052D308: KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406375), ref: 0052D31B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BitmapLoad$CallbackDispatcherForm@Form@limit_max_height$qqrvLanguage$qqrvUpdateUser
                                                  • String ID: TNX$dlgRestore
                                                  • API String ID: 544651310-3375810296
                                                  • Opcode ID: 786e639f11431a9bf004fbd47e293e444c9fed217d89467c9a192528a4e8ce17
                                                  • Instruction ID: 76e32ca136461af6ec5462ead183c2b46d0c92c0beb18625d816a9150b12a576
                                                  • Opcode Fuzzy Hash: 786e639f11431a9bf004fbd47e293e444c9fed217d89467c9a192528a4e8ce17
                                                  • Instruction Fuzzy Hash: D481C430B006059BC715EF78D8857DEBBB2BF89314F10852AE8199B352DB78EC49CB94
                                                  APIs
                                                  • @TcmAutoUpgrader@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST ref: 00413B46
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AutoClasses@ComponentUpgrader@$bctr$qqrp18
                                                  • String ID: .lic$.sys$SYWVSLRYMZWXKN5D$UartAssist
                                                  • API String ID: 1767174355-3925265230
                                                  • Opcode ID: c51413c0943d9153b4270de6d14727a51c4fa3c24425114ab847d36387116547
                                                  • Instruction ID: 5b4d2fb1597114babf07e48923185672c6636c4c84e7b0e94c36f7f3e6db6225
                                                  • Opcode Fuzzy Hash: c51413c0943d9153b4270de6d14727a51c4fa3c24425114ab847d36387116547
                                                  • Instruction Fuzzy Hash: 71A1A270A003098FDB20DFA4C4467EFBBF5FF94301F14866AD445A7292EB749A8A8B55
                                                  APIs
                                                  • @TcmImageSlider@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST(005DFA4C,?), ref: 0043FBE9
                                                  • @TcmImageSlider@SetAutoSwitch$qqro.Z39UARTASSIST ref: 0043FC51
                                                    • Part of subcall function 00472D5C: @TcmImageSlider@SetImageIndex$qqri.Z39UARTASSIST ref: 00472D9C
                                                  • LoadBitmapA.USER32(00000000,ARROW_DOWN), ref: 0043FCE8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Image$Slider@$AutoBitmapClasses@ComponentIndex$qqriLoadSlider@$bctr$qqrp18Switch$qqro
                                                  • String ID: ARROW_DOWN$tQ
                                                  • API String ID: 3707357048-4115951454
                                                  • Opcode ID: c4fbb0bb11ea6d349722d005e690ab56783befd4e7991f6fa54351c85224b9ca
                                                  • Instruction ID: 2fe28a32c84c9de1f3e115c192ac73edaf58ec7e018402a8c398ecf29a51b52b
                                                  • Opcode Fuzzy Hash: c4fbb0bb11ea6d349722d005e690ab56783befd4e7991f6fa54351c85224b9ca
                                                  • Instruction Fuzzy Hash: 914105B46002018FC704DF19C489BDA7BE1BF89314F1481B9ED499F3A6CB71AC45CB58
                                                  APIs
                                                  • GetClassInfoA.USER32(00400000,004CA170,?), ref: 004CA1A1
                                                  • UnregisterClassA.USER32(004CA170,00400000), ref: 004CA1CA
                                                  • RegisterClassA.USER32(00599E68), ref: 004CA1D4
                                                  • CreateWindowExA.USER32(00000080,004CA170,004CA230,80000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 004CA202
                                                  • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 004CA21F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Class$Window$CreateInfoLongRegisterUnregister
                                                  • String ID:
                                                  • API String ID: 3404767174-0
                                                  • Opcode ID: b4b5f28485a0eec4339117ebc11c9e0246c2c2e212f54323818919e9aba29524
                                                  • Instruction ID: d72ff3701615390a4b8b08e856b4be5a2ee587c4053aa131e8f06a4d86a8e495
                                                  • Opcode Fuzzy Hash: b4b5f28485a0eec4339117ebc11c9e0246c2c2e212f54323818919e9aba29524
                                                  • Instruction Fuzzy Hash: 860104B16002097BDB40EF989C85FAA37ACF759308F14421AF500E73A1CA76DC14CBA6
                                                  APIs
                                                  • GetTempPathA.KERNEL32(000000C8,?), ref: 00403933
                                                    • Part of subcall function 00401D40: SHGetSpecialFolderPathA.SHELL32(00000000,?,0000001A,00000000), ref: 00401D67
                                                    • Part of subcall function 00401D40: SHGetSpecialFolderPathA.SHELL32(00000000,?,00000005,00000000,00000000,?,0000001A,00000000), ref: 00401DC0
                                                    • Part of subcall function 00401D40: SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000,00000000,?,00000005,00000000,00000000,?,0000001A,00000000), ref: 00401E19
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Path$FolderSpecial$Temp
                                                  • String ID: .cfg$.log$UartAssist
                                                  • API String ID: 626480183-3365938029
                                                  • Opcode ID: f6b846a0a6e79e600b166edd9878575dbb642f18925264c94308f6d0774ad7e6
                                                  • Instruction ID: 60f97927cab6724e2b6790e0c98158ae5d5b509190a7a3ab15bc19c0bf22b7a9
                                                  • Opcode Fuzzy Hash: f6b846a0a6e79e600b166edd9878575dbb642f18925264c94308f6d0774ad7e6
                                                  • Instruction Fuzzy Hash: 2A71F27091010A8BCF44EF94C4855EEB7B9FF88300F5085A6DC05AB24BEB34DA169F65
                                                  APIs
                                                  • SHGetSpecialFolderPathA.SHELL32(00000000,?,0000001A,00000000), ref: 00401D67
                                                  • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000005,00000000,00000000,?,0000001A,00000000), ref: 00401DC0
                                                  • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000,00000000,?,00000005,00000000,00000000,?,0000001A,00000000), ref: 00401E19
                                                    • Part of subcall function 004D09F4: GetFileAttributesA.KERNEL32(00000000,?,00401E40,00000000,?,00000026,00000000,00000000,?,00000005,00000000,00000000,?,0000001A,00000000), ref: 004D09FF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FolderPathSpecial$AttributesFile
                                                  • String ID: \Cmsoft\
                                                  • API String ID: 3677892563-515973493
                                                  • Opcode ID: ba6cdb7dac1f69c89231a46b1b3f87fc93d03028f354fc557f53515e1cf26839
                                                  • Instruction ID: 2ea6e28b1f421ed5bdc14b1c1b7561322aedee3e6460346c158374f341b35cd3
                                                  • Opcode Fuzzy Hash: ba6cdb7dac1f69c89231a46b1b3f87fc93d03028f354fc557f53515e1cf26839
                                                  • Instruction Fuzzy Hash: 3251937050020A8BDF48DF50C895BEF77B5FF84301F1046A6DC05AB2A6EF74DA5A8B95
                                                  APIs
                                                  • GetClassInfoA.USER32(?,?,?), ref: 005313C4
                                                  • UnregisterClassA.USER32(?,?), ref: 005313EC
                                                  • RegisterClassA.USER32(?), ref: 00531402
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Class$InfoRegisterUnregister
                                                  • String ID: @
                                                  • API String ID: 3749476976-2766056989
                                                  • Opcode ID: 391ad910b9633c1227ea0cd6e2c4cc081225aa32b19b9f4e102c64a867596086
                                                  • Instruction ID: 75bd85e57748565c31252ae2a451ff9ae4c7a8dc3abab3af4326182cd0a37152
                                                  • Opcode Fuzzy Hash: 391ad910b9633c1227ea0cd6e2c4cc081225aa32b19b9f4e102c64a867596086
                                                  • Instruction Fuzzy Hash: A1419D30A007548BDB20DB79CC85B9DBBF9BF45304F0049AAE849DB252DB34AE45CB55
                                                  APIs
                                                  • @TcmTrayIcon@SetHint$qqr17System@AnsiString.Z39UARTASSIST(?,?), ref: 00444C8B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AnsiHint$qqr17Icon@StringSystem@Tray
                                                  • String ID: $@COM$Uart Assistant
                                                  • API String ID: 2457536731-1055707753
                                                  • Opcode ID: 38bc5ada46ced335acfea93927558e0b742794caab6899f0a8065f7028b39873
                                                  • Instruction ID: 5566b2f62ec4657294ae57d1d83151fbd8f66ac325d67570560c10683fd5f9b4
                                                  • Opcode Fuzzy Hash: 38bc5ada46ced335acfea93927558e0b742794caab6899f0a8065f7028b39873
                                                  • Instruction Fuzzy Hash: 44216F70A1114E9BDB00EBA4D5956EEFBF8FF84304F1441AAD805B7342EB345E099BA6
                                                  APIs
                                                  • KillTimer.USER32(?,00000001,00000000,005224FB,?,Lg@,00000000,00000000,?,0052253C,?,0040683A,?,?), ref: 00522499
                                                  • SetTimer.USER32(?,00000001,?,00000000), ref: 005224BB
                                                    • Part of subcall function 004E4E74: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004E4EA5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Timer$KillLoadString
                                                  • String ID: Lg@$lK
                                                  • API String ID: 1423459280-1879983524
                                                  • Opcode ID: f5eba66a2a256b852c7325450c4ff480e53b5344366887b4e2de5bc0a5a612be
                                                  • Instruction ID: f07cb5ea22e75b6977c342b21c10032ee37261db6073d75068fd03a423e7b8d5
                                                  • Opcode Fuzzy Hash: f5eba66a2a256b852c7325450c4ff480e53b5344366887b4e2de5bc0a5a612be
                                                  • Instruction Fuzzy Hash: EB01B134600250BBEF21EF66DD96F553BACFF8A708F810461F9009B2D2D6B9AD40C694
                                                  APIs
                                                  • SendMessageA.USER32(?,00000403,00000000,00000001), ref: 0046C1A9
                                                  • @TcmDownloader@DownLoad$qqrpct1i.Z39UARTASSIST(?), ref: 0046C1DA
                                                  • SendMessageA.USER32(?,00000401,00000000,?), ref: 0046C1F5
                                                  • SendMessageA.USER32(?,00000403,00000000,000000FF), ref: 0046C207
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MessageSend$DownDownloader@Load$qqrpct1i
                                                  • String ID:
                                                  • API String ID: 2784886644-0
                                                  • Opcode ID: 86a510f1ce5307459200a3dbcd980f0e2f693590f1fe3af5b08eb6631e5cdcd0
                                                  • Instruction ID: fd8a86d88c22ef42849b98fb935506d6793c66e4fcefd10b6ceb5b947bbf41e5
                                                  • Opcode Fuzzy Hash: 86a510f1ce5307459200a3dbcd980f0e2f693590f1fe3af5b08eb6631e5cdcd0
                                                  • Instruction Fuzzy Hash: 5011C675644204ABDB14EF64DCC6FA77BA8FB85320F10411AFA01AF2C5D674F901CBA5
                                                  APIs
                                                  • EnumWindows.USER32(0051C8AC), ref: 0051C951
                                                  • GetWindow.USER32(00000003,00000003), ref: 0051C969
                                                  • GetWindowLongA.USER32(00000000,000000EC), ref: 0051C976
                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000213), ref: 0051C9B5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$EnumLongWindows
                                                  • String ID:
                                                  • API String ID: 4191631535-0
                                                  • Opcode ID: b01eaeedbd75122327dd265e311322787d2b611a2ff4fd446c3b95a651b76409
                                                  • Instruction ID: fa88b65eac2ead467a7deb2c086367a9803a46f66d62101f463fde3ce0a7d8fc
                                                  • Opcode Fuzzy Hash: b01eaeedbd75122327dd265e311322787d2b611a2ff4fd446c3b95a651b76409
                                                  • Instruction Fuzzy Hash: E61170316446109FEB10DA2CCCC9F967BD4BB45720F144668F998AF2D6C371AC81CB95
                                                  APIs
                                                  • SelectObject.GDI32(00000000,00000000), ref: 0050BA4A
                                                  • GetDIBColorTable.GDI32(00000000,00000000,00000100,?,00000000,00000000,00000000,?,?,?,0050FE19,?,00000000,?,00000001,00000001), ref: 0050BA5E
                                                  • SelectObject.GDI32(00000000,00000000), ref: 0050BA6A
                                                  • DeleteDC.GDI32(00000000), ref: 0050BA70
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ObjectSelect$ColorDeleteTable
                                                  • String ID:
                                                  • API String ID: 3862836420-0
                                                  • Opcode ID: e9edb0fcb7fac79ff1ce8dfe1cedce4c4b678dfd56608804db71e6aed923a92d
                                                  • Instruction ID: 4845eaeaa98b8c948b3cff1a82d105f14a4c902a7ab083e4718835257cfa9cf5
                                                  • Opcode Fuzzy Hash: e9edb0fcb7fac79ff1ce8dfe1cedce4c4b678dfd56608804db71e6aed923a92d
                                                  • Instruction Fuzzy Hash: DF01926160431166F610A7698C8BF6F7AFCAFC0710F00D819F6848B2D2EB788C4483A6
                                                  APIs
                                                  • @TcmForm@limit_min_size$qqrv.Z39UARTASSIST ref: 004767BA
                                                  • @TcmForm@update_caption$qqrv.Z39UARTASSIST ref: 004767C1
                                                  • @TcmForm@setActive$qqro.Z39UARTASSIST ref: 004767D4
                                                  • @TcmForm@setVisible$qqro.Z39UARTASSIST ref: 004767E7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Form@set$Active$qqroForm@limit_min_size$qqrvForm@update_caption$qqrvVisible$qqro
                                                  • String ID:
                                                  • API String ID: 3762416031-0
                                                  • Opcode ID: 6a9eff0c44b24091fdc30e48a9071f45480bb965cbf72692ad48bd35a456ad2a
                                                  • Instruction ID: ddefb00a51432d6bcc9cfa5c5783428e842e901f90b607f08e083c36eba52a4d
                                                  • Opcode Fuzzy Hash: 6a9eff0c44b24091fdc30e48a9071f45480bb965cbf72692ad48bd35a456ad2a
                                                  • Instruction Fuzzy Hash: 58019271305E008BD324AE38C8886D762D6AB04759F17CC7BE82ECB706C23CDC44975A
                                                  APIs
                                                  • FindResourceA.KERNEL32(00000000,?,?), ref: 004C3FA7
                                                  • LoadResource.KERNEL32(00000000,004C3C34,00000000,?,?,004BF0A0,00000000,00000001,00000000,?,004C3F00,?,?,004C0BBE,00000000), ref: 004C3FC1
                                                  • SizeofResource.KERNEL32(00000000,004C3C34,00000000,004C3C34,00000000,?,?,004BF0A0,00000000,00000001,00000000,?,004C3F00,?,?,004C0BBE), ref: 004C3FDB
                                                  • LockResource.KERNEL32(004C3754,00000000,00000000,004C3C34,00000000,004C3C34,00000000,?,?,004BF0A0,00000000,00000001,00000000,?,004C3F00,?), ref: 004C3FE5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Resource$FindLoadLockSizeof
                                                  • String ID:
                                                  • API String ID: 3473537107-0
                                                  • Opcode ID: cdd4a260ce753f3549bae0ce3defd1324f1235e49adc9a6e2e820eef556a5a90
                                                  • Instruction ID: df57c29b198d3998a09ab1caf22a26722374b18b77c43e79082963ee76c83ebe
                                                  • Opcode Fuzzy Hash: cdd4a260ce753f3549bae0ce3defd1324f1235e49adc9a6e2e820eef556a5a90
                                                  • Instruction Fuzzy Hash: C7F086B76041046F4784EF5D9C41E6BB7ECEE88360310445EF908C7306EA35DE014378
                                                  APIs
                                                    • Part of subcall function 0043FBCC: @TcmImageSlider@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST(005DFA4C,?), ref: 0043FBE9
                                                    • Part of subcall function 0043FBCC: @TcmImageSlider@SetAutoSwitch$qqro.Z39UARTASSIST ref: 0043FC51
                                                    • Part of subcall function 0043FBCC: LoadBitmapA.USER32(00000000,ARROW_DOWN), ref: 0043FCE8
                                                  • LoadBitmapA.USER32(?,ARROW_DOWN), ref: 00447C77
                                                    • Part of subcall function 0043B92C: @cmSerialCommDriver32@TcmUart@MapBaudRatesValue$qqri.Z39UARTASSIST ref: 0043BA87
                                                    • Part of subcall function 0052D308: KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406375), ref: 0052D31B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BitmapImageLoad$AutoBaudCallbackClasses@CommComponentDispatcherDriver32@RatesSerialSlider@Slider@$bctr$qqrp18Switch$qqroUart@UserValue$qqri
                                                  • String ID: ARROW_DOWN$tQ
                                                  • API String ID: 991496356-4115951454
                                                  • Opcode ID: 728b11d45a0597e86cc06ee3f3deb388d3c73c73b09dd816dcb08c1ee80268a6
                                                  • Instruction ID: 582381350d85c8cedba024164d1d53d2986bd07fcda1ed207c2c93c3a911aaf2
                                                  • Opcode Fuzzy Hash: 728b11d45a0597e86cc06ee3f3deb388d3c73c73b09dd816dcb08c1ee80268a6
                                                  • Instruction Fuzzy Hash: FD416C707402059FD700EF28D885B897BA5BF8A714F4481B9FE09AF396CB759C05CB59
                                                  APIs
                                                  • LoadBitmapA.USER32(-00000030,?), ref: 004425FA
                                                  • @TcmTrayIcon@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST(00000000,00000000,-00000030,?,00FF00FF,00000000,005DFA4C,?), ref: 0044261C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BitmapClasses@ComponentIcon@$bctr$qqrp18LoadTray
                                                  • String ID: trayicon_?
                                                  • API String ID: 923571546-4243369420
                                                  • Opcode ID: 4a23a6ba49219edeec4a177a9612af3af1ed332c390af59ebd5c8e3c925e672a
                                                  • Instruction ID: 2e7a3e92229d1bed437facdb2ba5afbb1bb7c8e999b77e9b8a08b99a7c8afb90
                                                  • Opcode Fuzzy Hash: 4a23a6ba49219edeec4a177a9612af3af1ed332c390af59ebd5c8e3c925e672a
                                                  • Instruction Fuzzy Hash: 5431C1746012458FC700DF69E8C4A9DBBE9FFA8318F14506AE808D7362C775A908EB55
                                                  APIs
                                                    • Part of subcall function 0050AF1C: GetClipBox.GDI32(?), ref: 0050AF34
                                                  • DrawTextA.USER32(00000000,00000000,00000000,?,00000C00), ref: 00484F5C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ClipDrawText
                                                  • String ID: YMH$YMH
                                                  • API String ID: 1597010223-2173283484
                                                  • Opcode ID: eb6d24eb4fd5163e62a686a49001d0190d49072d0e0e37e3d628596d4af32fe7
                                                  • Instruction ID: b9f2c97ed5ecfc5ce8c0ddaa353f12bc7988f08c9a35cff4d14074c39466a820
                                                  • Opcode Fuzzy Hash: eb6d24eb4fd5163e62a686a49001d0190d49072d0e0e37e3d628596d4af32fe7
                                                  • Instruction Fuzzy Hash: 9211A270600506EFCB05EF69CD4199EBBF9EF88310B208165B508E7355DB349E00DB54
                                                  APIs
                                                  • @cmSerialCommDriver32@TcmUart@SetDatagramMaxLength$qqri.Z39UARTASSIST(00000000), ref: 0043BF73
                                                  • @cmSerialCommDriver32@TcmUart@SetDatagramPartitionTime$qqri.Z39UARTASSIST(00000000), ref: 0043BF84
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommDatagramDriver32@SerialUart@$Length$qqriPartitionTime$qqri
                                                  • String ID: haY
                                                  • API String ID: 129507699-3621056572
                                                  • Opcode ID: 96d4f4787be285f17a6f401a3ebbcbdd2aae0ffd46e0bb4ba1ea2b8f1dad72a7
                                                  • Instruction ID: 867e17356f263bafc10435d63d7a68c381f8c46d64c9ee668a068561358cf87d
                                                  • Opcode Fuzzy Hash: 96d4f4787be285f17a6f401a3ebbcbdd2aae0ffd46e0bb4ba1ea2b8f1dad72a7
                                                  • Instruction Fuzzy Hash: B811CB34A002158BC310DB9ED885B6EB7F4EB88700F10912BED04EB361EB799D09DBD5
                                                  APIs
                                                  • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020019,?,00000000,004CB68E), ref: 004CB560
                                                  • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020009,?,?,00000000,00000000,00000000,00020019,?,00000000,004CB68E), ref: 004CB5CB
                                                  • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000000,00000000,00020009,?,?,00000000,00000000,00000000,00020019), ref: 004CB630
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: 2b02c59ae5da53de083916c823d179db2d95f9d2ca164074f8a80c1622e527fa
                                                  • Instruction ID: 3f8cdf56003090c51f31f08ea94123940223dcea1ae11d4df3d195243e87d9f2
                                                  • Opcode Fuzzy Hash: 2b02c59ae5da53de083916c823d179db2d95f9d2ca164074f8a80c1622e527fa
                                                  • Instruction Fuzzy Hash: 61419234F04348BFDB11EBA5C842F9EB7B9EF44309F1044AEA850A7391DB799A458789
                                                  APIs
                                                  • @Cmcheckbutton@TcmCheckButton@AutoAdjustSize$qv.Z39UARTASSIST ref: 0047B934
                                                  • @Cmcheckbutton@TcmCheckButton@AutoAdjustSize$qv.Z39UARTASSIST ref: 0047B95A
                                                  • GetCursorPos.USER32 ref: 0047B976
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AdjustAutoButton@CheckCmcheckbutton@Size$qv$Cursor
                                                  • String ID:
                                                  • API String ID: 2643223377-0
                                                  • Opcode ID: 93de43b2fe823f236db8640b46ce969abfbdcfab6acd79970938cf3f8530a741
                                                  • Instruction ID: 5f3ba5be723c93affb0f5429ddc8edcc585363f299f27c0479094c143cb7135f
                                                  • Opcode Fuzzy Hash: 93de43b2fe823f236db8640b46ce969abfbdcfab6acd79970938cf3f8530a741
                                                  • Instruction Fuzzy Hash: 64312BB12082518FD704DF29C488A9AB7E1FF89314F148669FA59CB366CB34DC45CAC6
                                                  APIs
                                                  • GetCursorPos.USER32 ref: 004F1476
                                                  • SendMessageA.USER32(?,00000202,00000000,00000000), ref: 004F14AD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CursorMessageSend
                                                  • String ID:
                                                  • API String ID: 892236991-0
                                                  • Opcode ID: bfa11f4df6fa86122ca27103fc680321c163da11b26de5a1a349ec42031d9b0a
                                                  • Instruction ID: 70a0ff129efcee8e09c306ec8cbb6fcde9b5a9df8cf1f1e2e2e48050ea424675
                                                  • Opcode Fuzzy Hash: bfa11f4df6fa86122ca27103fc680321c163da11b26de5a1a349ec42031d9b0a
                                                  • Instruction Fuzzy Hash: AE21E230700214ABD724AE2CC88977BBBD6AFC5310F14057AFA49DB3E6CA78DC418756
                                                  APIs
                                                  • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0046C14B
                                                  • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0046C163
                                                  • CloseHandle.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0046C169
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleWrite
                                                  • String ID:
                                                  • API String ID: 1065093856-0
                                                  • Opcode ID: 84eda384ea6fd504d39e19ac2e478291bdaf20ceb87f64a61ed369829b144267
                                                  • Instruction ID: 859214e9a14ddd2efa3abd329f5dcf5872b606b0163d96c0a4914da5b5fd8a39
                                                  • Opcode Fuzzy Hash: 84eda384ea6fd504d39e19ac2e478291bdaf20ceb87f64a61ed369829b144267
                                                  • Instruction Fuzzy Hash: 9311A271E40218ABC710DA988CC5FFFB7BCEB8A720F54421AF514A7382D774AD018BA5
                                                  APIs
                                                  • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 0051D74B
                                                  • TranslateMessage.USER32 ref: 0051D7B5
                                                  • DispatchMessageA.USER32 ref: 0051D7BB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$DispatchPeekTranslate
                                                  • String ID:
                                                  • API String ID: 4217535847-0
                                                  • Opcode ID: 7d90905c1a2d051dfd08bfe8d862ff88efeca4cc22973ad0c83326f146be1e49
                                                  • Instruction ID: b0568a4c9e7ac2c6ba382d677c521f33e32fd2d8a14823be9917f6fef2f5c380
                                                  • Opcode Fuzzy Hash: 7d90905c1a2d051dfd08bfe8d862ff88efeca4cc22973ad0c83326f146be1e49
                                                  • Instruction Fuzzy Hash: A001F5243003025AFA31327E18457EAEFB6BFD1B55F144C5AF485972C6C7A55CC28272
                                                  APIs
                                                  • RegisterClipboardFormatA.USER32(TaskbarCreated), ref: 0046C5A6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ClipboardFormatRegister
                                                  • String ID: TaskbarCreated
                                                  • API String ID: 1228543026-2362178303
                                                  • Opcode ID: 954a425eacbe09dfc7b60560e131f452bf49019c631b930f2c3cf85ce5a54cd9
                                                  • Instruction ID: f6c81c610d58dfc6f7ac8e69c2d78dbca26062d2c4a7ee21df80526af3b27d43
                                                  • Opcode Fuzzy Hash: 954a425eacbe09dfc7b60560e131f452bf49019c631b930f2c3cf85ce5a54cd9
                                                  • Instruction Fuzzy Hash: 1D714B38600555CFCB04DF24D4E8B69BBB2FF8A304F1481A9E5099F366DB35A84ACF42
                                                  APIs
                                                  • RegisterClipboardFormatA.USER32(TaskbarCreated), ref: 0046C5A6
                                                    • Part of subcall function 004CA180: GetClassInfoA.USER32(00400000,004CA170,?), ref: 004CA1A1
                                                    • Part of subcall function 004CA180: UnregisterClassA.USER32(004CA170,00400000), ref: 004CA1CA
                                                    • Part of subcall function 004CA180: RegisterClassA.USER32(00599E68), ref: 004CA1D4
                                                    • Part of subcall function 004CA180: CreateWindowExA.USER32(00000080,004CA170,004CA230,80000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 004CA202
                                                    • Part of subcall function 004CA180: SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 004CA21F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Class$RegisterWindow$ClipboardCreateFormatInfoLongUnregister
                                                  • String ID: TaskbarCreated
                                                  • API String ID: 2048240597-2362178303
                                                  • Opcode ID: 54bd17733557eb8712c31db1fc7069ff4a0781975807480b0e83507790cdc2bb
                                                  • Instruction ID: 84f3f56a2ff5270e9b6ee1020c113ce87b5d5a9df934494f80ce5b7c08796db6
                                                  • Opcode Fuzzy Hash: 54bd17733557eb8712c31db1fc7069ff4a0781975807480b0e83507790cdc2bb
                                                  • Instruction Fuzzy Hash: 85613B38600555CFCB04DF28C4E5B597BB2FF8A304F1481A9E5059F366DB35A84ACF82
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tQ
                                                  • API String ID: 0-3345606854
                                                  • Opcode ID: 8b173cb6873df2493ff52245c657106468957c9202dabf5b1faf1a29d2ccc40e
                                                  • Instruction ID: 02edaeec40d0893ac9b15700437199e04cfe80840d0b23f7e9eee6dd54ef63c0
                                                  • Opcode Fuzzy Hash: 8b173cb6873df2493ff52245c657106468957c9202dabf5b1faf1a29d2ccc40e
                                                  • Instruction Fuzzy Hash: 8551A070600A518BD360EB28C485BDFB7F6BF95300F14862AE89D9B391DB75BD41CB54
                                                  APIs
                                                  • PostMessageA.USER32(00000000,00000411,00000065,00000000), ref: 00444A0D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID: \
                                                  • API String ID: 410705778-2967466578
                                                  • Opcode ID: d059550c00ef841420867d6a863729183b87f39f68d897ed5e1fe0eceedc547c
                                                  • Instruction ID: 04aa92b46e86639205120d2680bf215c8caea31aef22c9d4add0d501e9d44ca4
                                                  • Opcode Fuzzy Hash: d059550c00ef841420867d6a863729183b87f39f68d897ed5e1fe0eceedc547c
                                                  • Instruction Fuzzy Hash: D731E031B00985CBEB14DF69D98475AB7A6FBC4304F24C32BE5049B71AD73CAC069B59
                                                  APIs
                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0052DA17
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID: )~R
                                                  • API String ID: 2492992576-4228169949
                                                  • Opcode ID: 3e450580647ac04c52fe3c9217b9489fe8f4b0b89d3e34e1a1c747df32f352d3
                                                  • Instruction ID: 2b489bd349fd00ef9accd65a6c2d7a08998cef0b38985eff922cf8e7109b24d4
                                                  • Opcode Fuzzy Hash: 3e450580647ac04c52fe3c9217b9489fe8f4b0b89d3e34e1a1c747df32f352d3
                                                  • Instruction Fuzzy Hash: CDF0D4362042019FC704DF5CC8C498ABBE5FF89255F0446A8FA89CB356DA32E814CB92
                                                  APIs
                                                  • LoadIconA.USER32(?,switch_link0), ref: 004480AE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: IconLoad
                                                  • String ID: switch_link0
                                                  • API String ID: 2457776203-2620733103
                                                  • Opcode ID: 9fabfde8c29f49198217bef41f79f368541e81712906559d8d1d93c5f926b567
                                                  • Instruction ID: d6daca5b1994c7c7096470100100eb71257ee7b9a1d449740e8dbe0d2c9e469a
                                                  • Opcode Fuzzy Hash: 9fabfde8c29f49198217bef41f79f368541e81712906559d8d1d93c5f926b567
                                                  • Instruction Fuzzy Hash: 36F05470600B01CFC321CBB4FC815793BE5BBA5304F1471259048CB2A2CB35648AB794
                                                  APIs
                                                  • LoadBitmapA.USER32(?,BKMESSAGEBOX), ref: 004766D8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BitmapLoad
                                                  • String ID: BKMESSAGEBOX
                                                  • API String ID: 3581186644-2271451841
                                                  • Opcode ID: 9d29039c26265b71c2315543772c2a098a445370492ce1976225e4897b48adac
                                                  • Instruction ID: 0e750cc71a2cec1f39f9beec53512d1b85125bbabcdfa26060ce5d36e648f0a7
                                                  • Opcode Fuzzy Hash: 9d29039c26265b71c2315543772c2a098a445370492ce1976225e4897b48adac
                                                  • Instruction Fuzzy Hash: 5BC012703801008FC200EBA8C8C5A223BE9BBC9700B208071B808CB22ADA30DC82AB10
                                                  APIs
                                                  • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,?,?,00000000,004CB4D5), ref: 004CB44A
                                                  • RegCreateKeyExA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?,00000000,?,00471527,00000000,004CB4D5), ref: 004CB47E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateOpen
                                                  • String ID:
                                                  • API String ID: 436179556-0
                                                  • Opcode ID: bc8b3193c3fa0f031f6468b7eef3b095f87ab260a8baaaad3b897fae384ce702
                                                  • Instruction ID: ed9b0d5f0600b5e023fda8016cd145f4821dc70da1dea178dffb74f3b1249e4e
                                                  • Opcode Fuzzy Hash: bc8b3193c3fa0f031f6468b7eef3b095f87ab260a8baaaad3b897fae384ce702
                                                  • Instruction Fuzzy Hash: 62318134A046487FDB55DEA5C842F9EB7BCEF44704F5080AEB910E3292DB7C9E058798
                                                  APIs
                                                  • @Cmlabel@TcmLabel@AutoAdjustSize$qqrv.Z39UARTASSIST ref: 00484E4F
                                                  • @Cmlabel@TcmLabel@AutoAdjustSize$qqrv.Z39UARTASSIST ref: 00484E79
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AdjustAutoCmlabel@Label@Size$qqrv
                                                  • String ID:
                                                  • API String ID: 1010207171-0
                                                  • Opcode ID: add862347f0576166b18d4a925d4cd949131b0ff872c4c9bfb7f2d358dc443a2
                                                  • Instruction ID: a00d8a53758b639ac2421685cd8cea20cfd7f3cae203f933393e02752f9c9d93
                                                  • Opcode Fuzzy Hash: add862347f0576166b18d4a925d4cd949131b0ff872c4c9bfb7f2d358dc443a2
                                                  • Instruction Fuzzy Hash: A731DA343041058FCB54EF28C4C8A9AB7B5BF89315F5885B9E8098F36ACB34DC49DB95
                                                  APIs
                                                  • @TcmDownloader@IsBusy$qqrv.Z39UARTASSIST ref: 0046B3E4
                                                  • @TcmDownloader@AsyncDownLoad$qqrpct1iynpqqrp14System@TObjectpcipv$vpv.Z39UARTASSIST(00000000,0046B70C,5653A8C4), ref: 0046B45F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Downloader@$AsyncBusy$qqrvDownLoad$qqrpct1iynpqqrp14Objectpcipv$vpvSystem@
                                                  • String ID:
                                                  • API String ID: 3121067868-0
                                                  • Opcode ID: ba91fdafce6253069a4f729a28ef9d9e88070bbd3752321eac9da1259891d9b7
                                                  • Instruction ID: 38684f47cfbe66ddff54561b17cd3d61bc97610dac1896c1a254500bc5ae9f43
                                                  • Opcode Fuzzy Hash: ba91fdafce6253069a4f729a28ef9d9e88070bbd3752321eac9da1259891d9b7
                                                  • Instruction Fuzzy Hash: A2119A31604600AFD711CB09D454762BBE0FB85365F18406BE908CB3A2EB79ACD5DBD7
                                                  APIs
                                                  • timeSetEvent.WINMM(00000000,0000000A,0047306C,00000000,00000000), ref: 00474A71
                                                  • PostMessageA.USER32(?,00000403,00000000,00000000), ref: 00474A84
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EventMessagePosttime
                                                  • String ID:
                                                  • API String ID: 4144640130-0
                                                  • Opcode ID: 75307048400326636077f8eff0e2e97466718a5a9af51ef8318607406aec5448
                                                  • Instruction ID: 6febfc0a9d7a4c53bcd7f4bc487bbe50933007e8a4338aa2c9a690ea9bdae575
                                                  • Opcode Fuzzy Hash: 75307048400326636077f8eff0e2e97466718a5a9af51ef8318607406aec5448
                                                  • Instruction Fuzzy Hash: 85015271684304ABE714DF49D981F76769CEB84710F20C16BB909DB392C778DE00465A
                                                  APIs
                                                  • @cmSerialCommDriver32@TcmUart@UpdateRegistryOptions$qqr17System@AnsiStringp12TUartOptionso.Z39UARTASSIST ref: 0047AE22
                                                  • @cmSerialCommDriver32@TcmUart@UpdateSettings$qqrp12TUartOptionso.Z39UARTASSIST ref: 0047AE33
                                                    • Part of subcall function 0047A750: @cmSerialCommDriver32@TcmUart@fGetDataBits$qqrv.Z39UARTASSIST ref: 0047A77F
                                                    • Part of subcall function 0047A750: @cmSerialCommDriver32@TcmUart@fGetStopBits$qqrv.Z39UARTASSIST ref: 0047A78D
                                                    • Part of subcall function 0047A750: @cmSerialCommDriver32@TcmUart@fGetParity$qqrv.Z39UARTASSIST ref: 0047A79B
                                                    • Part of subcall function 0047A750: @cmSerialCommDriver32@TcmUart@fGetFCtrl$qqrv.Z39UARTASSIST ref: 0047A7C1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommDriver32@Serial$Uart@f$Bits$qqrvOptionsoUartUart@Update$AnsiCtrl$qqrvDataOptions$qqr17Parity$qqrvRegistrySettings$qqrp12StopStringp12System@
                                                  • String ID:
                                                  • API String ID: 3188443067-0
                                                  • Opcode ID: 5df180073fd6d4427bf5996b105929cd1f2ed3d7ad42175e718887a84fe8da37
                                                  • Instruction ID: 4480583605873f91df851dea090b1c86e5dc016894a8340995fd881b16c23dbc
                                                  • Opcode Fuzzy Hash: 5df180073fd6d4427bf5996b105929cd1f2ed3d7ad42175e718887a84fe8da37
                                                  • Instruction Fuzzy Hash: 8D012870D0024DDBCB00EBA8D0826DDFBB4FF88304F1085AAE81877341E7346A488B95
                                                  APIs
                                                  • Shell_NotifyIcon.SHELL32(00000000,?), ref: 0046C859
                                                    • Part of subcall function 0051D80C: SendMessageA.USER32(?,0000B020,00000000,?), ref: 0051D82E
                                                  • Shell_NotifyIcon.SHELL32(00000002,?), ref: 0046C87E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: IconNotifyShell_$MessageSend
                                                  • String ID:
                                                  • API String ID: 578662085-0
                                                  • Opcode ID: d10957b800cffccf285530679ec7acef548d19f4c935dbc0f76502727f4b5054
                                                  • Instruction ID: e09f3aff214a40739e23f660294edcca86848d6e055405e108217ae354462ba2
                                                  • Opcode Fuzzy Hash: d10957b800cffccf285530679ec7acef548d19f4c935dbc0f76502727f4b5054
                                                  • Instruction Fuzzy Hash: F7F01D71100205AFDB11EF58C8C9BA53B7AAF89300F0440A5FD489F26BD6729C98DB61
                                                  APIs
                                                  • PostMessageA.USER32(00000000,00000160,00000064,00000000), ref: 00472836
                                                  • PostMessageA.USER32(00000000,00000142,00000000,00000000), ref: 0047284C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: 459a85a2902ddd4429fe4c94773aa636d1bf6ba75528e36c1a8b10c99226784c
                                                  • Instruction ID: 12852a02ffe85734140d837e1cddd9e0074c450b38f6eb0ed5d4dbc7271995c9
                                                  • Opcode Fuzzy Hash: 459a85a2902ddd4429fe4c94773aa636d1bf6ba75528e36c1a8b10c99226784c
                                                  • Instruction Fuzzy Hash: 3ED0C9717C171632F62031B82C8BF971D4CAB95B51F100521B205FF1C3C9B8AC4085A8
                                                  APIs
                                                  • RegCloseKey.ADVAPI32(00010000,004CB218,004CB393,004CB218,00000001,004CB2EA,?,?,004714DF), ref: 004CB34D
                                                  • RegFlushKey.ADVAPI32(00010000,004CB218,004CB393,004CB218,00000001,004CB2EA,?,?,004714DF), ref: 004CB355
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseFlush
                                                  • String ID:
                                                  • API String ID: 320916635-0
                                                  • Opcode ID: 49d70cb6d83c1cfff7d9a8c69bfe451f1c2648b3dfb6e6992a916b077f68a598
                                                  • Instruction ID: 8084e6c3cbe987c7772a5e738582763dce1d4d6166db3b89b7de2f91b7b7b13a
                                                  • Opcode Fuzzy Hash: 49d70cb6d83c1cfff7d9a8c69bfe451f1c2648b3dfb6e6992a916b077f68a598
                                                  • Instruction Fuzzy Hash: 86D017A16102808ADF95AE7688CAB42ABDCBB05305F08C4ABAD08CB166EB38C4449664
                                                  APIs
                                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004DFFE5), ref: 004DFD0B
                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004DFFE5), ref: 004DFD32
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Virtual$AllocFree
                                                  • String ID:
                                                  • API String ID: 2087232378-0
                                                  • Opcode ID: 2cb048205fb28d4800b0e8b313862fb39ddb254f61449ce8b6bf4169ce8e8015
                                                  • Instruction ID: 02a6e3d59e058fb4d81e222d9919e47848d7af9ba92967e5a4cd8fdffe88de91
                                                  • Opcode Fuzzy Hash: 2cb048205fb28d4800b0e8b313862fb39ddb254f61449ce8b6bf4169ce8e8015
                                                  • Instruction Fuzzy Hash: BFF02772B017205ADB30966E4C95B5359C5AF89BA0F140073FE4EEF3C9D2654C0A42B5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e21ae51d8db84a9166fdc9452ba03b25bd3c3d8d1c5cb8f80a048ca79fe0892f
                                                  • Instruction ID: 00efc0286c9ae0a5434b860b52ef8c49d69fffec28a1b515b5e1e57a9a33414a
                                                  • Opcode Fuzzy Hash: e21ae51d8db84a9166fdc9452ba03b25bd3c3d8d1c5cb8f80a048ca79fe0892f
                                                  • Instruction Fuzzy Hash: 7071897080D3849FCB068BA09C64AA9BFB4EF03314F1941DBD484DB2A3E7795D49DB96
                                                  APIs
                                                  • @Cmlabel@TFontEffect@CalculateTextSize$qqrp16Graphics@TCanvas17System@AnsiStringrit3.Z39UARTASSIST(?,?,00000000,00484D59), ref: 00484C64
                                                    • Part of subcall function 00484F00: DrawTextA.USER32(00000000,00000000,00000000,?,00000C00), ref: 00484F5C
                                                    • Part of subcall function 0052D308: KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406375), ref: 0052D31B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Text$AnsiCalculateCallbackCanvas17Cmlabel@DispatcherDrawEffect@FontGraphics@Size$qqrp16Stringrit3System@User
                                                  • String ID:
                                                  • API String ID: 1063776006-0
                                                  • Opcode ID: 4d7e78e37ce703ebbefb177bee4e46190806b169e8d47afb61dbac89e2e16e00
                                                  • Instruction ID: 7908767a1f4acc35fdab0e43c9f06fbe46461ad25ae7042f0750e5fbdc6a0ac6
                                                  • Opcode Fuzzy Hash: 4d7e78e37ce703ebbefb177bee4e46190806b169e8d47afb61dbac89e2e16e00
                                                  • Instruction Fuzzy Hash: 41411234A042059FCB01DF68C884BDA77F5BF89300F5589B5ED09DB34AEA399945CB64
                                                  APIs
                                                  • CreateThread.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 0046C2D2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateThread
                                                  • String ID:
                                                  • API String ID: 2422867632-0
                                                  • Opcode ID: 2138a9c5edf82c83713d26bca40990f1c774ddbed62a3cc76a5968e5cfebd956
                                                  • Instruction ID: 79d013c4189c31b2ddfea820e34205dff9b71b3f1009215adb60fb64577fc12f
                                                  • Opcode Fuzzy Hash: 2138a9c5edf82c83713d26bca40990f1c774ddbed62a3cc76a5968e5cfebd956
                                                  • Instruction Fuzzy Hash: 0021B571D00204EBC704DF98D8D5BAB77A8EF89311F14806BFD08E7385E6389941CBA9
                                                  APIs
                                                  • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020019,?,00000000,004CB68E), ref: 004CB560
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: c799e5ebc3e3a7c660fdf9231000d237547befb75a0e9358eea0620a60e3c4dd
                                                  • Instruction ID: fb245e827602cec67f92619fc2f56a5fe5143ce5aaec0e8d1299eddc4e88f4dc
                                                  • Opcode Fuzzy Hash: c799e5ebc3e3a7c660fdf9231000d237547befb75a0e9358eea0620a60e3c4dd
                                                  • Instruction Fuzzy Hash: F421D134E043486FDB11DBA5C852B9EBBB8EB44308F1041BFE810E3792DB799A058789
                                                  APIs
                                                  • WSAStartup.WS2_32(00000202,?), ref: 0046BFF2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Startup
                                                  • String ID:
                                                  • API String ID: 724789610-0
                                                  • Opcode ID: 0667ca9f8a7abcbba1635571275fc4b37f856fa25ebb2852874fcd551c090c80
                                                  • Instruction ID: 374bded947bbfec6331de8d07760a7fdb05dd315b9970df361f105e2776089a7
                                                  • Opcode Fuzzy Hash: 0667ca9f8a7abcbba1635571275fc4b37f856fa25ebb2852874fcd551c090c80
                                                  • Instruction Fuzzy Hash: ED218E34E00208EFCB44DF99D585AADBBF5FF88304F10819AE805AB311E7759E04DB85
                                                  APIs
                                                  • IsChild.USER32(00000000,?), ref: 0051E3A6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Child
                                                  • String ID:
                                                  • API String ID: 3815930669-0
                                                  • Opcode ID: be70638aa4a47541c92aad3d9a520733bd34914afc81dcc84b6d80c9d4aca8e6
                                                  • Instruction ID: 391f26201b2bd2f4cf2597c9a8583fa9010e242f97ab153d63ecefb4fcbfd8c4
                                                  • Opcode Fuzzy Hash: be70638aa4a47541c92aad3d9a520733bd34914afc81dcc84b6d80c9d4aca8e6
                                                  • Instruction Fuzzy Hash: 1901B1316042155BFB15AA79988BBDABF9DBBD0310F14086AFC15DB163DA70ACC1C664
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Capture
                                                  • String ID:
                                                  • API String ID: 1145282425-0
                                                  • Opcode ID: 4e2225999616b2bcca72b261f6613608bddd1b0a1e874650949ead4720dcbd20
                                                  • Instruction ID: 968b8c3910adc404271c970faaa0e5b1f7d4c1c358a2e59cceec9cd94fa6b592
                                                  • Opcode Fuzzy Hash: 4e2225999616b2bcca72b261f6613608bddd1b0a1e874650949ead4720dcbd20
                                                  • Instruction Fuzzy Hash: 67113931300A018FC750EF7DC8C566ABBE4BB98310F458929E599CB252EB38EC418B96
                                                  APIs
                                                  • GetCurrentThreadId.KERNEL32 ref: 00514593
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: 48023f5a6533478af8e195dd68c5ce26afd0626452aef3ccbbb4461c35a124be
                                                  • Instruction ID: 08118e5ec07fbdbf20f705d6979fd754e38489a5ffd0f663f301f134d1232a35
                                                  • Opcode Fuzzy Hash: 48023f5a6533478af8e195dd68c5ce26afd0626452aef3ccbbb4461c35a124be
                                                  • Instruction Fuzzy Hash: 010169B4A05604AFE715CF66EC1295ABFF9F789710B23C477E800D3762E6305900EEA1
                                                  APIs
                                                  • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,?,?,?,?,?), ref: 004CB8EB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: QueryValue
                                                  • String ID:
                                                  • API String ID: 3660427363-0
                                                  • Opcode ID: c5a6459cedb6a396cef1d1857a2a18ec61ea8059fddd49b4f60828099ccf7dfb
                                                  • Instruction ID: 93986161e496f7db3a23093a5b1b3d7b049c3ffe0a20d804acb112e2b0c83a36
                                                  • Opcode Fuzzy Hash: c5a6459cedb6a396cef1d1857a2a18ec61ea8059fddd49b4f60828099ccf7dfb
                                                  • Instruction Fuzzy Hash: 18018F76600108ABDB00DE9ADD81EDFB7ACEB59314F00816BF914DB341DA709E0497A4
                                                  APIs
                                                    • Part of subcall function 0051D4A4: GetWindowTextA.USER32(?,?,00000100), ref: 0051D4C7
                                                  • SetWindowTextA.USER32(?,00000000), ref: 0051D53D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: TextWindow
                                                  • String ID:
                                                  • API String ID: 530164218-0
                                                  • Opcode ID: 76218da25f1adc8176fac39ea1a98231a1291a9669b3736d6c5ad85aa96bc49c
                                                  • Instruction ID: fcf0bfe645433d6f524179e601f04312fffa856bf3df060f35468fea16e90c7f
                                                  • Opcode Fuzzy Hash: 76218da25f1adc8176fac39ea1a98231a1291a9669b3736d6c5ad85aa96bc49c
                                                  • Instruction Fuzzy Hash: EA01F7306006449FEB05EE26C981B997BBDFB44708F914075FD048B112DBB8AE40CA75
                                                  APIs
                                                  • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,004CB93E,?,?,?,?,?,004CB93E), ref: 004CB6DE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: QueryValue
                                                  • String ID:
                                                  • API String ID: 3660427363-0
                                                  • Opcode ID: c73d4068ff8d5debea0b43c598c50b15042cb7c9a00c723963d786a3e4b6f777
                                                  • Instruction ID: efac2d4d10902de8515b535f726d80cbd06d5785bc0328900ee66220fbe19a95
                                                  • Opcode Fuzzy Hash: c73d4068ff8d5debea0b43c598c50b15042cb7c9a00c723963d786a3e4b6f777
                                                  • Instruction Fuzzy Hash: C1F0826630D2846FD704EAAE9D81BAA7B9CDBC5310F04407FF548C7142DA24CD088365
                                                  APIs
                                                  • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,004CB93E,?,?,?,?,?,004CB93E), ref: 004CB6DE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: QueryValue
                                                  • String ID:
                                                  • API String ID: 3660427363-0
                                                  • Opcode ID: 535fe06cd1ee001bbebfa16ee81a287bbc810880671d7ba07a00d9d9593e6f7d
                                                  • Instruction ID: ac59717e0e46012e10881098c17178603c8e6d5c21ec726478456762e826a24e
                                                  • Opcode Fuzzy Hash: 535fe06cd1ee001bbebfa16ee81a287bbc810880671d7ba07a00d9d9593e6f7d
                                                  • Instruction Fuzzy Hash: 87F0A0723091486BE704EAAE9D41FAB77DCEBC5354F00803EB508C3241CA20CC088364
                                                  APIs
                                                  • timeKillEvent.WINMM(?), ref: 004730AA
                                                    • Part of subcall function 004749DC: SendMessageA.USER32(?,00000402,?,?), ref: 004749E7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EventKillMessageSendtime
                                                  • String ID:
                                                  • API String ID: 4074645534-0
                                                  • Opcode ID: 21a2e33ebf19b9b85c77b84d5473e034a5b6661dbe00090d55a1a0ad007c23a3
                                                  • Instruction ID: 9528b6de0cac3a755c29787c818575c14a33e240e116d535b758eede1c0fb041
                                                  • Opcode Fuzzy Hash: 21a2e33ebf19b9b85c77b84d5473e034a5b6661dbe00090d55a1a0ad007c23a3
                                                  • Instruction Fuzzy Hash: 65F015753002059F8B14EE79D8C1DA7B7A9BB88310304C45ABE0D8F35BDA35EC10EB68
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00400000,?,00000105), ref: 004E42FA
                                                    • Part of subcall function 004E4518: GetModuleFileNameA.KERNEL32(00000000,?,00000105,?,0056B0A8), ref: 004E4534
                                                    • Part of subcall function 004E4518: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,?,0056B0A8), ref: 004E4552
                                                    • Part of subcall function 004E4518: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,?,0056B0A8), ref: 004E4570
                                                    • Part of subcall function 004E4518: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 004E458E
                                                    • Part of subcall function 004E4518: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,004E461D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 004E45D7
                                                    • Part of subcall function 004E4518: RegQueryValueExA.ADVAPI32(?,004E4784,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,004E461D,?,80000001), ref: 004E45F5
                                                    • Part of subcall function 004E4518: RegCloseKey.ADVAPI32(?,004E4624,00000000,?,?,00000000,004E461D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 004E4617
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Open$FileModuleNameQueryValue$Close
                                                  • String ID:
                                                  • API String ID: 2796650324-0
                                                  • Opcode ID: 48eab8de734f3a61fa24c0ba5e760a83e3c052988c399fe94a228f4d7c008035
                                                  • Instruction ID: f4e495c994747636938883c9311383bee2fd3a81ec17c1e5645da377667fc0c0
                                                  • Opcode Fuzzy Hash: 48eab8de734f3a61fa24c0ba5e760a83e3c052988c399fe94a228f4d7c008035
                                                  • Instruction Fuzzy Hash: 2AE06D71A002149BCB10DE5888C1A4737D8AB48755F044692FD54DF346D374DD1087D4
                                                  APIs
                                                  • CompareStringA.KERNEL32(00000400,00000001,00000000,00000000,00000000,00000000,00000000,?,00509B6A,00000000,00509BF5,?,00000000,00509C1D,?,00000000), ref: 004D0369
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CompareString
                                                  • String ID:
                                                  • API String ID: 1825529933-0
                                                  • Opcode ID: 68150d349b280c41596f91873128e83922b3e0d45e5f8323743d32af64a6bbae
                                                  • Instruction ID: 039615f67cc7e07cf0cf1953d58878a980fa93ba4305b9d2e6bc7e6fe0ab1217
                                                  • Opcode Fuzzy Hash: 68150d349b280c41596f91873128e83922b3e0d45e5f8323743d32af64a6bbae
                                                  • Instruction Fuzzy Hash: DFD0C9D13146A22BF664B67F0E87F5B049DAB4871EF00002AB318E7243CDDCCE5122AD
                                                  APIs
                                                    • Part of subcall function 0051E43C: KillTimer.USER32(00000000,?,023C2008,0051E615,00000000,0051D6C3,?,?,023C2008,00000001,0051D783,?,?,?,023C2008), ref: 0051E451
                                                  • SetTimer.USER32(00000000,00000000,?,0051C114), ref: 0051E412
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Timer$Kill
                                                  • String ID:
                                                  • API String ID: 3307318486-0
                                                  • Opcode ID: 266c51d8756bf4bec3e0a91d986bc9b328ea645c69bfcf7a5993807c0cbcbc16
                                                  • Instruction ID: 730a0e5042662af6732ed10d6e733dbc7afee7f04e32c7bb993932460157ecd8
                                                  • Opcode Fuzzy Hash: 266c51d8756bf4bec3e0a91d986bc9b328ea645c69bfcf7a5993807c0cbcbc16
                                                  • Instruction Fuzzy Hash: D5E0C2213C022135F614B67E0C4BBEACE99BFD5760F088016F11CD7283EE880C9193EA
                                                  APIs
                                                  • ioctlsocket.WS2_32(?,8004667E,?), ref: 004648DB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ioctlsocket
                                                  • String ID:
                                                  • API String ID: 3577187118-0
                                                  • Opcode ID: cca20b1d861b8ec6a15004c39b30b8a1e3abf4045db7e49d9a4c6f1c87aad1a3
                                                  • Instruction ID: 56bf7d60a6058c91ef8d1df8c86050583d8458bc7dac89a089b3bade9af9799d
                                                  • Opcode Fuzzy Hash: cca20b1d861b8ec6a15004c39b30b8a1e3abf4045db7e49d9a4c6f1c87aad1a3
                                                  • Instruction Fuzzy Hash: 4DD0A77990820CBB4B08DF95E941CAFB7ACDA40250B10801AB80897200F930FF00D758
                                                  APIs
                                                  • GetFileAttributesA.KERNEL32(00000000,?,00401E40,00000000,?,00000026,00000000,00000000,?,00000005,00000000,00000000,?,0000001A,00000000), ref: 004D09FF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: b3fc7f35c54de28a6c42bee5e0de0532837cf396584cd7762f7939cff47ce3f2
                                                  • Instruction ID: 300e7a8e460ad1f9e1df5eea0ab91c53d09569378f56198c287ccfd75d8ddda2
                                                  • Opcode Fuzzy Hash: b3fc7f35c54de28a6c42bee5e0de0532837cf396584cd7762f7939cff47ce3f2
                                                  • Instruction Fuzzy Hash: F7C08CE17113050A6E20A1BD1CC560A02CC5A66239B201B23F038D33D2DAA988133014
                                                  APIs
                                                  • Shell_NotifyIcon.SHELL32(00000001), ref: 0046CF3F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: IconNotifyShell_
                                                  • String ID:
                                                  • API String ID: 1144537725-0
                                                  • Opcode ID: 43e9042e7ae7d10b225046005a07e1390013127c608dcd0a9813de8893623e20
                                                  • Instruction ID: a60c6274da1c6a107105eb56ec3d3ef85fc91e7666b5c6394bb5b6a9211a76aa
                                                  • Opcode Fuzzy Hash: 43e9042e7ae7d10b225046005a07e1390013127c608dcd0a9813de8893623e20
                                                  • Instruction Fuzzy Hash: 54D09EA054438A1EEB45DF6988C97662E886B54318F0450D5A9445E2C7D6AD8CC18B55
                                                  APIs
                                                  • KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406355), ref: 0052D2AB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID:
                                                  • API String ID: 2492992576-0
                                                  • Opcode ID: ac40c839fd6227ace89034c9e654f4c897cbbe73ec792a5847ff29f252a2c55f
                                                  • Instruction ID: bc181a90606ab7d38f46b658b44b4367bab4619e9c75b925b19157faa367132f
                                                  • Opcode Fuzzy Hash: ac40c839fd6227ace89034c9e654f4c897cbbe73ec792a5847ff29f252a2c55f
                                                  • Instruction Fuzzy Hash: C8D092722106209FD360CA6CC8C4B86B7ECAB0D251F0444A9F68ACB611CA62BC448B60
                                                  APIs
                                                  • KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406375), ref: 0052D31B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID:
                                                  • API String ID: 2492992576-0
                                                  • Opcode ID: a777a1537cc027af72afd47e27ccd4fe449e55afcb4200b23fba92df9fea3d2f
                                                  • Instruction ID: f2b3fb9241b74ecc93ec0ecf056d67439511d6f8e134111c01ac77b60141a632
                                                  • Opcode Fuzzy Hash: a777a1537cc027af72afd47e27ccd4fe449e55afcb4200b23fba92df9fea3d2f
                                                  • Instruction Fuzzy Hash: CCD09271210A209FD360CA6CC8C4A93B7FCAF49651F1485A9EA8ACB711CA61BC448BA0
                                                  APIs
                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,004BEF34,004D08E1,004C3B28,005DFA4C,004BEF34,00000001), ref: 004D08D5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: 8ec5e3c88c0237f76707270f008b38c7a321d30340f0c3d04e0e9bf52eaa055e
                                                  • Instruction ID: 18b62e279e95ea9faba5824783b79fc700ebb6e7038944235ff1f6f93aa16b35
                                                  • Opcode Fuzzy Hash: 8ec5e3c88c0237f76707270f008b38c7a321d30340f0c3d04e0e9bf52eaa055e
                                                  • Instruction Fuzzy Hash: 8EC092A03C030132F93025B60DCBF66008C6744F0AFA08425B341FF1C3CCE9A804211C
                                                  APIs
                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00468B3A), ref: 004D0EC9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateDirectory
                                                  • String ID:
                                                  • API String ID: 4241100979-0
                                                  • Opcode ID: 7ef73a48b71fc824145d6316feebe7116aac745409f4ef500c3c728ab090dd3e
                                                  • Instruction ID: 1937ba0205162039cb5ecdeb1deecf5892ff2d2008c662ce92e71e9e9c9159e9
                                                  • Opcode Fuzzy Hash: 7ef73a48b71fc824145d6316feebe7116aac745409f4ef500c3c728ab090dd3e
                                                  • Instruction Fuzzy Hash: 92B092A27643811AEE1039BA0DC6B2A008CE74560BF100836B611C7142D8AAC8442010
                                                  APIs
                                                  • SendMessageA.USER32(?,00000403,?,?), ref: 00474A01
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: de24c0fab84fba1321875525caa1454ac7ed940dfc62654d6e970d898e1e4ba0
                                                  • Instruction ID: f6711d8faedb4d17887247aacd7edbc320ec7ff823056b6537979a4fd09bbe69
                                                  • Opcode Fuzzy Hash: de24c0fab84fba1321875525caa1454ac7ed940dfc62654d6e970d898e1e4ba0
                                                  • Instruction Fuzzy Hash: 77C04CB65842086AD604AA94ED56DB67B5CE794700B004005BB055B141E5A1EA5497A5
                                                  APIs
                                                  • SysAllocStringLen.OLEAUT32(00000000,00000001), ref: 004E323F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocString
                                                  • String ID:
                                                  • API String ID: 2525500382-0
                                                  • Opcode ID: b65a8a474d846ffdf593d3aaa71f5be96cb7044efcf1f3b6ce03a3e0a14a7c88
                                                  • Instruction ID: 289a91bcdc2ad43635eabcf224de73b1a3480b0e97130d85a576be787c4698df
                                                  • Opcode Fuzzy Hash: b65a8a474d846ffdf593d3aaa71f5be96cb7044efcf1f3b6ce03a3e0a14a7c88
                                                  • Instruction Fuzzy Hash: 1EB012383482C360F95229230E09737054C2B41783FC400E36E45D62C3D90CD901547F
                                                  APIs
                                                  • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 004DFEDD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: c440284bb32303a297bb8709e6b9328597e639fae1eec97014ccb617c584de84
                                                  • Instruction ID: f488168d9e4b8508e2ef481ddee7d755072aa17c9bc22881510bcb0ac78be7a7
                                                  • Opcode Fuzzy Hash: c440284bb32303a297bb8709e6b9328597e639fae1eec97014ccb617c584de84
                                                  • Instruction Fuzzy Hash: 60117C72A047419FC320DF29C880A1BBBE5EFC8760F15C97EE5998B766D634AC448689
                                                  APIs
                                                  • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,0051F7BC,00000000,?,004CA21B,?,00406818,00000001), ref: 004CA0E2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 7c6704881ce1b656d6187cb5bd885f90e5525de212e3fc17e5f202c3adb5c2fa
                                                  • Instruction ID: 6780121c4f5152e8dbbce141aa551534d4ed7682f7bbf945e93171cc2d098306
                                                  • Opcode Fuzzy Hash: 7c6704881ce1b656d6187cb5bd885f90e5525de212e3fc17e5f202c3adb5c2fa
                                                  • Instruction Fuzzy Hash: 47114C382403498FC750DF1AC881B42FBE4EB48354F10C53EEA988B785D774E814CBA5
                                                  APIs
                                                    • Part of subcall function 004D5EA0: GetCurrentThreadId.KERNEL32 ref: 004D5EB3
                                                    • Part of subcall function 004D6044: SetEvent.KERNEL32(?,004D61CC,00000000,004D620E), ref: 004D6048
                                                  • Sleep.KERNEL32(00000000,00000000,004D620E), ref: 004D61CE
                                                    • Part of subcall function 004D6038: SetEvent.KERNEL32(?,004D61DB,00000000,00000000,004D620E), ref: 004D603C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Event$CurrentSleepThread
                                                  • String ID:
                                                  • API String ID: 1403007472-0
                                                  • Opcode ID: d143bd57de39c498c0690c66e391f5a0d4f7aaafc2ca824f1c2af78834f9a0e7
                                                  • Instruction ID: 7ca1f725ee9be8ca249aa9ef226a346d727ae7d5a4263596db2934edd0fb724c
                                                  • Opcode Fuzzy Hash: d143bd57de39c498c0690c66e391f5a0d4f7aaafc2ca824f1c2af78834f9a0e7
                                                  • Instruction Fuzzy Hash: 2D110D71A10608DFDB10EB99C651A4DB7F5EF48314F5241E7E4049B362D738AE019B44
                                                  APIs
                                                  • VirtualFree.KERNEL32(?,?,00004000,?,?,?,?,?,004E016B), ref: 004DFF5E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FreeVirtual
                                                  • String ID:
                                                  • API String ID: 1263568516-0
                                                  • Opcode ID: 3476b3654bb8baf6c68b156fdaa9d099ee49ca21148fa1ac3bcac553f71e084c
                                                  • Instruction ID: 882f3b2d01845b8ec7a758dfd27ac5b53017a3a3030b93285bba34a7d7b789b1
                                                  • Opcode Fuzzy Hash: 3476b3654bb8baf6c68b156fdaa9d099ee49ca21148fa1ac3bcac553f71e084c
                                                  • Instruction Fuzzy Hash: 3B012B76608B005FC320DF28DCD0A2A77E4EB9A364F15057FEAC997701C2376C4987A8
                                                  APIs
                                                  • IsWindow.USER32(?), ref: 0047E925
                                                  • SendMessageA.USER32(00000000,00000400,00000400,?), ref: 0047E95D
                                                  • socket.WS2_32(00000002), ref: 0047EA74
                                                  • @TcmSocket@ErrorCheck$qqripc.Z39UARTASSIST(00000002), ref: 0047EA82
                                                  • WSAAsyncSelect.WS2_32(00000011,?,0000040B,000000FF), ref: 0047EAD6
                                                  • @TcmSocket@ErrorCheck$qqripc.Z39UARTASSIST(00000002), ref: 0047EAE4
                                                  • @TcmSocket@Bind$qqrp9TInetAddr.Z39UARTASSIST(00000002), ref: 0047EB8B
                                                  • socket.WS2_32(00000002,00000011,00000011), ref: 0047EC91
                                                  • @TcmSocket@Bind$qqrp9TInetAddr.Z39UARTASSIST(00000002,00000011,00000011,00000002), ref: 0047ECAE
                                                  • @TcmSocket@Listen$qqrp9TInetAddr.Z39UARTASSIST(00000002), ref: 0047EBB0
                                                    • Part of subcall function 0047F808: listen.WS2_32(?,7FFFFFFF), ref: 0047F816
                                                    • Part of subcall function 0047F808: @TcmSocket@ErrorCheck$qqripc.Z39UARTASSIST(?,?,0047ECCB,00000002,00000011,00000011,00000002), ref: 0047F824
                                                  • @TcmSocket@Connect$qqrv.Z39UARTASSIST(00000002), ref: 0047EBC8
                                                  • SetTimer.USER32(?,00000003,00001388,00000000), ref: 0047EBED
                                                  • @TcmSocket@Listen$qqrp9TInetAddr.Z39UARTASSIST(00000002,00000011,00000011,00000002), ref: 0047ECC6
                                                  • WSAAsyncSelect.WS2_32(?,?,0000040B,000000FF), ref: 0047ECE5
                                                  • closesocket.WS2_32(?), ref: 0047ECF8
                                                  • @TcmSocket@DeclareConnect$qqro.Z39UARTASSIST(00000002), ref: 0047ED15
                                                  • WSAAsyncSelect.WS2_32(00000011,?,0000040B,00000000), ref: 0047ED3A
                                                  • closesocket.WS2_32(00000011), ref: 0047ED46
                                                  • SetTimer.USER32(?,00000003,00001388,00000000), ref: 0047ED65
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Socket@$AddrInet$AsyncCheck$qqripcErrorSelect$Bind$qqrp9Listen$qqrp9Timerclosesocketsocket$Connect$qqroConnect$qqrvDeclareMessageSendWindowlisten
                                                  • String ID: Invalid peer address!$WSAAsyncSelect() failed$socket() failed
                                                  • API String ID: 612163734-2671000648
                                                  • Opcode ID: 2c0e2a9486d6be525b501aabffe71be2c100d4ffb1991e6b3fbceef1693884da
                                                  • Instruction ID: bf5fead1ace917ee001b3fe97b3bb1ada5702934c27965b3a6315d3b2e456d34
                                                  • Opcode Fuzzy Hash: 2c0e2a9486d6be525b501aabffe71be2c100d4ffb1991e6b3fbceef1693884da
                                                  • Instruction Fuzzy Hash: 58B1E7702083415ADB20DF25C8C57EA3B55AF45300F18C6FAED4D5F38BD6799889C769
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Authcode$CityId$IMEI$JT808$JT808$JT808$JT808$JT808$JT808$JT808$JT808$JT808$JT808$JT808$JT808$ManufactureId$PlateColor$PlateNo$ProvinceId$SIMID$TTMsgType$TermId$TermType$Version
                                                  • API String ID: 0-1401491031
                                                  • Opcode ID: c444f3167c8bfd05863e93bfbae709d1e8e55476ac579fa9cfb43408423b0fdf
                                                  • Instruction ID: b3d6eb1839173bedd10d2ed7291286e7af09c8418fa9b1d296a9a040d6961fb5
                                                  • Opcode Fuzzy Hash: c444f3167c8bfd05863e93bfbae709d1e8e55476ac579fa9cfb43408423b0fdf
                                                  • Instruction Fuzzy Hash: C932007460011ACFCB54EF94D495AAEB7B9FF88300F2481A6EC05AB35ADB34D916CF61
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID: 0-3916222277
                                                  • Opcode ID: 52c487d9ab9374924c8c790a6d418751881d3fb42649b075133fb565b02b4f71
                                                  • Instruction ID: d4389a8b78e64162bcaad21468772638cab99e6a05f0da5cd053ada2645081e1
                                                  • Opcode Fuzzy Hash: 52c487d9ab9374924c8c790a6d418751881d3fb42649b075133fb565b02b4f71
                                                  • Instruction Fuzzy Hash: 428154702082419BC714DB6CD8C9BA77BE56F84304F18C47EF98D8F296DA749845C767
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,00000000,?,0056B0A8), ref: 004E437D
                                                  • GetProcAddress.KERNEL32(00000000,GetLongPathNameA), ref: 004E438E
                                                  • lstrcpyn.KERNEL32(?,?,?), ref: 004E43BE
                                                  • lstrcpyn.KERNEL32(?,?,?,kernel32.dll,00000000,?,0056B0A8), ref: 004E4422
                                                  • lstrcpyn.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,00000000,?,0056B0A8), ref: 004E4457
                                                  • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,00000000,?,0056B0A8), ref: 004E446A
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,00000001,?,?,?,kernel32.dll,00000000,?,0056B0A8), ref: 004E4477
                                                  • lstrlen.KERNEL32(?,00000000,?,?,?,?,00000001,?,?,?,kernel32.dll,00000000,?,0056B0A8), ref: 004E4483
                                                  • lstrcpyn.KERNEL32(?,?,00000104,?,00000000,?,?,?,?,00000001,?,?,?,kernel32.dll,00000000,?), ref: 004E44B7
                                                  • lstrlen.KERNEL32(?,?,?,00000104,?,00000000,?,?,?,?,00000001,?,?,?,kernel32.dll,00000000), ref: 004E44C3
                                                  • lstrcpyn.KERNEL32(?,?,?,?,?,?,00000104,?,00000000,?,?,?,?,00000001,?,?), ref: 004E44E5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                                  • String ID: GetLongPathNameA$\$kernel32.dll
                                                  • API String ID: 3245196872-1565342463
                                                  • Opcode ID: 20d86f0ed746d5011afe2c76bae699319f2a5218f31a1508e710c8ef66450660
                                                  • Instruction ID: a735121f1a6f590843648d53b0ae9f3552887708a7d94e7c0dcbea27a096b4d7
                                                  • Opcode Fuzzy Hash: 20d86f0ed746d5011afe2c76bae699319f2a5218f31a1508e710c8ef66450660
                                                  • Instruction Fuzzy Hash: 2B419572E0015AABDB20DEE9CD89BDEB7ECEF84301F1541B2E948E7241D6389F418B54
                                                  APIs
                                                    • Part of subcall function 0052D308: KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406375), ref: 0052D31B
                                                    • Part of subcall function 004EFD78: SendMessageA.USER32(00000000,000000CF,?,00000000), ref: 004EFDAB
                                                    • Part of subcall function 0052D298: KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406355), ref: 0052D2AB
                                                  • LoadBitmapA.USER32(?,dlgMax), ref: 0048E6C4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser$BitmapLoadMessageSend
                                                  • String ID: (0000~FFFF)$(00~FF)$...$ASCII$Current TimeSchedule Time$HEX$IMEI$JT/T808-2019JT/T808-2013$NONEBLUEYELLOWBLACKWHITEGREENOTHER$`!I$dlgMax$km/h
                                                  • API String ID: 3179879744-216937404
                                                  • Opcode ID: 23d2eff69bb1f42f75e98df1b90e551f52dfd7a96abe031093c037169daa2b81
                                                  • Instruction ID: b3d0ce734abc189a71b37af80827ef93e129411220bb065dfbdc4c48d9c2dad9
                                                  • Opcode Fuzzy Hash: 23d2eff69bb1f42f75e98df1b90e551f52dfd7a96abe031093c037169daa2b81
                                                  • Instruction Fuzzy Hash: 0AD20A747402059FE724DF18C881F99BBA2BF99704F2085ADE684AB3D2D776AD45CF80
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CountTick
                                                  • String ID: [%s]# RECV %s/%d <<<$[%s]# RECV %s/%d <<<$ASCII$ASCII$D$HEX$HEX$RX:$yyyy-MM-dd HH:mm:ss.ZZZ$yyyy-MM-dd HH:mm:ss.ZZZ
                                                  • API String ID: 536389180-1402463019
                                                  • Opcode ID: 1dcb085205ecfa8b23a77372fc764a526d66813101164722ec64ffc0e33fe9eb
                                                  • Instruction ID: 5184fe3037a242ebaed9cd523be17e814b3790354458b497b8cf47057c0fd0ca
                                                  • Opcode Fuzzy Hash: 1dcb085205ecfa8b23a77372fc764a526d66813101164722ec64ffc0e33fe9eb
                                                  • Instruction Fuzzy Hash: 0A02E370E001859FDB14EB68E9857AE7BF1FF59300F24912BE405AB3A2CB789D49DB14
                                                  APIs
                                                  • closesocket.WS2_32 ref: 00464497
                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004644A7
                                                  • socket.WS2_32(00000002,00000001,00000006), ref: 00464518
                                                  • htons.WS2_32(?), ref: 0046456C
                                                  • bind.WSOCK32(00000000,00000000,00000010), ref: 0046458C
                                                  • listen.WS2_32(00000000,00000040), ref: 0046459D
                                                  • htons.WS2_32(?), ref: 004645CE
                                                  • connect.WS2_32(00000000,00000002,00000010), ref: 004645F4
                                                  • getsockname.WS2_32(00000000,00000000,00000010), ref: 00464628
                                                  • htons.WS2_32(?), ref: 0046463B
                                                  • CreateThread.KERNEL32(00000000,00000000,00469940,?,00000000,00000000), ref: 0046465E
                                                  • closesocket.WS2_32(00000000), ref: 00464669
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: htons$closesocket$CreateObjectSingleThreadWaitbindconnectgetsocknamelistensocket
                                                  • String ID:
                                                  • API String ID: 244315594-0
                                                  • Opcode ID: 7d840ac78ecac260ba2f3430afa983aacff6fc0257cb9caa33ea1f0e24eb714a
                                                  • Instruction ID: ed0a751c129a726b1347668b900618d9afe41d2c85800f59a27ce4aae19eaab4
                                                  • Opcode Fuzzy Hash: 7d840ac78ecac260ba2f3430afa983aacff6fc0257cb9caa33ea1f0e24eb714a
                                                  • Instruction Fuzzy Hash: 93511670900205A6EF209F60C885BBB3B68AFC2714F148197E9155F2D6E7BCC985CB9B
                                                  APIs
                                                    • Part of subcall function 00565180: GetLocalTime.KERNEL32(?,00000000), ref: 0056518E
                                                  • @TcmAutoUpgrader@ReadConfigValue$qqrpc.Z39UARTASSIST ref: 004431DE
                                                    • Part of subcall function 0046B5B8: @TcmAutoUpgrader@ReadConfigValue$qqrpct1pi.Z39UARTASSIST ref: 0046B5EF
                                                  • @TcmAutoUpgrader@ReadConfigValue$qqrpc.Z39UARTASSIST ref: 004432C3
                                                  • @TcmAutoUpgrader@ReadConfigValue$qqrpc.Z39UARTASSIST(00000000), ref: 004432E7
                                                  • @TcmAutoUpgrader@ReadConfigValueAsInteger$qqrpci.Z39UARTASSIST ref: 00443333
                                                  • @TcmAutoUpgrader@ReadConfigValue$qqrpc.Z39UARTASSIST ref: 0044336A
                                                  • @TcmAutoUpgrader@ReadConfigValueAsInteger$qqrpci.Z39UARTASSIST ref: 004433C8
                                                  • @TcmAutoUpgrader@ReadConfigValueAsInteger$qqrpci.Z39UARTASSIST ref: 004433DF
                                                  • @TcmAutoUpgrader@ReadConfigValue$qqrpc.Z39UARTASSIST ref: 00443421
                                                  • @TcmAutoUpgrader@ReadConfigValue$qqrpc.Z39UARTASSIST ref: 00443448
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AutoConfigReadUpgrader@$Value$qqrpc$Integer$qqrpciValue$LocalTimeValue$qqrpct1pi
                                                  • String ID: ,
                                                  • API String ID: 2097396599-3772416878
                                                  • Opcode ID: fefddcb14f072279fb3e2e54e8b711c98e40409236e06671af27ab03c5e3d5a7
                                                  • Instruction ID: a8bd84d10a74ae03627bef0e20f0f9e12db3eee11f886cc9f0f8343a70efbbd4
                                                  • Opcode Fuzzy Hash: fefddcb14f072279fb3e2e54e8b711c98e40409236e06671af27ab03c5e3d5a7
                                                  • Instruction Fuzzy Hash: 7B912B30A0124ACFCB00DFA9D882AEEB7F5FF58304F14552BE405A7262DB786E49DB55
                                                  APIs
                                                  • @cmSerialCommDriver32@TcmUart@SetSyncRequesting$qqro.Z39UARTASSIST(0056B57C), ref: 004AB94A
                                                  • @cmSerialCommDriver32@TcmUart@UpdateSettings$qqrp12TUartOptionso.Z39UARTASSIST(0056B57C), ref: 004AB959
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommDriver32@SerialUart@$OptionsoRequesting$qqroSettings$qqrp12SyncUartUpdate
                                                  • String ID: .bin$.bin$.hex$Error, the file extension used for burning must be hex or bin$Fail to create temporary file %s$Invalid STM32 hexadecimal file format!$wb+
                                                  • API String ID: 1037223047-4287178556
                                                  • Opcode ID: 2ffb6128385333761db60113f4275b5234ee424af81f0c193b17b55d4e9fb2fa
                                                  • Instruction ID: 398c5b3a3fdcdc9c383c448f362336bc53587b1187739a010d6148405f5680ac
                                                  • Opcode Fuzzy Hash: 2ffb6128385333761db60113f4275b5234ee424af81f0c193b17b55d4e9fb2fa
                                                  • Instruction Fuzzy Hash: 3DF19371900209DBCB24DF54C489BAFBBB9FF95300F24862BD8055B286DB75DD0ACB94
                                                  APIs
                                                  • WSAAsyncSelect.WS2_32(?,?,0000040B,00000000), ref: 0047EDD8
                                                  • @TcmSocket@CloseClientAll$qqrv.Z39UARTASSIST(?,?,0000040B,00000000), ref: 0047EDE8
                                                  • @TcmSocket@ClearMultiListenPorts$qqrv.Z39UARTASSIST(?,?,0000040B,00000000), ref: 0047EDEF
                                                  • KillTimer.USER32(?,00000004,?,?,0000040B,00000000), ref: 0047EE18
                                                  • closesocket.WS2_32(?), ref: 0047EE48
                                                  • @TcmSocket@ErrorCheck$qqripc.Z39UARTASSIST(?,?,?,0000040B,00000000), ref: 0047EE56
                                                  • @TcmSocket@DeclareConnect$qqro.Z39UARTASSIST(?,?,?,0000040B,00000000), ref: 0047EE8A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Socket@$All$qqrvAsyncCheck$qqripcClearClientCloseConnect$qqroDeclareErrorKillListenMultiPorts$qqrvSelectTimerclosesocket
                                                  • String ID: closesocket() failed
                                                  • API String ID: 1662043253-2817232341
                                                  • Opcode ID: df87d1ca9904c4ded603ac35ddf25a68bc26585f2ca84c78ace5590605a322b8
                                                  • Instruction ID: 1896f3e6777fccf28f7daf19465ec79c7722fb58e32713e8af0b2adfda89d82f
                                                  • Opcode Fuzzy Hash: df87d1ca9904c4ded603ac35ddf25a68bc26585f2ca84c78ace5590605a322b8
                                                  • Instruction Fuzzy Hash: B121446060828046EF65EE39C4C87DA3A516F45314F1CCAFAED4D5F2DBCB784889C365
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID: ...$...$...$@N$MagicBlack$MagicBlack$MagicBlue$MagicGreen$MagicWhite$h$n$v
                                                  • API String ID: 2492992576-649289671
                                                  • Opcode ID: 96619fae1dff96334e360d59fb353b68c7e1d1bb74343b3333111ee433c80989
                                                  • Instruction ID: 6973011792fd1bbf20d65ae3e84fc5d97fab9c5bf4db5caa77f1817bfb3d2fd6
                                                  • Opcode Fuzzy Hash: 96619fae1dff96334e360d59fb353b68c7e1d1bb74343b3333111ee433c80989
                                                  • Instruction Fuzzy Hash: 916229746002048FD714DF58C885B99B7F2FF89304F2085B9E689AB396CB76AD46CF94
                                                  APIs
                                                  • @TcmButton@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST ref: 0045ACA2
                                                    • Part of subcall function 00477224: @TcmButton@Initialize$qqro.Z39UARTASSIST(?,?,?,?,?,?), ref: 00477264
                                                    • Part of subcall function 0052D308: KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406375), ref: 0052D31B
                                                    • Part of subcall function 0052D298: KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406355), ref: 0052D2AB
                                                  • @TcmButton@SetCheckStyle$qqr31Cmcheckbutton@TCheckButtonStyle.Z39UARTASSIST ref: 0045AD04
                                                  • @TcmButton@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST ref: 0045AD2A
                                                  • @TcmButton@SetCheckStyle$qqr31Cmcheckbutton@TCheckButtonStyle.Z39UARTASSIST ref: 0045AD8C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Check$Button@$ButtonButton@$bctr$qqrp18CallbackClasses@Cmcheckbutton@ComponentDispatcherStyleStyle$qqr31User$Initialize$qqro
                                                  • String ID: 51020305070100$51020305070100$5102050100$+B
                                                  • API String ID: 2182980371-1483634922
                                                  • Opcode ID: 180a50b576a4561859a1ade59edf8fd6211bb85e0e252fe908321bef2183099f
                                                  • Instruction ID: 8ed9f7db4ae9b89a9844b707c4c00cdbeb4759dd17f4ba0a26898370673e0a3b
                                                  • Opcode Fuzzy Hash: 180a50b576a4561859a1ade59edf8fd6211bb85e0e252fe908321bef2183099f
                                                  • Instruction Fuzzy Hash: 68820974B006159FDB14DF18C895B99BBF2BF89304F1081AAE5089F3A6CB71AD46CF85
                                                  APIs
                                                  • htons.WS2_32(?), ref: 0047F431
                                                  • bind.WSOCK32(00000000,?,0000001C,?,?,?,?,00000011,00000011), ref: 0047F458
                                                  • @TcmSocket@ErrorCheck$qqripc.Z39UARTASSIST(00000000,?,0000001C,?,?,?,?,00000011,00000011), ref: 0047F466
                                                    • Part of subcall function 00480C48: WSAGetLastError.WS2_32(00000011,?,00000000,?,0047EA87,00000002), ref: 00480C57
                                                    • Part of subcall function 00480C48: @TcmSocket@ShowError$qqrpci.Z39UARTASSIST(00000011,?,00000000,?,0047EA87,00000002), ref: 00480C93
                                                  • htons.WS2_32(?), ref: 0047F49E
                                                  • bind.WSOCK32(?,?,00000010,?,?,00000011,00000011), ref: 0047F4B0
                                                  • @TcmSocket@ErrorCheck$qqripc.Z39UARTASSIST(?,?,00000010,?,?,00000011,00000011), ref: 0047F4BE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorSocket@$Check$qqripcbindhtons$Error$qqrpciLastShow
                                                  • String ID: bind() failed$bind() failed
                                                  • API String ID: 1914354090-3780940380
                                                  • Opcode ID: c8089c4943388d1b23b30a3e45689e0372321d47098d6e1a8d315a1a35a5cdd5
                                                  • Instruction ID: bd045c4aa398ab43c2ce63866c228c4df7c16ccba3b9e4cc6dbb8a88ca0c3eab
                                                  • Opcode Fuzzy Hash: c8089c4943388d1b23b30a3e45689e0372321d47098d6e1a8d315a1a35a5cdd5
                                                  • Instruction Fuzzy Hash: 1711E67530020192D710AF648882BE637A8BF94700F08883DFE8D9F257EAB998499365
                                                  APIs
                                                  • IsIconic.USER32(?), ref: 0053450F
                                                  • GetWindowPlacement.USER32(?,0000002C,?,?,?,?,?,00477511), ref: 0053452C
                                                  • GetWindowRect.USER32(?), ref: 00534545
                                                  • GetWindowLongA.USER32(?,000000F0), ref: 00534553
                                                  • GetWindowLongA.USER32(?,000000F8), ref: 00534568
                                                  • ScreenToClient.USER32(00000000), ref: 00534575
                                                  • ScreenToClient.USER32(00000000,000000F0), ref: 00534580
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                  • String ID: ,
                                                  • API String ID: 2266315723-3772416878
                                                  • Opcode ID: 062bce4ddb8af3d09a20aba3dcc532953ad879acc416933e8004630ded2ae37b
                                                  • Instruction ID: 3f8da2bd30992103eaa039e9479cbbf3188967a7a8872120db9bb57ba4b57912
                                                  • Opcode Fuzzy Hash: 062bce4ddb8af3d09a20aba3dcc532953ad879acc416933e8004630ded2ae37b
                                                  • Instruction Fuzzy Hash: 52111F71504211AFCB51DF6CC889A9B7BE8BF89310F144668FD58DB245DB35EE048B62
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tcp$udp
                                                  • API String ID: 0-3725065008
                                                  • Opcode ID: 775646c3f9856c43acf1ed93f5ea8f067d7ae8e206cb9104e937b4374192b175
                                                  • Instruction ID: 03e9240f697531876dd95d581780cea518d08815bffc70451724f51c0f1f798d
                                                  • Opcode Fuzzy Hash: 775646c3f9856c43acf1ed93f5ea8f067d7ae8e206cb9104e937b4374192b175
                                                  • Instruction Fuzzy Hash: 52C16C71E0020A9BDB18DFA4D4C4BEFB7B5AF44311F14D12EE909A7390D7B88981CB99
                                                  Strings
                                                  • The channel name already exists, xrefs: 0045E1FF
                                                  • Invalid field offset address, xrefs: 0045E578
                                                  • Frame header matching data is empty, to match any content,you can enter an asterisk *, xrefs: 0045E2D8
                                                  • Invalid header matching data format, xrefs: 0045E3FB
                                                  • big-endian, xrefs: 0045E8B6
                                                  • little-endian, xrefs: 0045E8CD
                                                  • Channel name contains illegal characters, xrefs: 0045E14E
                                                  • Channel name cannot be empty, xrefs: 0045E0C0
                                                  • t, xrefs: 0045E478
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Channel name cannot be empty$Channel name contains illegal characters$Frame header matching data is empty, to match any content,you can enter an asterisk *$Invalid field offset address$Invalid header matching data format$The channel name already exists$big-endian$little-endian$t
                                                  • API String ID: 0-1300215034
                                                  • Opcode ID: a87504d7022f85e64acfda91a3c5f4de7c0bf425432488d2f34ff73aacf996e1
                                                  • Instruction ID: 2c07af6fbcad477540d9c92f0cab32619bdd4bac5ea31a5d06a9b30fed8c65a8
                                                  • Opcode Fuzzy Hash: a87504d7022f85e64acfda91a3c5f4de7c0bf425432488d2f34ff73aacf996e1
                                                  • Instruction Fuzzy Hash: 18528E30900249CBDB14DFA4C485BEEBBB5FF44304F2481AAD809AB396DB749E4ACF55
                                                  APIs
                                                  • GetWindowTextA.USER32(00000000,?,0000FFE3), ref: 00402AC8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: TextWindow
                                                  • String ID: .tmp$Invalid ASCII text file$Invalid hexadecimal format file$Please switch to the serial communication panel first!$t
                                                  • API String ID: 530164218-2917146632
                                                  • Opcode ID: 7816be6852024ff512a2dfa05b263b5d1577024b0cf52d4f10f3dca483d25e21
                                                  • Instruction ID: ef8ad35c72bbbe8c532899e0bbfe3c1c91efa69660ac34f368ced9f6230292ab
                                                  • Opcode Fuzzy Hash: 7816be6852024ff512a2dfa05b263b5d1577024b0cf52d4f10f3dca483d25e21
                                                  • Instruction Fuzzy Hash: 0A52A274A00205CFDB14DF94C989A5EBBB2FF58304F24816AE806AB3D6D7B8DD49CB54
                                                  APIs
                                                  • @Cmbitmap@CMTrimInt$qqriii.Z39UARTASSIST ref: 00488664
                                                  • @Cmbitmap@CMTrimInt$qqriii.Z39UARTASSIST ref: 0048869E
                                                  • @Cmbitmap@CMTrimInt$qqriii.Z39UARTASSIST ref: 004886D8
                                                  • @Cmbitmap@CMTrimInt$qqriii.Z39UARTASSIST ref: 00488769
                                                  • @Cmbitmap@CMIntToByte$qqri.Z39UARTASSIST ref: 004887FE
                                                  • @Cmbitmap@CMIntToByte$qqri.Z39UARTASSIST ref: 00488854
                                                  • @Cmbitmap@CMIntToByte$qqri.Z39UARTASSIST ref: 004888AB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Cmbitmap@$Int$qqriiiTrim$Byte$qqri
                                                  • String ID:
                                                  • API String ID: 3790246660-0
                                                  • Opcode ID: c5c65524e0e30cb3aff15e90174240e043a9950b6f8de5d3d32f8b6d1a52a3d1
                                                  • Instruction ID: 7dadacf52a06f794e14c608e5786ee59fef381635347605e3429478976909483
                                                  • Opcode Fuzzy Hash: c5c65524e0e30cb3aff15e90174240e043a9950b6f8de5d3d32f8b6d1a52a3d1
                                                  • Instruction Fuzzy Hash: AAA131256086828BC709DF2EC8D156BBBE3AFD9208B0DD5A9D8C8CF32BE631D415C755
                                                  APIs
                                                    • Part of subcall function 00411D5C: CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 00411D75
                                                    • Part of subcall function 00411D5C: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00411D87
                                                    • Part of subcall function 00412954: CreateMutexA.KERNEL32(00000000,00000000,00000000,00402BBA), ref: 00412963
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041278B
                                                  • Sleep.KERNEL32(?,000000FF), ref: 0041284A
                                                  • GetTickCount.KERNEL32 ref: 00412851
                                                  • Sleep.KERNEL32(00000032,000000FF), ref: 0041286D
                                                  • GetTickCount.KERNEL32 ref: 0041287F
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,000000FF), ref: 00412799
                                                    • Part of subcall function 00411D94: WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00411DA5
                                                    • Part of subcall function 00411D94: ReleaseMutex.KERNEL32(00000000,00000000,000000FF), ref: 00411DC1
                                                  • ReleaseMutex.KERNEL32(00000000,00000000,000000FF,00000000,000000FF), ref: 00412941
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Mutex$CreateObjectSingleWait$CountReleaseSleepTick$Event
                                                  • String ID:
                                                  • API String ID: 1892305255-0
                                                  • Opcode ID: 92e4857bc4e1330b1d4c39f69a9c524561b7e7de45ed0a08983e0f64faed55e5
                                                  • Instruction ID: e16a0ac95f6cebe6ccc07d66bf837c7ae0074f26d8fbd212df18108b4d587b6e
                                                  • Opcode Fuzzy Hash: 92e4857bc4e1330b1d4c39f69a9c524561b7e7de45ed0a08983e0f64faed55e5
                                                  • Instruction Fuzzy Hash: CD51E5B4E0120587CB14EFACD9856EE3BA9BF58304F14821BE811E7395D7B8CC85D769
                                                  APIs
                                                  • IsIconic.USER32(?), ref: 0051D370
                                                  • SetActiveWindow.USER32(?,?,?,?,0046CE9F,?), ref: 0051D381
                                                  • IsWindowEnabled.USER32(00000000), ref: 0051D3A4
                                                  • NtdllDefWindowProc_A.NTDLL(?,00000112,0000F120,00000000,00000000), ref: 0051D3BD
                                                  • SetWindowPos.USER32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0051D403
                                                  • SetFocus.USER32(00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0051D448
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$ActiveEnabledFocusIconicNtdllProc_
                                                  • String ID:
                                                  • API String ID: 3996302123-0
                                                  • Opcode ID: 5c565a6b22823b98bb7a86f7ba77e4e4bf5f990474ee17303ff88a50a86633dd
                                                  • Instruction ID: 33dcdd0def79de9b2dd915b893a14fad394646566ca208226f9869c97148470f
                                                  • Opcode Fuzzy Hash: 5c565a6b22823b98bb7a86f7ba77e4e4bf5f990474ee17303ff88a50a86633dd
                                                  • Instruction Fuzzy Hash: CA312F707402419BFF14AB68DCC9BA93FA8BB55700F080465B940DF296DBB5FCC48B65
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Iconic
                                                  • String ID: ,$OPTS$SOFTWARE\Cmsoft\$UartAssist
                                                  • API String ID: 110040809-1893013162
                                                  • Opcode ID: 257a7c25a7b90e47d04de9b72e42e34a13d520908235847f66a5104082798734
                                                  • Instruction ID: 5945062cff536aabf4f42445ebbfe31b23d1c31edbad03ef222f8336239235c6
                                                  • Opcode Fuzzy Hash: 257a7c25a7b90e47d04de9b72e42e34a13d520908235847f66a5104082798734
                                                  • Instruction Fuzzy Hash: 1A71F634900245CFDB20DFA4E845AAE77B1FF59304F14807BD8099B762D7749C49EB5A
                                                  APIs
                                                  • @TContextPopupMenu@ShowMemoText$qqr17System@AnsiStringt1.Z39UARTASSIST ref: 0046E375
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AnsiContextMemoMenu@PopupShowStringt1System@Text$qqr17
                                                  • String ID:
                                                  • API String ID: 1308895322-0
                                                  • Opcode ID: e8df8e75237979f095a67e754f635030df749d6ee4a4c237d6086c21de7bf247
                                                  • Instruction ID: 0e4eb99ec45da48bc41f756435db6ed4861746198caef0083f90e1c8659fbad5
                                                  • Opcode Fuzzy Hash: e8df8e75237979f095a67e754f635030df749d6ee4a4c237d6086c21de7bf247
                                                  • Instruction Fuzzy Hash: 2B72407490020ACBDF54DF90C485BEEB7B9FF44304F1085AAD8156B246EB78EA4ACF55
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser$MessageSendhtons
                                                  • String ID: $@N$Modbus-ASCII$Modbus-RTU$Modbus-TCP$Off
                                                  • API String ID: 3398713544-3090986406
                                                  • Opcode ID: 4ced59b7218e9c81481a1714ab2e5165f69512667e2edf050e26560f831460d5
                                                  • Instruction ID: 5441cb6a437e9b62dd03c29e81f7c419b1d58c85d99ab40c770c2ad5b57b564a
                                                  • Opcode Fuzzy Hash: 4ced59b7218e9c81481a1714ab2e5165f69512667e2edf050e26560f831460d5
                                                  • Instruction Fuzzy Hash: 61425F70B002149FDB14DF18C886B9DBBB6BF89304F1481AAE908AF396DBB59D45CF45
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $Cycle Count: $Datalist is empty$Please select data to be send$Prompt$Prompt
                                                  • API String ID: 0-2444284029
                                                  • Opcode ID: 4529477966450953928190bd45007be9090769ebc4887c793bef8149da0b3fb8
                                                  • Instruction ID: 71efde2a9e1547143dece3ae1cb8073a1f6d862757f3b44333be924cf18be617
                                                  • Opcode Fuzzy Hash: 4529477966450953928190bd45007be9090769ebc4887c793bef8149da0b3fb8
                                                  • Instruction Fuzzy Hash: 04B1C030A002058BCB14DF68D4856AEBBF1FF84305F55847AEC09AB357DB389C4ACB59
                                                  APIs
                                                  • IsIconic.USER32(?), ref: 0051D2C0
                                                  • SetActiveWindow.USER32(?,?,?,?,0046CE47,?), ref: 0051D2D8
                                                  • IsWindowEnabled.USER32(00000000), ref: 0051D2FB
                                                  • SetWindowPos.USER32(?,00000000,?,?,?,00000000,00000040,00000000), ref: 0051D324
                                                  • NtdllDefWindowProc_A.NTDLL(?,00000112,0000F020,00000000,?,00000000,?,?,?,00000000,00000040,00000000), ref: 0051D339
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$ActiveEnabledIconicNtdllProc_
                                                  • String ID:
                                                  • API String ID: 1720852555-0
                                                  • Opcode ID: 9de5838a94d9f8a7ca937964f9c242d286fd1f905bbb487cd58d292915eeca42
                                                  • Instruction ID: 125cde5a89a468683b0b76ddfcddbd7c8bc65ae1ed51847f8a77e7455d8cb364
                                                  • Opcode Fuzzy Hash: 9de5838a94d9f8a7ca937964f9c242d286fd1f905bbb487cd58d292915eeca42
                                                  • Instruction Fuzzy Hash: A211D0716402519BEB54EE68C9CAF9A7FE8BF45300F081464BA54DF287D775EC80CB25
                                                  APIs
                                                  • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000000,00000000,?,00000000,00000000,?,0040A6A0), ref: 0040A2D6
                                                  • DeviceIoControl.KERNEL32(00000000,00074080,00000000,00000000,?,00000018,?,00000000), ref: 0040A31B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ControlCreateDeviceFile
                                                  • String ID: \\.\PhysicalDrive0
                                                  • API String ID: 107608037-1180397377
                                                  • Opcode ID: 69ac49dac767b9c5a5a0ec58301470cbab955455701011aaacee87f587d5ad2b
                                                  • Instruction ID: 15ef556b957aa5473e12ed00af2f0bf789a12c7d377a9cc37aaee228e9b3ea0c
                                                  • Opcode Fuzzy Hash: 69ac49dac767b9c5a5a0ec58301470cbab955455701011aaacee87f587d5ad2b
                                                  • Instruction Fuzzy Hash: 01315F7175430126D320D9209C42FEBB7DD9FC4700F04453DBE85AB2C2D9B59A1E83A7
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: htons
                                                  • String ID:
                                                  • API String ID: 4207154920-0
                                                  • Opcode ID: 49489e880ae86dd8efae790329c3336ef38697b48286950a9ed3ade29428f016
                                                  • Instruction ID: c3d1cce189e501a2f00bf73de1f806662b138381fb54eb729d8ae887f25245e7
                                                  • Opcode Fuzzy Hash: 49489e880ae86dd8efae790329c3336ef38697b48286950a9ed3ade29428f016
                                                  • Instruction Fuzzy Hash: F5F1647090020AEBDF08DF94C959BEEBBB4FF44300F14853AE81567791DB74AA49CB95
                                                  APIs
                                                  • @Cmbitmap@CMTrimInt$qqriii.Z39UARTASSIST ref: 004884A4
                                                  • @Cmbitmap@CMTrimInt$qqriii.Z39UARTASSIST ref: 004884C3
                                                  • @Cmbitmap@CMTrimInt$qqriii.Z39UARTASSIST ref: 004884FB
                                                  • @Cmbitmap@CMTrimInt$qqriii.Z39UARTASSIST ref: 0048853E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Cmbitmap@Int$qqriiiTrim
                                                  • String ID:
                                                  • API String ID: 2933748594-0
                                                  • Opcode ID: 4730715f0a96d2ca8b946595bf9d44dbf7568e011c7f2db0bfaed050c550c05a
                                                  • Instruction ID: e5e22c69048473cb83a9671dff21d4ca1f32a0a64a12df74a4051b46ee4c2493
                                                  • Opcode Fuzzy Hash: 4730715f0a96d2ca8b946595bf9d44dbf7568e011c7f2db0bfaed050c550c05a
                                                  • Instruction Fuzzy Hash: 62514C35608A828BC315DF2DC89066BFBE2BF99304B09D86DD4DDC7712EA31E415CB45
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00002002,?,00000000,00554E76,?,?,?,00000000), ref: 00554DD3
                                                  • GlobalLock.KERNEL32(?), ref: 00554DED
                                                  • SetClipboardData.USER32(?,?), ref: 00554E1B
                                                  • GlobalUnlock.KERNEL32(?), ref: 00554E31
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Global$AllocClipboardDataLockUnlock
                                                  • String ID:
                                                  • API String ID: 3735636508-0
                                                  • Opcode ID: 58d2331c7dfd9bee42cdc5ee273676032b26481c64c6ff3dc7bce05f1480ccb8
                                                  • Instruction ID: e077dac6f4af5bdc337164b432d966c29f4d75d3b29949b117540ed1fbe3b7f5
                                                  • Opcode Fuzzy Hash: 58d2331c7dfd9bee42cdc5ee273676032b26481c64c6ff3dc7bce05f1480ccb8
                                                  • Instruction Fuzzy Hash: 0411A575A00604BFD711DF6ACD66C5BBFAEFBC9B14B104469B80493650CA359D90CA51
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser$MessageSend
                                                  • String ID: #$ASCII$HEX$HEXDEC
                                                  • API String ID: 2442846254-1953782257
                                                  • Opcode ID: aa43e3722e09cfc1c17709604cc891ddbf2b00afdbef7fc8c6ffc88fa02966b9
                                                  • Instruction ID: f2b3d71b8512eac2c652169db6fdb1e552763dd46598f2a12d8624944fcfd481
                                                  • Opcode Fuzzy Hash: aa43e3722e09cfc1c17709604cc891ddbf2b00afdbef7fc8c6ffc88fa02966b9
                                                  • Instruction Fuzzy Hash: DB422A74A002449FEB14DF24C885B99BBB6BF49304F1481AAE908AF3D7CBB59D45CF94
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: HEX$HEX$Prompt$TRUE
                                                  • API String ID: 0-3347619030
                                                  • Opcode ID: 63e13ca7ed4dec2e8853ca98f83ff1b0cde5574b6e99b2d00a43e9deaeda70bf
                                                  • Instruction ID: 7146c0f7bd7e2691f524ca70e391fa004b105c8c4ae3158b2a0b22b4f890b9ee
                                                  • Opcode Fuzzy Hash: 63e13ca7ed4dec2e8853ca98f83ff1b0cde5574b6e99b2d00a43e9deaeda70bf
                                                  • Instruction Fuzzy Hash: 35326F70A0020ADBDB14DFA4D489BEEB7B5FF44304F24827AD405A7252DB74AE4ACF95
                                                  APIs
                                                  • @TContextPopupMenu@FindMenuById$qqrs.Z39UARTASSIST ref: 0046D9E3
                                                  • @TContextPopupMenu@SetCharset$qqri.Z39UARTASSIST ref: 0046DA10
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ContextMenu@Popup$Charset$qqriFindId$qqrsMenu
                                                  • String ID: @
                                                  • API String ID: 3951286785-2766056989
                                                  • Opcode ID: 4aeed40276175926b90c87fa3a8bbf462a38ca1edcc6f52d5b30b45b0b45d6c2
                                                  • Instruction ID: c99870707960a2aacdb84fa513f6e9cccc463f925b9a93159b7c3b41cbb241c6
                                                  • Opcode Fuzzy Hash: 4aeed40276175926b90c87fa3a8bbf462a38ca1edcc6f52d5b30b45b0b45d6c2
                                                  • Instruction Fuzzy Hash: 57512D70E04208DBCB14DFA9C5856AEBBF2BF88304F2481AED459AB352DB355E06DB45
                                                  APIs
                                                  • GetLastError.KERNEL32(00000000,0050B32C,?,00000000,?,0050B344,?,0050E5FB,00000000,00000000,?,?,?,0050F030,?,?), ref: 0050B2B0
                                                  • FormatMessageA.KERNEL32(00001000,00000000,00000000,00000400,?,00000100,00000000,00000000,0050B32C,?,00000000,?,0050B344,?,0050E5FB,00000000), ref: 0050B2D6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorFormatLastMessage
                                                  • String ID: lK
                                                  • API String ID: 3479602957-1788595711
                                                  • Opcode ID: e001611b397e1f8a44ccdab7baf9b8c2ed045e1f51d07d905af38ec7bd9220bf
                                                  • Instruction ID: ed14b6c4ac9f409fc1388a2a50febf78a04030c6450c8ee940f451bd40e1bc50
                                                  • Opcode Fuzzy Hash: e001611b397e1f8a44ccdab7baf9b8c2ed045e1f51d07d905af38ec7bd9220bf
                                                  • Instruction Fuzzy Hash: 0901D4706002495BFB25AF218DD2BDD77ACFB98704F9008B5B644961C1DBF4AD808A18
                                                  APIs
                                                  • listen.WS2_32(?,7FFFFFFF), ref: 0047F816
                                                  • @TcmSocket@ErrorCheck$qqripc.Z39UARTASSIST(?,?,0047ECCB,00000002,00000011,00000011,00000002), ref: 0047F824
                                                    • Part of subcall function 00480C48: WSAGetLastError.WS2_32(00000011,?,00000000,?,0047EA87,00000002), ref: 00480C57
                                                    • Part of subcall function 00480C48: @TcmSocket@ShowError$qqrpci.Z39UARTASSIST(00000011,?,00000000,?,0047EA87,00000002), ref: 00480C93
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorSocket@$Check$qqripcError$qqrpciLastShowlisten
                                                  • String ID: listen() failed
                                                  • API String ID: 1328310858-61364607
                                                  • Opcode ID: 0294f4f74bfcadf30ad7e070a47b2f180ac375b34d667e84a4721592f9baa510
                                                  • Instruction ID: 190c78cd7439b0ed126aedaabd41d00878faccc8d7cd060236dfcb0e663b2d0a
                                                  • Opcode Fuzzy Hash: 0294f4f74bfcadf30ad7e070a47b2f180ac375b34d667e84a4721592f9baa510
                                                  • Instruction Fuzzy Hash: 70D02222312400074304B8BC0CC191902CEFF882303204B36B975CB2A1DC28CC020310
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Hv$[v$nv
                                                  • API String ID: 0-1283658982
                                                  • Opcode ID: e1490febc2ab9871e2bbbac3b7e7a561fb88e3ef1ccb1c0853023ce692a8d9ec
                                                  • Instruction ID: 6ed88ccdc9dd01f03435496414eb3e296275f10562e4946063f31d59c03d0ec3
                                                  • Opcode Fuzzy Hash: e1490febc2ab9871e2bbbac3b7e7a561fb88e3ef1ccb1c0853023ce692a8d9ec
                                                  • Instruction Fuzzy Hash: 1EC2E77450021ACFCB54DF20C895AEAB7B5FF89304F1086E6E8095B35AEB34EA56CF51
                                                  APIs
                                                  • @Cmbitmap@TcmBitmap@$bctr$qqrv.Z39UARTASSIST ref: 00487763
                                                  • @Cmbitmap@CMRectHeight$qqrrx11Types@TRect.Z39UARTASSIST ref: 00487770
                                                  • @Cmbitmap@CMRectWidth$qqrrx11Types@TRect.Z39UARTASSIST(00000000), ref: 0048777A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Rect$Cmbitmap@$Types@$Bitmap@$bctr$qqrvHeight$qqrrx11Width$qqrrx11
                                                  • String ID:
                                                  • API String ID: 1273829324-0
                                                  • Opcode ID: a6933ebe6fc286cba5637e0799769c4ca6a212e23685fc57ed65ea8c53dc1fd0
                                                  • Instruction ID: 16d0005debcc13634c5c0991a3644a4bf439951aab7ea169477b906a54cc3e2d
                                                  • Opcode Fuzzy Hash: a6933ebe6fc286cba5637e0799769c4ca6a212e23685fc57ed65ea8c53dc1fd0
                                                  • Instruction Fuzzy Hash: E091243060D3418FC344EF29C98194ABBE1FF98314F159A6EF4888B362D734E945CB96
                                                  APIs
                                                  • @TcmSocket@ClearMultiListenPorts$qqrv.Z39UARTASSIST ref: 0048102C
                                                  • @TcmSocket@AddMultiListenPort$qqri.Z39UARTASSIST ref: 004810AE
                                                  • @TcmSocket@AddMultiListenPort$qqri.Z39UARTASSIST ref: 00481153
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ListenMultiSocket@$Port$qqri$ClearPorts$qqrv
                                                  • String ID:
                                                  • API String ID: 3204701234-0
                                                  • Opcode ID: 2bcb55bbae411beecbe8a7c248f6d0b760d9b7276a10aedf0b5a11def28c94df
                                                  • Instruction ID: 3ed84f76db8eedfcb4c5a17ff71e4a9d7293934285841dbc6bffa7da9565b818
                                                  • Opcode Fuzzy Hash: 2bcb55bbae411beecbe8a7c248f6d0b760d9b7276a10aedf0b5a11def28c94df
                                                  • Instruction Fuzzy Hash: 6241F6352495804AC728AA18C8C477FB3DDAF96741F2C8D6BD1C1C3774D67A8883934A
                                                  APIs
                                                  • GetClipboardData.USER32(00000001), ref: 00554E9E
                                                  • GlobalLock.KERNEL32(00000000), ref: 00554EBE
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00554EEC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Global$ClipboardDataLockUnlock
                                                  • String ID:
                                                  • API String ID: 464912530-0
                                                  • Opcode ID: 489b0ed81f9b97ba1989ea558630da9b630975d29fdf547d0e6b03e9bd7c3703
                                                  • Instruction ID: e4df34a36a0266c9269a3c30cb3ae866d99622ae4bfe7eafafa6113b56df9f5a
                                                  • Opcode Fuzzy Hash: 489b0ed81f9b97ba1989ea558630da9b630975d29fdf547d0e6b03e9bd7c3703
                                                  • Instruction Fuzzy Hash: 66018B30A00204AFCB15DFA9C99AA9EBBF8FB48305F2044A6B905D7691DA749D84CB52
                                                  APIs
                                                  • GetCurrentThreadId.KERNEL32 ref: 0051C174
                                                  • GetCursorPos.USER32(?), ref: 0051C191
                                                  • WaitForSingleObject.KERNEL32(00000000,00000064), ref: 0051C1B1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CurrentCursorObjectSingleThreadWait
                                                  • String ID:
                                                  • API String ID: 1359611202-0
                                                  • Opcode ID: 06feddde360ec1d690c7440b086402a370c4ac1840ea57b70f2a50872f44535d
                                                  • Instruction ID: d278eeacefb025d56790e9620592235fda1fd325bd1aa8599c191b8d9c50bc68
                                                  • Opcode Fuzzy Hash: 06feddde360ec1d690c7440b086402a370c4ac1840ea57b70f2a50872f44535d
                                                  • Instruction Fuzzy Hash: CBF0E9311C4385ABFB14E799EC8ABD87FD9BB84310F000523E1418B292FB72D8C4CA15
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 0046A658
                                                  • Sleep.KERNEL32(00000001,00000000,?,?,0047F925,00000064,00000000), ref: 0046A67F
                                                  • GetTickCount.KERNEL32 ref: 0046A691
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CountTick$Sleep
                                                  • String ID:
                                                  • API String ID: 4250438611-0
                                                  • Opcode ID: ee8a76ba6394b5abecbd923a124169bab5388c6cf4f929442424fc668920272f
                                                  • Instruction ID: 060251e639e4cba7e706e19c30d515a64fb4b5d37509aeccfbd9823627981bf6
                                                  • Opcode Fuzzy Hash: ee8a76ba6394b5abecbd923a124169bab5388c6cf4f929442424fc668920272f
                                                  • Instruction Fuzzy Hash: 50F06521710B1257D62069EDD4C5B56268CAB42354F1C0137B945EB313ECAACC959B9B
                                                  APIs
                                                  • IsIconic.USER32(?), ref: 0046CE8A
                                                    • Part of subcall function 0051D368: IsIconic.USER32(?), ref: 0051D370
                                                    • Part of subcall function 0051D368: SetActiveWindow.USER32(?,?,?,?,0046CE9F,?), ref: 0051D381
                                                    • Part of subcall function 0051D368: IsWindowEnabled.USER32(00000000), ref: 0051D3A4
                                                    • Part of subcall function 0051D368: NtdllDefWindowProc_A.NTDLL(?,00000112,0000F120,00000000,00000000), ref: 0051D3BD
                                                    • Part of subcall function 0051D368: SetWindowPos.USER32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0051D403
                                                    • Part of subcall function 0051D368: SetFocus.USER32(00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0051D448
                                                  • ShowWindow.USER32(?,00000009,?), ref: 0046CEAD
                                                  • SetForegroundWindow.USER32(?), ref: 0046CEBE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$Iconic$ActiveEnabledFocusForegroundNtdllProc_Show
                                                  • String ID:
                                                  • API String ID: 653761443-0
                                                  • Opcode ID: 7d3c2c2fbac0f6479ebfc3e34e328877cc19947ebd95b9528b3a553db734f3b2
                                                  • Instruction ID: 2d1a13ba983381f5c8db94c4d0822db5ef1f4172618c9b02cfc386442a780096
                                                  • Opcode Fuzzy Hash: 7d3c2c2fbac0f6479ebfc3e34e328877cc19947ebd95b9528b3a553db734f3b2
                                                  • Instruction Fuzzy Hash: 75F03AB43406018FC700EFA4C8C9D6273B6BB8D300B1441AAE901DF3A6DB36EC4ACB11
                                                  APIs
                                                  • GetKeyState.USER32(00000010), ref: 0046C9BA
                                                  • GetKeyState.USER32(00000011), ref: 0046C9CA
                                                  • GetKeyState.USER32(00000012), ref: 0046C9DA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: State
                                                  • String ID:
                                                  • API String ID: 1649606143-0
                                                  • Opcode ID: 9732bbef66dc15802298617cf6935fd41756f9ef2bbaab8643e3766ad749a2a8
                                                  • Instruction ID: 55ff236951888be7884e94237187d5c68e9a06042c64ddf2559f2a81fc50fa41
                                                  • Opcode Fuzzy Hash: 9732bbef66dc15802298617cf6935fd41756f9ef2bbaab8643e3766ad749a2a8
                                                  • Instruction Fuzzy Hash: 17E065A448838974EF4462D0894F7FD7F781F50768F00109AF680360C3E9E6120E5177
                                                  APIs
                                                  • WSAAsyncSelect.WS2_32(?,?,0000040B,00000000), ref: 00480FC9
                                                  • closesocket.WS2_32(?), ref: 00480FD2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AsyncSelectclosesocket
                                                  • String ID:
                                                  • API String ID: 3964318154-0
                                                  • Opcode ID: 1bf12ebde5986ac82ed598ee13e13c6759939d1beb90094fcc1ae67b865acd3c
                                                  • Instruction ID: 1ca76fb7db54a666e9e8aed0ab52e9a59d0739474ecdaed611da0440ed71be8e
                                                  • Opcode Fuzzy Hash: 1bf12ebde5986ac82ed598ee13e13c6759939d1beb90094fcc1ae67b865acd3c
                                                  • Instruction Fuzzy Hash: 0801ED716006018FCB24EF68C5C0955BBE6EF89310714C6AAD9158F3AAE774EC45DB94
                                                  APIs
                                                  • ClearCommError.KERNEL32(?,?,?), ref: 004712F6
                                                  • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,?), ref: 0047131A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ClearCommErrorFileRead
                                                  • String ID:
                                                  • API String ID: 2973508916-0
                                                  • Opcode ID: 4572f5e0d098a9642495dce6de1918126f5272f260c002a72654fcb7a40398a8
                                                  • Instruction ID: cf35733ad97f58495d376780886a555652d485b308697651ef56d6b30b133f49
                                                  • Opcode Fuzzy Hash: 4572f5e0d098a9642495dce6de1918126f5272f260c002a72654fcb7a40398a8
                                                  • Instruction Fuzzy Hash: 9CF030722042116BE714A56EDD80DEB77ECAFC5760F048A2EBD4CC7261EA34DD4187A6
                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,?,?,?,004B5704), ref: 004D0BB7
                                                  • GetLastError.KERNEL32(00000000,?,?,?,?,004B5704), ref: 004D0BDC
                                                    • Part of subcall function 004D0B38: FileTimeToLocalFileTime.KERNEL32(?), ref: 004D0B65
                                                    • Part of subcall function 004D0B38: FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 004D0B74
                                                    • Part of subcall function 004D0C10: FindClose.KERNEL32(?,?,004D0BDA,00000000,?,?,?,?,004B5704), ref: 004D0C1C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileTime$Find$CloseDateErrorFirstLastLocal
                                                  • String ID:
                                                  • API String ID: 976985129-0
                                                  • Opcode ID: 880a81fea940de465c861742abe3a1fe71a004a376ab38bfbb8858fb0cea0d3d
                                                  • Instruction ID: 4b596efb02e998a742e2a97fa217e1af359641137d7f34f3e0af67ee837ff139
                                                  • Opcode Fuzzy Hash: 880a81fea940de465c861742abe3a1fe71a004a376ab38bfbb8858fb0cea0d3d
                                                  • Instruction Fuzzy Hash: 38E02B76B09121074724AEBE0C9529F65CC9A85B78708037BF914EF342C93CCC0243E5
                                                  APIs
                                                  • IsIconic.USER32(?), ref: 0046CE32
                                                    • Part of subcall function 0051D2B8: IsIconic.USER32(?), ref: 0051D2C0
                                                    • Part of subcall function 0051D2B8: SetActiveWindow.USER32(?,?,?,?,0046CE47,?), ref: 0051D2D8
                                                    • Part of subcall function 0051D2B8: IsWindowEnabled.USER32(00000000), ref: 0051D2FB
                                                    • Part of subcall function 0051D2B8: SetWindowPos.USER32(?,00000000,?,?,?,00000000,00000040,00000000), ref: 0051D324
                                                    • Part of subcall function 0051D2B8: NtdllDefWindowProc_A.NTDLL(?,00000112,0000F020,00000000,?,00000000,?,?,?,00000000,00000040,00000000), ref: 0051D339
                                                  • ShowWindow.USER32(?,00000000), ref: 0046CE5B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$Iconic$ActiveEnabledNtdllProc_Show
                                                  • String ID:
                                                  • API String ID: 1578708594-0
                                                  • Opcode ID: 24c74bd01a38de346760989b8a72f0bfbb8059b8987b0964330e82b5f63acf5c
                                                  • Instruction ID: 870e22f45357aca25dd2f7fc53240f8adaa6cd85acbd996c24ff2c9c9f180bf8
                                                  • Opcode Fuzzy Hash: 24c74bd01a38de346760989b8a72f0bfbb8059b8987b0964330e82b5f63acf5c
                                                  • Instruction Fuzzy Hash: E1F0F8753002018FDB50EF68C4C8B6677B5BB5E300F5441A6E908EF3A6DB75E888DB15
                                                  APIs
                                                  • GetVersion.KERNEL32(?,00563528,?,00000000,?,?,00558B81,00558BA4,?,00000000,00558BFC,00000001), ref: 0056346A
                                                  • GetCurrentThreadId.KERNEL32 ref: 00563489
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CurrentThreadVersion
                                                  • String ID:
                                                  • API String ID: 888907627-0
                                                  • Opcode ID: ff1b8a62a1a32cb7afdc757f981d6f63f7a64cd21003b2bc52665c120acf5b6c
                                                  • Instruction ID: 49037cd221d902febeb98172226a295442336a61dae5d5745e0fa8e6a3e0909e
                                                  • Opcode Fuzzy Hash: ff1b8a62a1a32cb7afdc757f981d6f63f7a64cd21003b2bc52665c120acf5b6c
                                                  • Instruction Fuzzy Hash: A9E012A1A1861157EF26263C854D73AA98AF7C5373F614A2AB080C72CEDE78C9C1E255
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: +$IoF
                                                  • API String ID: 0-1576203491
                                                  • Opcode ID: e98707ab777a4609972d2f351936b811216847aeb0a7b6d90700142fec381d3f
                                                  • Instruction ID: 3d2a05330d0c14eab21707283620375d4cec3f8259f5446c50b18bb518f984d1
                                                  • Opcode Fuzzy Hash: e98707ab777a4609972d2f351936b811216847aeb0a7b6d90700142fec381d3f
                                                  • Instruction Fuzzy Hash: B9226B71D04209DFDF28CF98C8A57AEBFB1BF85312F24459AD815A7281D3749A89CB60
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: D$Not found "
                                                  • API String ID: 0-1839852998
                                                  • Opcode ID: ec0794faaeb50f8aaf5ac46c8f4a7a18e04887f272a58e6ddb0e8bd4b1758bfe
                                                  • Instruction ID: d8901d85db32938ab7994d813a480ba71ef4b2d076c985d52fbd2038d6736ddd
                                                  • Opcode Fuzzy Hash: ec0794faaeb50f8aaf5ac46c8f4a7a18e04887f272a58e6ddb0e8bd4b1758bfe
                                                  • Instruction Fuzzy Hash: 3DD18E70A042499BDB10DFA4D449BEEFBB1FF44304F24816AE445AB396EB349D4ECB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID: NONE$Shortcut key
                                                  • API String ID: 2492992576-2870846253
                                                  • Opcode ID: c29f8e03116a9119ebb1235037b0b32f96d163ddde7c68e3de01c25ac5181c3c
                                                  • Instruction ID: 16dfddaa8b50ea9b002e4e627b45a5ffb19be09804c02ee6e10a1187959fcea6
                                                  • Opcode Fuzzy Hash: c29f8e03116a9119ebb1235037b0b32f96d163ddde7c68e3de01c25ac5181c3c
                                                  • Instruction Fuzzy Hash: 97D1C674600205CFDB14DF54C886AAAB7F1FF98300F24927AD8029B3A6DB35ED4ADB55
                                                  APIs
                                                  • @TcmSocket@WSAStartup$qqrv.Z39UARTASSIST ref: 0047D0DA
                                                    • Part of subcall function 004CA180: GetClassInfoA.USER32(00400000,004CA170,?), ref: 004CA1A1
                                                    • Part of subcall function 004CA180: UnregisterClassA.USER32(004CA170,00400000), ref: 004CA1CA
                                                    • Part of subcall function 004CA180: RegisterClassA.USER32(00599E68), ref: 004CA1D4
                                                    • Part of subcall function 004CA180: CreateWindowExA.USER32(00000080,004CA170,004CA230,80000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 004CA202
                                                    • Part of subcall function 004CA180: SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 004CA21F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Class$Window$CreateInfoLongRegisterSocket@Startup$qqrvUnregister
                                                  • String ID:
                                                  • API String ID: 506659260-0
                                                  • Opcode ID: bcfc240beba05b0b99f9b1a7189c87dc4358fc1b5386648908aaa10319fd2190
                                                  • Instruction ID: 3dcc687a8482c0fc19a2d8ac13b3aa884233653d286cbc25769d5c9c2940d2c5
                                                  • Opcode Fuzzy Hash: bcfc240beba05b0b99f9b1a7189c87dc4358fc1b5386648908aaa10319fd2190
                                                  • Instruction Fuzzy Hash: 68A1FA74A04651CFDB08CF29C4D5B557BE2BF8A304F1881F9D1098F3AAD771A84ACB56
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: \
                                                  • API String ID: 0-2967466578
                                                  • Opcode ID: 0bf937c3ab052662f3970d9552de3499b178c677ba8159b0fd3a44f1405b8964
                                                  • Instruction ID: 0cb21788426ea55a55693d0181be014dcd6e0cfa3cf0b6cd8e79112269ea2c37
                                                  • Opcode Fuzzy Hash: 0bf937c3ab052662f3970d9552de3499b178c677ba8159b0fd3a44f1405b8964
                                                  • Instruction Fuzzy Hash: ABD1A130A00206DFDB10EF68C4856AEBBB1FF49305F14816BEC05A7762DB34AC4ADB95
                                                  APIs
                                                  • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 0052246D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: NtdllProc_Window
                                                  • String ID:
                                                  • API String ID: 4255912815-0
                                                  • Opcode ID: 417b2f96a0ae8936e95e97938c470214b07730a809a446bb35a007eac9da92d5
                                                  • Instruction ID: c55bc33119b3ebdbe3710806638f1605536d1fcb26cd87bb75126c91c4acfa7c
                                                  • Opcode Fuzzy Hash: 417b2f96a0ae8936e95e97938c470214b07730a809a446bb35a007eac9da92d5
                                                  • Instruction Fuzzy Hash: 49F0C276604214BF9B00DF9AE881C56BBECFF4A320B5180A6F908C7240D270AC00CAB0
                                                  APIs
                                                  • GetLocaleInfoA.KERNEL32(00000800,00000001,00000008,00000008), ref: 00475235
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID:
                                                  • API String ID: 2299586839-0
                                                  • Opcode ID: 50f9e8ea422251af3319eb0e178f302e1ce1597130f262721392b385753c815c
                                                  • Instruction ID: 390fecb41578127fc535d1094b578c189a5c93e5099c82aa481588a54e638e00
                                                  • Opcode Fuzzy Hash: 50f9e8ea422251af3319eb0e178f302e1ce1597130f262721392b385753c815c
                                                  • Instruction Fuzzy Hash: 59F0821060CB8094EF2081B515957BF5BDA0BC3B61F74CDABF1988D2D6C6ADCCC54A0A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime
                                                  • String ID:
                                                  • API String ID: 481472006-0
                                                  • Opcode ID: 50ca3ed84b766c4e68341c486f2f49d3157038e421a4f60fcfc727dcf80bda13
                                                  • Instruction ID: bc068e1a26321123b5c8ae87138531ad48d0fd0ead057ac2c96871db6c238a8f
                                                  • Opcode Fuzzy Hash: 50ca3ed84b766c4e68341c486f2f49d3157038e421a4f60fcfc727dcf80bda13
                                                  • Instruction Fuzzy Hash: F4E0AE68408603A1C200BF55C8414AEBBA9EEA8B40F408C4DF8E842362EB7584E9C76B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: F
                                                  • API String ID: 0-1304234792
                                                  • Opcode ID: f12620469e6195ff6b3f086a9566052c72c44a31c46827ea05fcd860cb2cae4a
                                                  • Instruction ID: 0c73e3be917a75df805b83a29a7e567543e261ea20688bd9b0d74acf451514c1
                                                  • Opcode Fuzzy Hash: f12620469e6195ff6b3f086a9566052c72c44a31c46827ea05fcd860cb2cae4a
                                                  • Instruction Fuzzy Hash: 0B515271F042099BEB08CEADC8907BEBAE7FBC8314F548139D509E7390EA749E459B54
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ALL CLIENTS (
                                                  • API String ID: 0-2699958977
                                                  • Opcode ID: 02686ecdefde075e2016263a5bda7d0eb8c0e8d5ac53a2e0dc28ae680d929695
                                                  • Instruction ID: 4953893149b90c79d26c0c76dc448c0ee8ca9b6e81430ee56d65598ba0c38d01
                                                  • Opcode Fuzzy Hash: 02686ecdefde075e2016263a5bda7d0eb8c0e8d5ac53a2e0dc28ae680d929695
                                                  • Instruction Fuzzy Hash: 32410C74D0010A9FCB40DF94C485AEDBBF5FF88304F1485BADC19AB356EB7059458B90
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fad8a11e5f98dca693c592dc75dfb0c00dcb0ee249566be7c5a4c42b14c314e4
                                                  • Instruction ID: 132ddccee263693c88174c27be57bac39ba8c6d62b4f4a28235b5a4d50d09241
                                                  • Opcode Fuzzy Hash: fad8a11e5f98dca693c592dc75dfb0c00dcb0ee249566be7c5a4c42b14c314e4
                                                  • Instruction Fuzzy Hash: FE92EB7090021ACBCF54DF60C885BEEB7B9FF84304F5085E6D809AB246EB349A4ADF55
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c13c2339d675f7a93d8aa1ac7a1eecbe6d8c884d893553a2f675aec8f0d68568
                                                  • Instruction ID: 9db91b4adc9156d852d41c49aed02a244f377ac3ece411c4a5ee62dc4c7859f2
                                                  • Opcode Fuzzy Hash: c13c2339d675f7a93d8aa1ac7a1eecbe6d8c884d893553a2f675aec8f0d68568
                                                  • Instruction Fuzzy Hash: 2952317061060ADFD724EF64C455BAEF7F5FF88304F108669E4459B692EB34AE0ACB90
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 444725327012288e9d60d1cc43df9c9f7158e0de57e8a13ca44cf76b5694fe01
                                                  • Instruction ID: 464a65f3c436847b941a4ca97c23461059f44e7210b953683ca04a521041e540
                                                  • Opcode Fuzzy Hash: 444725327012288e9d60d1cc43df9c9f7158e0de57e8a13ca44cf76b5694fe01
                                                  • Instruction Fuzzy Hash: D122AC70A00609DFDB24DFA4C484BEEF7B5FF84301F14866AD8059B392DB74AA49CB55
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: de9b8751f5c1dd792a4bf61994f54403960f67ed1eb753052d127139ff0159bf
                                                  • Instruction ID: e89083a4d78e234e513c5fce97614c028be74519dfdc3e2402c45d7c5394194b
                                                  • Opcode Fuzzy Hash: de9b8751f5c1dd792a4bf61994f54403960f67ed1eb753052d127139ff0159bf
                                                  • Instruction Fuzzy Hash: 2ED16E3410C6D05AC72E662802F41FFAFE54D53704F289C9FD4E6CA6A2C19C89F6962F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 30a2badb18b0207f024bd25698c059ef836d798b42a4de93e2cb8cce02e9a3c1
                                                  • Instruction ID: d43ee696f5d1fad4eb9873d3081dc4c826ad2ba0c182f5e95e3f3074df139a65
                                                  • Opcode Fuzzy Hash: 30a2badb18b0207f024bd25698c059ef836d798b42a4de93e2cb8cce02e9a3c1
                                                  • Instruction Fuzzy Hash: 0C814B7090060ADFCB24DFA0C4856EEF7B9FF84304F10866AD81563656EB74AE0EDB95
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ca894e109528985b7eb5be67d7f56f31fedcc0fc3cf1d7290bb91b35a6696419
                                                  • Instruction ID: c9ac72d6e4b5b6736eab77cabc7e03b5cba5bda46ab244416d66b945c81588cd
                                                  • Opcode Fuzzy Hash: ca894e109528985b7eb5be67d7f56f31fedcc0fc3cf1d7290bb91b35a6696419
                                                  • Instruction Fuzzy Hash: 6D715C1580DBC6A9CB268BB441A02EFFFF14E6B204F1CD9CDC4E52B743D025964AE365
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e4ca6247673bbc5a7f773a3b008cc83db5503bee9d296b0384becdb46f5f2e4b
                                                  • Instruction ID: 72e8e6f8fe4756c90f047d5d42ddc4a579c16699435a89af346cc686e4771f73
                                                  • Opcode Fuzzy Hash: e4ca6247673bbc5a7f773a3b008cc83db5503bee9d296b0384becdb46f5f2e4b
                                                  • Instruction Fuzzy Hash: 135168743005518BD744EF29D4D9A9973E6AF88308F7691B9E8094F36BCA36AC46CB44
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 34690f31bd326ec1b73d404df01640cb0ffad532df5b3221e104e5cf9d1276d4
                                                  • Instruction ID: afb61c074ff13b2c8d41975a09680aeec19a1cb5906268e8c250f048024f542e
                                                  • Opcode Fuzzy Hash: 34690f31bd326ec1b73d404df01640cb0ffad532df5b3221e104e5cf9d1276d4
                                                  • Instruction Fuzzy Hash: A501D6756102418FCB08EF58C5C8859BBE6EF89320325CAA7D918CF366D374E886DB84
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 83308a538a107ee3f53cf226f6921f9ce9b52a21c6a6af46740f1d1dc133e450
                                                  • Instruction ID: 68c3ea505a4d46be7f7b84c89b5137730997ca6683e4e54534c024c14fdd666a
                                                  • Opcode Fuzzy Hash: 83308a538a107ee3f53cf226f6921f9ce9b52a21c6a6af46740f1d1dc133e450
                                                  • Instruction Fuzzy Hash: D7F05E75D046088BCB04CF9ED5415DEFBF4FF89324F24813BE809B2310E67448008AAA
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: closesocket
                                                  • String ID: @$accepted=%d$bye$client[%d] close$client[%d] close$client[%d] timeout$error:select fail!$error:select fail!$max connections arrive!$new connection client[%d] %s:%d$select timeout!
                                                  • API String ID: 2781271927-627017823
                                                  • Opcode ID: 0d2ec306be84126ada6baac00bd261c2013041114e6e43b553e269e0d6c81152
                                                  • Instruction ID: 1e936e13312d793f1e903a8007e44e0081c1880719d99049a5c8cf9feadee8e9
                                                  • Opcode Fuzzy Hash: 0d2ec306be84126ada6baac00bd261c2013041114e6e43b553e269e0d6c81152
                                                  • Instruction Fuzzy Hash: 72E15270A00215DFCF14DF94C985AAEBBF9FF89700F20859AE809AB345E774AD41CB65
                                                  APIs
                                                  • WaitCommEvent.KERNEL32(?,?,?), ref: 0047A1FA
                                                  • GetLastError.KERNEL32(?,00000080,?,?,?,00000000,?,?,?), ref: 0047A210
                                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF,?,00000080,?,?,?,00000000,?,?,?), ref: 0047A230
                                                  • SetCommMask.KERNEL32(?,000001B9,?,00000080,?,?,?,00000000,?,?,?), ref: 0047A264
                                                  • Sleep.KERNEL32(0000000A,?,?,?), ref: 0047A292
                                                  • ClearCommError.KERNEL32(?,?,?,0000000A,?,?,?), ref: 0047A2A2
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,0000000A,?,?,?), ref: 0047A2C7
                                                  • ReleaseMutex.KERNEL32(?,?,?,?), ref: 0047A307
                                                  • Sleep.KERNEL32(00000032,?,?,?,?), ref: 0047A30E
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,00000032,?,?,?,?), ref: 0047A318
                                                  • ReadFile.KERNEL32(?,?,00000000,?,?,?,?,?), ref: 0047A343
                                                  • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?), ref: 0047A36D
                                                  • WaitForSingleObject.KERNEL32(?,00000032,?,?,00000000,?,?,?,?,?), ref: 0047A384
                                                  • GetOverlappedResult.KERNEL32(?,?,?,00000000,?,00000032,?,?,00000000,?,?,?,?,?), ref: 0047A39C
                                                  • CancelIo.KERNEL32(?,?,?,?,00000000,?,00000032,?,?,00000000,?,?,?,?,?), ref: 0047A3AE
                                                  • ReleaseMutex.KERNEL32(?,?,?,00000000,?,?,?,?,?), ref: 0047A3C9
                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,?,?,?,?), ref: 0047A3D7
                                                  • GetCommModemStatus.KERNEL32(?,?), ref: 0047A3F9
                                                  • SendMessageA.USER32(?,0000040C,00000000,00000138), ref: 0047A459
                                                  • ClearCommError.KERNEL32(?,?,00000000,?,?,?), ref: 0047A476
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommWait$Error$ObjectSingle$ClearEventLastMutexReleaseSleep$CancelFileMaskMessageModemMultipleObjectsOverlappedReadResultSendStatus
                                                  • String ID: @
                                                  • API String ID: 2733734623-2766056989
                                                  • Opcode ID: 28b8a7ae85ccb666b4eb913ecdd801b59d15a0e49b3680ecc7f0f12508cd5490
                                                  • Instruction ID: c935c95ecb155f3f7ae4ec511a2613725e44156cdce3d93b5f5215494a85d5b0
                                                  • Opcode Fuzzy Hash: 28b8a7ae85ccb666b4eb913ecdd801b59d15a0e49b3680ecc7f0f12508cd5490
                                                  • Instruction Fuzzy Hash: 1DA18F30D0020ADFDF05DBA4C849BEEBBB5BF84300F1481AAE818773A2D7395A51DB56
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @$\\.\COM%d
                                                  • API String ID: 0-2400376008
                                                  • Opcode ID: 5834b072ba12489e84e5e4c9eba3775e4291fbc025901568f8a5a98a6e85cc9d
                                                  • Instruction ID: 84eec48c610e1811c644f13a998f8e87f29ccdc031cd3685deea62d75003a99e
                                                  • Opcode Fuzzy Hash: 5834b072ba12489e84e5e4c9eba3775e4291fbc025901568f8a5a98a6e85cc9d
                                                  • Instruction Fuzzy Hash: C8517130640249EFDB11DBA4CA89BDDBBB2BF55304F248199E5146F392CB35AF42EB44
                                                  APIs
                                                    • Part of subcall function 00527368: SystemParametersInfoA.USER32(00000029,00000000,00000154,00000000), ref: 005273A5
                                                    • Part of subcall function 00527368: CreateFontIndirectA.GDI32(?), ref: 005273B2
                                                    • Part of subcall function 005271A0: GetTextExtentPointA.GDI32(00000000,00000034,00000034,?), ref: 005271DB
                                                  • MulDiv.KERNEL32(00000008,?,00000004), ref: 005278ED
                                                  • MulDiv.KERNEL32(00000008,?,00000008), ref: 005278FD
                                                  • MulDiv.KERNEL32(0000000A,?,00000004), ref: 0052790A
                                                  • MulDiv.KERNEL32(0000000A,?,00000008), ref: 00527917
                                                  • MulDiv.KERNEL32(00000032,?,00000004), ref: 00527924
                                                  • DrawTextA.USER32(00000000,00000000,000000FF,?,00000000), ref: 00527997
                                                  • MulDiv.KERNEL32(0000000E,?,00000008), ref: 005279CA
                                                  • MulDiv.KERNEL32(00000004,?,00000004), ref: 005279DA
                                                  • SetRect.USER32(?,00000000,00000000,00000000,00000000), ref: 00527A00
                                                  • DrawTextA.USER32(00000000,00000000,00000001,?,00000000), ref: 00527A38
                                                  • LoadIconA.USER32(00000000), ref: 00527B94
                                                    • Part of subcall function 0051D4A4: GetWindowTextA.USER32(?,?,00000100), ref: 0051D4C7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Text$Draw$CreateExtentFontIconIndirectInfoLoadParametersPointRectSystemWindow
                                                  • String ID: $)~R$@rR$Image$Message$tQ
                                                  • API String ID: 4220236395-2867865877
                                                  • Opcode ID: 96a672ddb745dbd707de5d95f56a832fdcf2f58c358719c7517e6b7f291b669f
                                                  • Instruction ID: 2f587948e6546c8affe589d3d953d16b4f75b4c8995304bbc01c304ff42213cb
                                                  • Opcode Fuzzy Hash: 96a672ddb745dbd707de5d95f56a832fdcf2f58c358719c7517e6b7f291b669f
                                                  • Instruction Fuzzy Hash: 3A026974E04219AFDB00EFA8D885AADBBF5FF49304F148165E904EB3A2DB70AD45CB54
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00479AD9
                                                  • PurgeComm.KERNEL32(?,0000000A), ref: 00479AEC
                                                  • WriteFile.KERNEL32(?,?,00000000,?,?,?,0000000A), ref: 00479B10
                                                  • GetTickCount.KERNEL32 ref: 00479BA8
                                                  • ClearCommError.KERNEL32(?,?,?,?,0000000A), ref: 00479BF3
                                                  • ReadFile.KERNEL32(?,?,00000000,?,?,?,?,?,?,0000000A), ref: 00479C23
                                                  • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,0000000A), ref: 00479C64
                                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,?,?,?,00000000,?,?,?,?,?,?,0000000A), ref: 00479C7B
                                                  • CancelIo.KERNEL32(?,00000002,?,00000000,?,?,?,00000000,?,?,?,?,?,?,0000000A), ref: 00479C94
                                                  • GetTickCount.KERNEL32 ref: 00479CDD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CountTick$CommErrorFile$CancelClearLastMultipleObjectsPurgeReadWaitWrite
                                                  • String ID:
                                                  • API String ID: 3482357270-0
                                                  • Opcode ID: 7738cafa0d0bd7a0dff5756cc0e7eba41927de4995da0083227f5e47d7c69100
                                                  • Instruction ID: 77735d3968dffb551a946bbd67a46e4229fd963b3a0d33d952a19882a14ba5a1
                                                  • Opcode Fuzzy Hash: 7738cafa0d0bd7a0dff5756cc0e7eba41927de4995da0083227f5e47d7c69100
                                                  • Instruction Fuzzy Hash: A4A11930900209EFDF15CFA8C945BEEBBB5FF48300F24825AE41567295D7789E41DB69
                                                  APIs
                                                  • send.WS2_32(?,?,?,00000000), ref: 00465A19
                                                  • send.WS2_32(?,?,00000000,00000000), ref: 00465A4A
                                                  • send.WS2_32(?,?,00000000,00000000), ref: 00465A77
                                                  • shutdown.WS2_32(?,00000001), ref: 00465A82
                                                  • closesocket.WS2_32(?), ref: 00465ABD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: send$closesocketshutdown
                                                  • String ID: Content-Length:$Content-Length:$Content-Type:$Cookie:$Transfer-Encoding:$$0$###set response Content-Length error$chunked$not enough response buffer memory
                                                  • API String ID: 2486240241-3847305090
                                                  • Opcode ID: fbf41e5398fd47bea78256555b7cf9bd1e388e2bcdacf7b267e111f27b2f3c74
                                                  • Instruction ID: f8e1ddf31e89e20b1b791794916ffa31bd7028f41db28e64236cf5bb0f4b539e
                                                  • Opcode Fuzzy Hash: fbf41e5398fd47bea78256555b7cf9bd1e388e2bcdacf7b267e111f27b2f3c74
                                                  • Instruction Fuzzy Hash: 4EF1C474E04A09DFCB14DFA4D8D0AAEBBB5BF49310F24815AE815AB341E738DD41CB96
                                                  APIs
                                                  • SetBkColor.GDI32(00000000,00000000), ref: 0048641B
                                                  • SetTextColor.GDI32(00000000,00000000), ref: 00486437
                                                  • @Cmbitmap@CMRectWidth$qqrrx11Types@TRect.Z39UARTASSIST(00000000,00000000,00000000,00000000), ref: 00486458
                                                  • @Cmbitmap@CMRectHeight$qqrrx11Types@TRect.Z39UARTASSIST ref: 00486469
                                                    • Part of subcall function 0050A7FC: StretchBlt.GDI32(?,00000000,?,?,?,?,?,?,00000000,?,?), ref: 0050A866
                                                  • SelectObject.GDI32(00000000,00000000), ref: 004864EC
                                                  • @Cmbitmap@CMRectHeight$qqrrx11Types@TRect.Z39UARTASSIST(00000000,00000000,00000000,00660046,00000000,00000000), ref: 00486501
                                                  • @Cmbitmap@CMRectWidth$qqrrx11Types@TRect.Z39UARTASSIST(00000000,00000000,00000000,00000000,00660046,00000000,00000000), ref: 0048650A
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00486530
                                                  • @Cmbitmap@CMRectHeight$qqrrx11Types@TRect.Z39UARTASSIST(00000000,00000000,00000000,00220326,00000000,00000000), ref: 00486542
                                                  • @Cmbitmap@CMRectWidth$qqrrx11Types@TRect.Z39UARTASSIST(00000000,00000000,00000000,00000000,00220326,00000000,00000000), ref: 0048654B
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00486571
                                                  • @Cmbitmap@CMRectHeight$qqrrx11Types@TRect.Z39UARTASSIST(00000000,00000000,00000000,00660046,00000000,00000000), ref: 00486583
                                                  • @Cmbitmap@CMRectWidth$qqrrx11Types@TRect.Z39UARTASSIST(00000000,00000000,00000000,00000000,00660046,00000000,00000000), ref: 0048658C
                                                  • SelectObject.GDI32(00000000,?), ref: 004865AD
                                                  • DeleteDC.GDI32(00000000), ref: 004865B3
                                                  • SetBkColor.GDI32(00000000,00000000), ref: 00486606
                                                  • SetTextColor.GDI32(00000000,?), ref: 00486617
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Rect$Cmbitmap@Types@$ColorHeight$qqrrx11ObjectSelectWidth$qqrrx11$Text$DeleteStretch
                                                  • String ID:
                                                  • API String ID: 4071598654-0
                                                  • Opcode ID: 57dbf09b4b9f246b46cb32a35602da45aa5bb04aeaad6b8476635a98239a948a
                                                  • Instruction ID: 6babb6315c899d23e2139f8b5e47469768d549993ac683c3c5bcff611db2f8eb
                                                  • Opcode Fuzzy Hash: 57dbf09b4b9f246b46cb32a35602da45aa5bb04aeaad6b8476635a98239a948a
                                                  • Instruction Fuzzy Hash: C161E1B1A00109ABC741FBB9CC89ADF77FDAF48300B108466F515E7251DA74ED058BA5
                                                  APIs
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00443E89
                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00443E9B
                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00443EAD
                                                  • WaitForSingleObject.KERNEL32(00000470,000003E8), ref: 00443F1F
                                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00444166
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateEvent$Wait$MultipleObjectObjectsSingle
                                                  • String ID:
                                                  • API String ID: 3372376733-0
                                                  • Opcode ID: 91e68c8e23647b7fb13e467ee2ec75241dcd14bd7cafcd21f949a8593744b5c4
                                                  • Instruction ID: 40e7b23f600549415d74285d2825283147c84e6fca51ee860a1eba6ae55d7817
                                                  • Opcode Fuzzy Hash: 91e68c8e23647b7fb13e467ee2ec75241dcd14bd7cafcd21f949a8593744b5c4
                                                  • Instruction Fuzzy Hash: 7D91E530E04206AFFB20DF69DC9679A7BF5BBA6300F10402BE505D73A1EB749989DB44
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0047C544
                                                  • LoadLibraryA.KERNEL32(?), ref: 0047C595
                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0047C5A6
                                                  • FreeLibrary.KERNEL32(00000000,00000000,getaddrinfo,?), ref: 0047C5B0
                                                  • LoadLibraryA.KERNEL32(?), ref: 0047C5FF
                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0047C610
                                                  • FreeLibrary.KERNEL32(00000000,00000000,getaddrinfo,?), ref: 0047C61A
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0047C62E
                                                  • FreeLibrary.KERNEL32(00000000,00000000,00000000,?,?,?,?,0047C3AB,00000000,?,00480BCC,0058784B,00000000,?,?), ref: 0047C63D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                  • String ID: \ws2_32$\wship6$getaddrinfo$getaddrinfo
                                                  • API String ID: 2490988753-3742413742
                                                  • Opcode ID: 309d718aa21de73299bbf85bf8346b70aabe9bbe94e03df0dec93b339cc0eea1
                                                  • Instruction ID: 40d1e2c69d4c15b244160d5c05b411e2a910cd689fd0b416d14978a380eb817c
                                                  • Opcode Fuzzy Hash: 309d718aa21de73299bbf85bf8346b70aabe9bbe94e03df0dec93b339cc0eea1
                                                  • Instruction Fuzzy Hash: FA414772A0123557CB21DA389CC6AEF7A69FF85710F01826AFC09BB245DB74CE45C6E4
                                                  APIs
                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 004779AE
                                                    • Part of subcall function 0050AA84: MoveToEx.GDI32(?,00000008,?,00000000), ref: 0050AAA2
                                                    • Part of subcall function 0050AA24: LineTo.GDI32(?,00000004,?), ref: 0050AA47
                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 004779E2
                                                  • @Cmpicture@TcmPicture@RefreshPicture$qqrp16Graphics@TCanvasrx11Types@TRect.Z39UARTASSIST ref: 00477C70
                                                  • @Cmpicture@TcmPicture@RefreshPicture$qqrp16Graphics@TCanvasrx11Types@TRect.Z39UARTASSIST ref: 00477C93
                                                    • Part of subcall function 0050A9E8: FrameRect.USER32(?,?,00000000), ref: 0050AA10
                                                  • DrawFrameControl.USER32(00000000,?,00000004,00000100), ref: 00477D4D
                                                  • DrawFrameControl.USER32(00000000,?,00000004,00000100), ref: 00477D95
                                                  • DrawFrameControl.USER32(00000000,?,00000004,00000100), ref: 00477DDD
                                                  • @Cmcheckbutton@TcmCheckButton@DrawDiamond$qp16Graphics@TCanvasp11Types@TRectoo.Z39UARTASSIST(?,?,00000000,00000000), ref: 00477E09
                                                  • @Cmcheckbutton@TcmCheckButton@DrawTrafficLight$qp16Graphics@TCanvasp11Types@TRect15Graphics@TColor.Z39UARTASSIST(?,?,00808080), ref: 00477E47
                                                  • SetTextColor.GDI32(00000000,00000000), ref: 00477FAE
                                                  • DrawFocusRect.USER32(00000000,00000004), ref: 00477FC6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DrawRect$Graphics@$FrameTypes@$Control$Button@Canvasp11Canvasrx11CheckCmcheckbutton@Cmpicture@ColorInflatePicture$qqrp16Picture@Refresh$Diamond$qp16FocusLight$qp16LineMoveRect15RectooTextTraffic
                                                  • String ID: 8
                                                  • API String ID: 3436565992-4194326291
                                                  • Opcode ID: 45edbc15c2efb9ee00ef55bf7f3777426afa08125f847ab3ae39a6962d853e7b
                                                  • Instruction ID: d4f98eea86afc4175f91f420035bb7050b6286c2e7a35d124894872b3dbd95b5
                                                  • Opcode Fuzzy Hash: 45edbc15c2efb9ee00ef55bf7f3777426afa08125f847ab3ae39a6962d853e7b
                                                  • Instruction Fuzzy Hash: 29123F74A042099BCB14DFA8C8C9BDD77B1BF84304F5481B9EC099F39ADA34AD46CB95
                                                  APIs
                                                  • @TcmAutoUpgrader@ReadConfigValue$qqrpct1pi.Z39UARTASSIST ref: 00414E77
                                                  • @TcmAutoUpgrader@ReadConfigValue$qqrpct1pi.Z39UARTASSIST ref: 00414EA8
                                                  • @TcmAutoUpgrader@ReadConfigValue$qqrpct1pi.Z39UARTASSIST ref: 00414EC7
                                                  • @TcmAutoUpgrader@NavigateUpgrade$qqripct2.Z39UARTASSIST(00000000), ref: 00414EF7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AutoUpgrader@$ConfigReadValue$qqrpct1pi$NavigateUpgrade$qqripct2
                                                  • String ID: .sys$COMMON$P$UartAssist$Upgrade$message$url$version
                                                  • API String ID: 232212697-2072344345
                                                  • Opcode ID: 9d6ae04d4959d9a7fe37ac29dddfb0e9fd2f40ce0a794b54e7e61fe9a8a0a41b
                                                  • Instruction ID: 1145c87a6e20a43ffb0e41052f02c90806a08b4331d60f32ca8d355d981f6bef
                                                  • Opcode Fuzzy Hash: 9d6ae04d4959d9a7fe37ac29dddfb0e9fd2f40ce0a794b54e7e61fe9a8a0a41b
                                                  • Instruction Fuzzy Hash: 99814D74E1121A9BCB00DFD4D885AEEF7B5FF84304F10412AE805AB365EB749946CF95
                                                  APIs
                                                  • @cmSerialCommDriver32@TcmUart@fGetDataBits$qqrv.Z39UARTASSIST ref: 0047A77F
                                                  • @cmSerialCommDriver32@TcmUart@fGetStopBits$qqrv.Z39UARTASSIST ref: 0047A78D
                                                  • @cmSerialCommDriver32@TcmUart@fGetParity$qqrv.Z39UARTASSIST ref: 0047A79B
                                                  • @cmSerialCommDriver32@TcmUart@fGetFCtrl$qqrv.Z39UARTASSIST ref: 0047A7C1
                                                  • @cmSerialCommDriver32@TcmUart@BeginUpdate$qqrv.Z39UARTASSIST ref: 0047A7D1
                                                  • @cmSerialCommDriver32@TcmUart@fSetPort$qqr15TCommPortNumber.Z39UARTASSIST ref: 0047A7DE
                                                  • @cmSerialCommDriver32@TcmUart@fSetBaudRate$qqrul.Z39UARTASSIST ref: 0047A7EC
                                                  • @cmSerialCommDriver32@TcmUart@fSetDataBits$qqr13TCommDataBits.Z39UARTASSIST ref: 0047A7FA
                                                  • @cmSerialCommDriver32@TcmUart@fSetStopBits$qqr13TCommStopBits.Z39UARTASSIST ref: 0047A808
                                                  • @cmSerialCommDriver32@TcmUart@fSetParity$qqr11TCommParity.Z39UARTASSIST ref: 0047A816
                                                  • @cmSerialCommDriver32@TcmUart@fSetDTR$qqro.Z39UARTASSIST ref: 0047A824
                                                  • @cmSerialCommDriver32@TcmUart@fSetRTS$qqro.Z39UARTASSIST ref: 0047A832
                                                  • @cmSerialCommDriver32@TcmUart@fSetFCtrl$qqr12TFlowControl.Z39UARTASSIST ref: 0047A840
                                                  • @cmSerialCommDriver32@TcmUart@EndUpdate$qqrv.Z39UARTASSIST ref: 0047A848
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Comm$Driver32@Serial$Uart@f$DataStop$BitsBits$qqr13Bits$qqrvUart@Update$qqrv$BaudBeginControlCtrl$qqr12Ctrl$qqrvFlowNumberParityParity$qqr11Parity$qqrvPortPort$qqr15R$qqroRate$qqrulS$qqro
                                                  • String ID:
                                                  • API String ID: 3879419089-0
                                                  • Opcode ID: 432897437ce21b4ed59dfc7e3970da7c61682907535ef6670623c478928a9fe0
                                                  • Instruction ID: 76dbbac18cc541e820a11b8b82099992defa9b102a932ade4ad803d5e903c3f9
                                                  • Opcode Fuzzy Hash: 432897437ce21b4ed59dfc7e3970da7c61682907535ef6670623c478928a9fe0
                                                  • Instruction Fuzzy Hash: D231FF34A04189EFCB05EFA5C5918DCFF72AF49214F2881D9D8886B353C636AF46DB45
                                                  APIs
                                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,FFFFFFFF), ref: 0047A4F7
                                                  • SendMessageA.USER32(?,0000040D,00000000,?), ref: 0047A528
                                                  • GetTickCount.KERNEL32 ref: 0047A552
                                                  • SendMessageA.USER32(?,0000040D,00000000,?), ref: 0047A579
                                                  • GetTickCount.KERNEL32 ref: 0047A5EB
                                                  • ReleaseMutex.KERNEL32(?,?,000000FF,00000002,?,00000000,FFFFFFFF), ref: 0047A618
                                                  • SendMessageA.USER32(?,0000040D,?,?), ref: 0047A652
                                                  • SendMessageA.USER32(?,0000040D,?,?), ref: 0047A67B
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,00000002,?,00000000,FFFFFFFF), ref: 0047A6B3
                                                  • Sleep.KERNEL32(00000000,00000002,?,00000000,FFFFFFFF), ref: 0047A6D7
                                                  • ReleaseMutex.KERNEL32(?,?,00000000,FFFFFFFF), ref: 0047A6FD
                                                  • SendMessageA.USER32(?,0000040D,00000000,?), ref: 0047A720
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,00000002,?,00000000,FFFFFFFF), ref: 0047A737
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MessageSend$Wait$CountMutexObjectReleaseSingleTick$MultipleObjectsSleep
                                                  • String ID:
                                                  • API String ID: 3827106427-0
                                                  • Opcode ID: 36f8392fb98c2ad0148afd00583c38d6fbc03b1732aaa407449cfe8de9e28f79
                                                  • Instruction ID: 7b04c59c59fdbe7d480ac3e6ce9f17b19d4875baefb8ceec05f2dba27c1be293
                                                  • Opcode Fuzzy Hash: 36f8392fb98c2ad0148afd00583c38d6fbc03b1732aaa407449cfe8de9e28f79
                                                  • Instruction Fuzzy Hash: 4991F634D00109EFDF14DFA4C945AEEBBB2BF88300F24816AE514A72A1D7359E51DB96
                                                  APIs
                                                  • @TSyncUart@BeginUpdate$qqrv.Z39UARTASSIST(?,?,?,00471563), ref: 0047195A
                                                  • @TSyncUart@Close$qqrv.Z39UARTASSIST(?,?,?,00471563), ref: 00471975
                                                  • @TSyncUart@Open$qqrv.Z39UARTASSIST(?,?,?,00471563), ref: 00471982
                                                  • @TSyncUart@fSetBaudRate$qqrul.Z39UARTASSIST(?,?,?,00471563), ref: 00471992
                                                  • PurgeComm.KERNEL32(?,0000000D,?,?,?,00471563), ref: 004719CB
                                                  • SetCommState.KERNEL32(?,?,?,0000000D,?,?,?,00471563), ref: 004719D8
                                                  • PurgeComm.KERNEL32(?,0000000D,?,?,?,00471563), ref: 00471A10
                                                  • SetCommState.KERNEL32(?,?,?,0000000D,?,?,?,00471563), ref: 00471A1D
                                                  • PurgeComm.KERNEL32(?,0000000D,?,?,?,00471563), ref: 00471A55
                                                  • SetCommState.KERNEL32(?,?,?,0000000D,?,?,?,00471563), ref: 00471A62
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Comm$Sync$PurgeStateUart@$BaudBeginClose$qqrvOpen$qqrvRate$qqrulUart@fUpdate$qqrv
                                                  • String ID:
                                                  • API String ID: 1959074725-0
                                                  • Opcode ID: 76e70de54a4b132f6e0371cdb00a5c2819c6d9dcaf10432797080c1575ede372
                                                  • Instruction ID: 01330e8dad6f8385e5b8bec593953e0f6f3fa80542d8413c0b2ce62412cf64c6
                                                  • Opcode Fuzzy Hash: 76e70de54a4b132f6e0371cdb00a5c2819c6d9dcaf10432797080c1575ede372
                                                  • Instruction Fuzzy Hash: 4051F565209AC3AAD325973D88617E7BFA67F46304F0CC00AD6D843B62C32AF859C795
                                                  APIs
                                                  • accept.WS2_32(?,?,00000010), ref: 00465BE8
                                                  • send.WS2_32(00000000,bye,00000004,00000000), ref: 00465C0D
                                                  • closesocket.WS2_32(00000000), ref: 00465C13
                                                  • Sleep.KERNEL32(00000BB8,?,?,00000010), ref: 00465C3D
                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000,00000BB8,?,?,00000010), ref: 00465C62
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00000001,00000000,00000BB8,?,?,00000010), ref: 00465C6D
                                                  • CloseHandle.KERNEL32(?,?,000000FF,?,00000001,00000000,00000BB8,?,?,00000010), ref: 00465C76
                                                  • CloseHandle.KERNEL32(?,?,?,000000FF,?,00000001,00000000,00000BB8,?,?,00000010), ref: 00465C7F
                                                  Strings
                                                  • HTTP server session count reach upper-limits, xrefs: 00465C18
                                                  • Error: HTTP server accept faill, xrefs: 00465C25
                                                  • bye, xrefs: 00465C05
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandle$ObjectReleaseSemaphoreSingleSleepWaitacceptclosesocketsend
                                                  • String ID: Error: HTTP server accept faill$HTTP server session count reach upper-limits$bye
                                                  • API String ID: 1186266293-1525878308
                                                  • Opcode ID: f783776e7ff19ea49bcf21637d8d7124a92b85d71d4c5c6b21255c4d8dcb3331
                                                  • Instruction ID: c4a64c1f4fe08a030a171952d1077933d7944ad1b26b9ccb02a658df699c1c24
                                                  • Opcode Fuzzy Hash: f783776e7ff19ea49bcf21637d8d7124a92b85d71d4c5c6b21255c4d8dcb3331
                                                  • Instruction Fuzzy Hash: 66210831640709ABCB10EF95CC86E9F776CFF80714F10454AFA01AB182EB74AD418765
                                                  APIs
                                                  • CreateThread.KERNEL32(00000000,00002000,?,?,00000000,00000000), ref: 00478F39
                                                  • CreateThread.KERNEL32(00000000,00002000,?,?,00000000,00000000), ref: 00478F72
                                                  • CreateThread.KERNEL32(00000000,00002000,?,?,00000000,00000000), ref: 00478FAB
                                                  • Sleep.KERNEL32(00000001,000000FF,00000000), ref: 0047900A
                                                  • WaitForSingleObject.KERNEL32(000000FF,00000000), ref: 0047901A
                                                  • CloseHandle.KERNEL32(000000FF,000000FF,00000000,00000001,000000FF,00000000), ref: 0047902C
                                                  • Sleep.KERNEL32(00000001,000000FF,00000000), ref: 0047905A
                                                  • WaitForSingleObject.KERNEL32(000000FF,00000000), ref: 0047906A
                                                  • CloseHandle.KERNEL32(000000FF,000000FF,00000000,00000001,000000FF,00000000), ref: 0047907C
                                                  • Sleep.KERNEL32(00000001,000000FF,00000000), ref: 004790AA
                                                  • WaitForSingleObject.KERNEL32(000000FF,00000000), ref: 004790BA
                                                  • CloseHandle.KERNEL32(000000FF,000000FF,00000000,00000001,000000FF,00000000), ref: 004790CC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateHandleObjectSingleSleepThreadWait
                                                  • String ID:
                                                  • API String ID: 422747524-0
                                                  • Opcode ID: 763901ef421159748abaefe3081a9e41b81b77b9ec5b0288b789fed49ef74146
                                                  • Instruction ID: e9bfd4836574c35c35ae2c348fd7d30a9b3e5ef331bb6264d925fbaf99212845
                                                  • Opcode Fuzzy Hash: 763901ef421159748abaefe3081a9e41b81b77b9ec5b0288b789fed49ef74146
                                                  • Instruction Fuzzy Hash: D0511A34650205EBE764DB94C949FD9B7B2BB40314F2483BAE11C6B2D2C7761E82DB58
                                                  APIs
                                                  • @Cmcheckbutton@TcmCheckButton@DrawButtonFrame$qp16Graphics@TCanvasp11Types@TRect18Controls@TBevelCuti.Z39UARTASSIST(?,?), ref: 0047BCD6
                                                    • Part of subcall function 0050A9AC: FillRect.USER32(?,?,00000000), ref: 0050A9D4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BevelButtonButton@Canvasp11CheckCmcheckbutton@Controls@CutiDrawFillFrame$qp16Graphics@RectRect18Types@
                                                  • String ID: ,$000
                                                  • API String ID: 1937672696-817360574
                                                  • Opcode ID: fea6296fb1937f05879e423da13611e4dcebb8de487c6ae63942beb81d0ad53e
                                                  • Instruction ID: 2a5d76c22a49115ac4d8b2f7892547c1e382b74523b4ae5821504b447d6786ee
                                                  • Opcode Fuzzy Hash: fea6296fb1937f05879e423da13611e4dcebb8de487c6ae63942beb81d0ad53e
                                                  • Instruction Fuzzy Hash: 06C18E706002059BCB04DF68C895BEB77B5FF89300F1481BAE90A9F396DB359D46CBA5
                                                  APIs
                                                  • ShellExecuteA.SHELL32(?,00000000,0056F11C,00000000,00000000,00000001), ref: 004167FA
                                                    • Part of subcall function 0052D308: KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406375), ref: 0052D31B
                                                    • Part of subcall function 00509D20: MulDiv.KERNEL32(0000000B,?,00000048), ref: 00509D2D
                                                    • Part of subcall function 0052D298: KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406355), ref: 0052D2AB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser$ExecuteShell
                                                  • String ID: 'V$8$A free license is currently employed whith limited features.You can get enhanced edition through purchasing software licensing.$Donate Us - $MS Sans Serif$Uart Assistant$donate/$http://www.cmsoft.cn/assistcenter/$tQ
                                                  • API String ID: 931011979-1626683711
                                                  • Opcode ID: 9863e7cbd008977e56a4596ce73d28f9496f93effa71b78e22e52123355f0da7
                                                  • Instruction ID: 98b2e4058b7ed827d060ccf52124d6a12f95489a41f148f5d53d8d57e76f67bb
                                                  • Opcode Fuzzy Hash: 9863e7cbd008977e56a4596ce73d28f9496f93effa71b78e22e52123355f0da7
                                                  • Instruction Fuzzy Hash: EFC14370A002098BDB00EFA8D489BDEBBB5FF89304F148176E805AF396DB759D46CB55
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004638D5
                                                  • ReleaseMutex.KERNEL32(00000000), ref: 00463B28
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MutexObjectReleaseSingleWait
                                                  • String ID: %c%02d%c%02d.log$%c%02d%c%02d.log$@$The log file exceeds the limit length and is reset$[%04d-%02d-%02d$ab+$ab+$ab+
                                                  • API String ID: 2017088797-1307308133
                                                  • Opcode ID: 5c368bec9de0ca6b9eaf7bb04c140d3bbfb798937c8f9a0c098cc3630ef3ca51
                                                  • Instruction ID: 20932021f6be3798b899503055e8c9d8ab73c0b158eb9aef5bc216bf31b71a86
                                                  • Opcode Fuzzy Hash: 5c368bec9de0ca6b9eaf7bb04c140d3bbfb798937c8f9a0c098cc3630ef3ca51
                                                  • Instruction Fuzzy Hash: F5911572A003459BD704EFA4DCD5E6B3BA9BB54302F14611AFC41A7282E778DE08DB66
                                                  APIs
                                                    • Part of subcall function 004CB4F4: RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020019,?,00000000,004CB68E), ref: 004CB560
                                                  • @TSyncUart@Open$qqrv.Z39UARTASSIST ref: 00471760
                                                  • @TSyncUart@Close$qqrv.Z39UARTASSIST ref: 00471753
                                                    • Part of subcall function 00470FE8: CloseHandle.KERNEL32(?,?,00470EA8), ref: 00470FF9
                                                  • @TSyncUart@Close$qqrv.Z39UARTASSIST ref: 004717DF
                                                  • @TSyncUart@Open$qqrv.Z39UARTASSIST ref: 004717EC
                                                  • @TSyncUart@UpdateSettings$qqrp12TUartOptionso.Z39UARTASSIST ref: 0047188E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: SyncUart@$Close$qqrvOpen$qqrv$CloseHandleOpenOptionsoSettings$qqrp12UartUpdate
                                                  • String ID: COM$COMPort$COMPort$SOFTWARE\CMSOFT\$\
                                                  • API String ID: 4265800004-3481757975
                                                  • Opcode ID: 8291a7cc10a28825ee163d60f905c516413a857b9da85a66d881ab61fc811ae2
                                                  • Instruction ID: 4da1aaf21a3e4474e913d7475400c4631fbd5666a02ba1850d31dbf7c067e56a
                                                  • Opcode Fuzzy Hash: 8291a7cc10a28825ee163d60f905c516413a857b9da85a66d881ab61fc811ae2
                                                  • Instruction Fuzzy Hash: 3E719234D002498BCB10EFA8C495AEEFBF4FF49308F10C55AE8446B362D775594ACB69
                                                  APIs
                                                  • CreateFileA.KERNEL32(0057E1C5,C0000000,00000001,00000000,00000004,00000080,00000000), ref: 0045F3D3
                                                  • SetFilePointer.KERNEL32(?,00000004,00000000,00000002,0057E1C5,C0000000,00000001,00000000,00000004,00000080), ref: 0045F443
                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00000004,00000000,00000002,0057E1C5,C0000000,00000001,00000000,00000004,00000080), ref: 0045F45B
                                                  • WriteFile.KERNEL32(?,<?xml version="1.0" encoding="gb2312"?><Workbook xmlns="urn:schemas-microsoft-com:office:spreadsheet" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:x="urn:schemas-microsoft-com:office:excel" xmlns:ss="urn:schemas-microsoft-com:office:spreadsheet" xml,00000080,0000001F,00000000,0057E23A,C0000000,00000001,00000000,00000002,00000080,00000000,?,?,C0000000,00000004), ref: 0045F475
                                                  • WriteFile.KERNEL32(?,</Table></Worksheet></Workbook>,00000004,00000080,00000000,?,<?xml version="1.0" encoding="gb2312"?><Workbook xmlns="urn:schemas-microsoft-com:office:spreadsheet" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:x="urn:schemas-microsoft-com:office:excel" xmlns:ss="urn:schemas-microsoft-com:office:spreadsheet" xml,00000080,0000001F,00000000,0057E23A,C0000000,00000001,00000000,00000002,00000080), ref: 0045F48F
                                                  • ReadFile.KERNEL32(?,C0000000,00000004,00000004,00000000,?,00000004,00000000,00000002,0057E1C5,C0000000,00000001,00000000,00000004,00000080), ref: 0045F4AE
                                                  • CloseHandle.KERNEL32(?,?,C0000000,00000004,00000004,00000000,?,00000004,00000000,00000002,0057E1C5,C0000000,00000001,00000000,00000004,00000080), ref: 0045F4E0
                                                  • CreateFileA.KERNEL32(0057E23A,C0000000,00000001,00000000,00000002,00000080,00000000,?,?,C0000000,00000004,00000004,00000000,?,00000004,00000000), ref: 0045F50A
                                                  Strings
                                                  • </Table></Worksheet></Workbook>, xrefs: 0045F486, 0045F4C6
                                                  • <?xml version="1.0" encoding="gb2312"?><Workbook xmlns="urn:schemas-microsoft-com:office:spreadsheet" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:x="urn:schemas-microsoft-com:office:excel" xmlns:ss="urn:schemas-microsoft-com:office:spreadsheet" xml, xrefs: 0045F46C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CreatePointerWrite$CloseHandleRead
                                                  • String ID: </Table></Worksheet></Workbook>$<?xml version="1.0" encoding="gb2312"?><Workbook xmlns="urn:schemas-microsoft-com:office:spreadsheet" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:x="urn:schemas-microsoft-com:office:excel" xmlns:ss="urn:schemas-microsoft-com:office:spreadsheet" xml
                                                  • API String ID: 2991360132-2954316497
                                                  • Opcode ID: 02ca27c2278042eb8288b1c4bf40717fb2625d928c3fb31c9c2b422c932a18c7
                                                  • Instruction ID: ad010e9df957beb127c5150076cae7b68c20f6eca069d44724efbcd9326aa3cb
                                                  • Opcode Fuzzy Hash: 02ca27c2278042eb8288b1c4bf40717fb2625d928c3fb31c9c2b422c932a18c7
                                                  • Instruction Fuzzy Hash: C741A271204300BAE724DE54CC86FAB37E9AB95700F108519FA45CF2D2D7B4E94DDB96
                                                  APIs
                                                  • accept.WS2_32(?,?), ref: 0047F782
                                                  • htons.WS2_32(?), ref: 0047F7A5
                                                  • @TcmSocket@ServerClientAppend$qqrpucusi.Z39UARTASSIST(?,00000000,?,?), ref: 0047F7B4
                                                    • Part of subcall function 0047DD50: @TcmSocket@TryLockMultiClient$qqrv.Z39UARTASSIST ref: 0047DD64
                                                    • Part of subcall function 0047DD50: GetTickCount.KERNEL32 ref: 0047DDB9
                                                    • Part of subcall function 0047DD50: ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 0047DDF2
                                                    • Part of subcall function 0047DD50: @TcmSocket@ComboBox_ServerClientInsert$qqrp9TInetAddr.Z39UARTASSIST ref: 0047DE05
                                                  • @TcmSocket@ErrorCheck$qqripc.Z39UARTASSIST(?,?), ref: 0047F790
                                                    • Part of subcall function 00480C48: WSAGetLastError.WS2_32(00000011,?,00000000,?,0047EA87,00000002), ref: 00480C57
                                                    • Part of subcall function 00480C48: @TcmSocket@ShowError$qqrpci.Z39UARTASSIST(00000011,?,00000000,?,0047EA87,00000002), ref: 00480C93
                                                  • accept.WS2_32(?,?), ref: 0047F7CB
                                                  • @TcmSocket@ErrorCheck$qqripc.Z39UARTASSIST ref: 0047F7D9
                                                  • htons.WS2_32(?), ref: 0047F7EE
                                                  • @TcmSocket@ServerClientAppend$qqrpucusi.Z39UARTASSIST(?,00000000), ref: 0047F7FD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Socket@$ClientErrorServer$Append$qqrpucusiCheck$qqripcaccepthtons$AddrBox_Client$qqrvComboCountError$qqrpciInetInsert$qqrp9LastLockMultiReleaseSemaphoreShowTick
                                                  • String ID: accept() failed$accept() failed
                                                  • API String ID: 3194161817-1440325827
                                                  • Opcode ID: 6b9428697f7145bd46306e65ffd3df6aaae38d527a55352d183f796852a1e910
                                                  • Instruction ID: 2e13ebef0fb36a1bc46cc61b603d72222632b66936d5c80d3db0e26b69e4b912
                                                  • Opcode Fuzzy Hash: 6b9428697f7145bd46306e65ffd3df6aaae38d527a55352d183f796852a1e910
                                                  • Instruction Fuzzy Hash: B101C47560411016C7047F3888C2AEA25C8AF89324F448B7AED9A9F396FA784C4983E6
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?), ref: 004129BB
                                                  • ReleaseMutex.KERNEL32(00000000,?,?), ref: 00412DF7
                                                  Strings
                                                  • SCRIPT ERROR> Not engough script parsing buffer, xrefs: 00412A9C
                                                  • SCRIPT ERROR> Corrupt script expression, xrefs: 00412B2F
                                                  • SCRIPT ERROR> Not engough script parsing buffer, xrefs: 00412C51
                                                  • SCRIPT ERROR> Unresolved script expression!!!, xrefs: 00412D8A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MutexObjectReleaseSingleWait
                                                  • String ID: SCRIPT ERROR> Corrupt script expression$SCRIPT ERROR> Not engough script parsing buffer$SCRIPT ERROR> Not engough script parsing buffer$SCRIPT ERROR> Unresolved script expression!!!
                                                  • API String ID: 2017088797-3237111483
                                                  • Opcode ID: 851bec8312ede03cb610845a5a10bbd9da80f1ed78d878c4281997285db15b82
                                                  • Instruction ID: e0a66613111dbb72512c75bd6a1ff4f825b086aaebc27d34b99d2812f829842d
                                                  • Opcode Fuzzy Hash: 851bec8312ede03cb610845a5a10bbd9da80f1ed78d878c4281997285db15b82
                                                  • Instruction Fuzzy Hash: D6E17E78D052089FCB18CF98E6D18EDBBB5FF49310F24911AE401E7361D7789896CB59
                                                  APIs
                                                  • @TCGauge@PaintBackground$qqrp16Graphics@TBitmap.Z39UARTASSIST ref: 004B7364
                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 004B7395
                                                  • @TCGauge@PaintBackground$qqrp16Graphics@TBitmap.Z39UARTASSIST ref: 004B73C4
                                                  • @TCGauge@PaintAsNothing$qqrp16Graphics@TBitmaprx11Types@TRect.Z39UARTASSIST ref: 004B73F4
                                                  • @TCGauge@PaintAsText$qqrp16Graphics@TBitmaprx11Types@TRect.Z39UARTASSIST(00000000), ref: 004B74B1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Gauge@Graphics@Paint$Rect$Background$qqrp16BitmapBitmaprx11Types@$InflateNothing$qqrp16Text$qqrp16
                                                  • String ID:
                                                  • API String ID: 2844903813-3916222277
                                                  • Opcode ID: 1a332ce7cf34b22f10fb7c8ade4b5998e6bac97f2eee3b13f5537dea6c31af38
                                                  • Instruction ID: ad599f7f1510a085bf29a29ac2089339bc84c9b3b4333441a3259e52c255f475
                                                  • Opcode Fuzzy Hash: 1a332ce7cf34b22f10fb7c8ade4b5998e6bac97f2eee3b13f5537dea6c31af38
                                                  • Instruction Fuzzy Hash: 5071D775918208ABCB04EBB8D885DDEBBB9FF94314F10459FF401A7251DF38AA45CB68
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 65535$udp
                                                  • API String ID: 0-1267037602
                                                  • Opcode ID: a957b6aaf6f119413e02d6306b6ab6644dd28b0e3b0051ce3e41c95d5a0ccf02
                                                  • Instruction ID: ea846fbcf17ed9d19d50a8df419e30a191950caec39aeaca3c46765f96d18546
                                                  • Opcode Fuzzy Hash: a957b6aaf6f119413e02d6306b6ab6644dd28b0e3b0051ce3e41c95d5a0ccf02
                                                  • Instruction Fuzzy Hash: 7451F43160020A8FDB29DA68D8867FB36A5BB44300F14C52FFC099B2D1DABCDD41D79A
                                                  APIs
                                                  • FreeLibrary.KERNEL32(00000000,02465798,00570DB0,00000000), ref: 004A593D
                                                  • GetTickCount.KERNEL32 ref: 004A59FC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CountFreeLibraryTick
                                                  • String ID: ?id=$D$assist.sys$http://www.cmsoft.cn/assistcenter/$images/assist_dll.raw${3D
                                                  • API String ID: 2362339246-3149051036
                                                  • Opcode ID: 3258f9396e2634bd1c7e0e1a70c1c099085a68ab1c547d1216fb74ca067be5f3
                                                  • Instruction ID: d831a26f15cbb1659599778ddf9e98d5aa72699180e297055c752e1c3ea69681
                                                  • Opcode Fuzzy Hash: 3258f9396e2634bd1c7e0e1a70c1c099085a68ab1c547d1216fb74ca067be5f3
                                                  • Instruction Fuzzy Hash: C6612C70D0010EDACF01EFA4D58A6EEFBB9FF98304F20816AD41577252DB349A4ADB65
                                                  APIs
                                                  • @TcmForm@limit_max_height$qqrv.Z39UARTASSIST ref: 00475624
                                                  • LoadBitmapA.USER32(?,dlgRestore), ref: 00475637
                                                  • PostMessageA.USER32(00000000,00000112,0000F030,00000000), ref: 00475666
                                                  • PostMessageA.USER32(00000000,00000112,0000F120,00000000), ref: 004756D0
                                                  • LoadBitmapA.USER32(?,dlgMax), ref: 004756E3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BitmapLoadMessagePost$Form@limit_max_height$qqrv
                                                  • String ID: Maximize$Restore$dlgMax$dlgRestore
                                                  • API String ID: 2368407926-4238520546
                                                  • Opcode ID: 48339364b77cbcba52d27ab0cf7d838b2571979ee5f68c66580dd68b08a9608e
                                                  • Instruction ID: ff813258eb19d097fcc2a3d3a190badcca140e5659c90878c0b39107863bbc8a
                                                  • Opcode Fuzzy Hash: 48339364b77cbcba52d27ab0cf7d838b2571979ee5f68c66580dd68b08a9608e
                                                  • Instruction Fuzzy Hash: A531817060020A9BCB10FB64C88ABEE7BA5BF94305F548176FC08AF386DF749905CB65
                                                  APIs
                                                  • SelectObject.GDI32(?,?), ref: 0050E8CF
                                                  • FillRect.USER32(?,?,?), ref: 0050E96C
                                                  • SetTextColor.GDI32(?,00000000), ref: 0050E984
                                                  • SetBkColor.GDI32(?,00000000), ref: 0050E99E
                                                  • SetDIBColorTable.GDI32(?,00000000,00000002,?,?,00000000,?,00000000,?,?,?,?,00000000,00000000,0050EB2C), ref: 0050E9E6
                                                  • PatBlt.GDI32(?,00000000,00000000,?,?,00FF0062), ref: 0050EA08
                                                    • Part of subcall function 00509578: GetSysColor.USER32(8B0050AE), ref: 00509582
                                                  • SelectObject.GDI32(?,00000000), ref: 0050EA3E
                                                  • SetTextColor.GDI32(?,00000000), ref: 0050EA83
                                                  • SetBkColor.GDI32(?,00000000), ref: 0050EA9D
                                                  • SelectObject.GDI32(?,00000000), ref: 0050EAE1
                                                  • DeleteDC.GDI32(?), ref: 0050EAFC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Color$ObjectSelect$Text$DeleteFillRectTable
                                                  • String ID:
                                                  • API String ID: 2719334733-0
                                                  • Opcode ID: 8284566e35cbc8c6063394014278ee61b845507596d30ef5c395d32b4092e60b
                                                  • Instruction ID: a4666a5af2eb62d92123dc6c74263e40a720f7f65df1b061bfa3ed5715fd0138
                                                  • Opcode Fuzzy Hash: 8284566e35cbc8c6063394014278ee61b845507596d30ef5c395d32b4092e60b
                                                  • Instruction Fuzzy Hash: FD61B675A00205AFDB11EFA8C88AF9EBBBCFB49710F558455F504EB292C675ED40CB60
                                                  APIs
                                                  • @TcmSocket@TryLockMultiClient$qqrv.Z39UARTASSIST ref: 0047E709
                                                    • Part of subcall function 0047DD14: WaitForSingleObject.KERNEL32(?,00000000,?,?,0047FB39), ref: 0047DD2F
                                                  • GetTickCount.KERNEL32 ref: 0047E71F
                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 0047E75A
                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 0047E77E
                                                  • getpeername.WS2_32(?,?,0000001C), ref: 0047E7A1
                                                  • htons.WS2_32(?), ref: 0047E7B2
                                                  • @TcmSocket@ServerClientAppend$qqrpucusi.Z39UARTASSIST(?,?,?,?,0000001C), ref: 0047E7C1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ReleaseSemaphoreSocket@$Append$qqrpucusiClientClient$qqrvCountLockMultiObjectServerSingleTickWaitgetpeernamehtons
                                                  • String ID:
                                                  • API String ID: 2511304031-0
                                                  • Opcode ID: 1822b2a7b1b19e49ebaceb82bd57353bf68ce8c9a33c400645eb2bb941e684e0
                                                  • Instruction ID: 3a82808f130826790ad581cd9d1f35632bdc9dbc20462036a83cc78b9a89c645
                                                  • Opcode Fuzzy Hash: 1822b2a7b1b19e49ebaceb82bd57353bf68ce8c9a33c400645eb2bb941e684e0
                                                  • Instruction Fuzzy Hash: CC317E71600305ABD724EF25C885BEBBBE8AF88700F10CA5EF59E87351D778A980D755
                                                  APIs
                                                  • PostMessageA.USER32(?,00000401,00000002,00000002), ref: 004743D5
                                                  • @TcmForm@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST(?,0245661C,?), ref: 004744B4
                                                  • @TcmForm@setSizeable$qqro.Z39UARTASSIST ref: 004744EA
                                                    • Part of subcall function 0052D308: KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406375), ref: 0052D31B
                                                    • Part of subcall function 004EFCF0: SendMessageA.USER32(00000000,000000CC,?,00000000), ref: 004EFD37
                                                    • Part of subcall function 0052D298: KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406355), ref: 0052D2AB
                                                    • Part of subcall function 00534424: GetWindowLongA.USER32(?,000000F0), ref: 0053444C
                                                    • Part of subcall function 00534424: SetWindowLongA.USER32(?,000000F0,00000000), ref: 00534469
                                                    • Part of subcall function 004EFD78: SendMessageA.USER32(00000000,000000CF,?,00000000), ref: 004EFDAB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$CallbackDispatcherLongSendUserWindow$Classes@ComponentForm@$bctr$qqrp18Form@setPostSizeable$qqro
                                                  • String ID: $'V$'V$H7G$hYX
                                                  • API String ID: 357293923-341199040
                                                  • Opcode ID: 54adc6a66307a198b33d1fd36ac186bd4ec5916e28a9f49023db0af0d0f6af91
                                                  • Instruction ID: 668169af4ffae739dccadb7b9e11bfde9df5fc24b7c912ee17d8ceeef9f01b04
                                                  • Opcode Fuzzy Hash: 54adc6a66307a198b33d1fd36ac186bd4ec5916e28a9f49023db0af0d0f6af91
                                                  • Instruction Fuzzy Hash: 7D121B74A002458BCB04EF69D4C5A9D7BB2BF85304F2481A5EC089F3ABC775EC46CB95
                                                  APIs
                                                  • 73A1A570.USER32(00000000,?,00000000,00510025,?,?,?,?,?), ref: 0050FD72
                                                  • SelectObject.GDI32(?,00000000), ref: 0050FDF6
                                                  • GetLastError.KERNEL32(?,?,00000004,?,?,00000000,00000000,0050FEAF,?,?,00000000,?,00000001,00000001,?,00000000), ref: 0050FE64
                                                  • SelectObject.GDI32(?,?), ref: 0050FEA3
                                                  • DeleteObject.GDI32(00000000), ref: 0050FEA9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Object$Select$A570DeleteErrorLast
                                                  • String ID: ($BM
                                                  • API String ID: 2612784382-2980357723
                                                  • Opcode ID: 330b158fe2464c63395ed4c6b83f1d55be7aeecbdb25091ea25a9aaa78e90ecd
                                                  • Instruction ID: ca1027da03a9fed36d50e9a6676cee11cb9bf5bc55b82ec0f4f591e57d35be77
                                                  • Opcode Fuzzy Hash: 330b158fe2464c63395ed4c6b83f1d55be7aeecbdb25091ea25a9aaa78e90ecd
                                                  • Instruction Fuzzy Hash: 07D13874A002099FDF14DFA8C895AAEBBF5FF89700F148469F904EB691D734AC80CB61
                                                  APIs
                                                    • Part of subcall function 0052D298: KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406355), ref: 0052D2AB
                                                    • Part of subcall function 0052D308: KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406375), ref: 0052D31B
                                                  • @Cmcheckbutton@TcmCheckButton@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST ref: 0043C87B
                                                  • @Cmcheckbutton@TcmCheckButton@AutoAdjustSize$qv.Z39UARTASSIST(00000000), ref: 0043C8B7
                                                  • @Cmcheckbutton@TcmCheckButton@AutoAdjustSize$qv.Z39UARTASSIST(00000000), ref: 0043C8DE
                                                  • @Cmcheckbutton@TcmCheckButton@SetTrafficLightColor$qqr15Graphics@TColort1t1.Z39UARTASSIST(00808080), ref: 0043C8F9
                                                  • @Cmcheckbutton@TcmCheckButton@AutoAdjustSize$qv.Z39UARTASSIST(00000000), ref: 0043C919
                                                  • @Cmcheckbutton@TcmCheckButton@AutoAdjustSize$qv.Z39UARTASSIST(00000000), ref: 0043C94B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CheckCmcheckbutton@$Button@$AdjustAutoSize$qv$CallbackDispatcherUser$Button@$bctr$qqrp18Classes@Color$qqr15Colort1t1ComponentGraphics@LightTraffic
                                                  • String ID: $000
                                                  • API String ID: 3245846921-4115071935
                                                  • Opcode ID: 7dd678e3e8976a73bb314aaa0c6a49fd9be6a32d68a2ecab8e454df7f8452116
                                                  • Instruction ID: bf2d1d1cd776ec3d46e4af71373b8afecf78805b86d913d8dfe95e8b93320af7
                                                  • Opcode Fuzzy Hash: 7dd678e3e8976a73bb314aaa0c6a49fd9be6a32d68a2ecab8e454df7f8452116
                                                  • Instruction Fuzzy Hash: 02916E74A002058FDB14EF68D4C8BDDBBB1BF89308F14807AE919AB396C7359C45CB99
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: htons
                                                  • String ID:
                                                  • API String ID: 4207154920-3916222277
                                                  • Opcode ID: 638a0d3b6d5f2f72f2cc817d77cdec966568191c39099656180560d439677431
                                                  • Instruction ID: 430e7f12b12c9dd4ad67bd663f13e5eec63ad93c15a1e96f40555307d167f0c2
                                                  • Opcode Fuzzy Hash: 638a0d3b6d5f2f72f2cc817d77cdec966568191c39099656180560d439677431
                                                  • Instruction Fuzzy Hash: BD71C435A14249DBCF04EFA4C4959EEFBB5FF89300B1481AAE805AB316D734ED05CB65
                                                  APIs
                                                  • @Cmlabel@TcmLabel@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST ref: 0041506E
                                                    • Part of subcall function 00484910: @Cmlabel@TFontEffect@$bctr$qqrv.Z39UARTASSIST(?), ref: 00484949
                                                  • @Cmlabel@TcmLabel@DoSetAutoSize$qqro.Z39UARTASSIST ref: 00415079
                                                    • Part of subcall function 00484BAC: @Cmlabel@TcmLabel@AutoAdjustSize$qqrv.Z39UARTASSIST ref: 00484BC5
                                                  • @Cmlabel@TcmLabel@SetAlignment$qqr18Classes@TAlignment.Z39UARTASSIST ref: 0041509D
                                                    • Part of subcall function 00484B48: @Cmlabel@TcmLabel@AutoAdjustSize$qqrv.Z39UARTASSIST ref: 00484B5B
                                                  • @Cmlabel@TcmLabel@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST ref: 0041516B
                                                  • @Cmlabel@TcmLabel@DoSetAutoSize$qqro.Z39UARTASSIST ref: 00415176
                                                  • @Cmlabel@TcmLabel@SetAlignment$qqr18Classes@TAlignment.Z39UARTASSIST ref: 00415197
                                                  Strings
                                                  • Authorized Privileges?, xrefs: 0041521F
                                                  • Authenticate by User Account, xrefs: 00415125
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Cmlabel@$Label@$AutoClasses@$AdjustAlignmentAlignment$qqr18ComponentLabel@$bctr$qqrp18Size$qqroSize$qqrv$Effect@$bctr$qqrvFont
                                                  • String ID: Authenticate by User Account$Authorized Privileges?
                                                  • API String ID: 3648685976-748096924
                                                  • Opcode ID: 98db26e1ce143a4307d0d1e9f732ade9e1fe5ae77f51588a7cac4914beb78e51
                                                  • Instruction ID: 65f83db367eb376e18239e502c421642a2bfb000b1d388fac1ea1baa1e123ba1
                                                  • Opcode Fuzzy Hash: 98db26e1ce143a4307d0d1e9f732ade9e1fe5ae77f51588a7cac4914beb78e51
                                                  • Instruction Fuzzy Hash: A3516B746002068BD700EF68C8857DE7BB5BF89304F1041B9E9459F396DB75AC4ACB94
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,0000FFE3,-0058FA1D,0000FFE3,005DFA4C,0056B57C,00000000), ref: 004035F5
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,0000FFE3,00000000,00000000,005DFA4C,0056B57C,00000000), ref: 00403615
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,0000FFE3,00000000,00000000,00000000,00000000,00000000,0000FFE3,00000000,00000000,005DFA4C,0056B57C,00000000), ref: 00403643
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,0059FA00,0001FFC6,005DFA4C,0056B57C,00000000), ref: 00403661
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,00000000,00000000,b+@,00000000,00000000,00000000,00000000,00000000,0000FFE3,00000000,00000000,00000000,00000000), ref: 00403685
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,0000FDE9,00000000,00000000,00000000,00000000,b+@,00000000,00000000), ref: 004036A9
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,00000000,00000000,b+@,00000000,00000000,0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004036D1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide
                                                  • String ID: b+@
                                                  • API String ID: 626452242-3032382117
                                                  • Opcode ID: 4820a0a75e2bf476c8fd3779b80016085da0b8406c32ca68cf152d2e82196442
                                                  • Instruction ID: 8573119aa07f5121c3997c493cbf6db6b3ab9e8cee12732c8da7be85d7fe3c89
                                                  • Opcode Fuzzy Hash: 4820a0a75e2bf476c8fd3779b80016085da0b8406c32ca68cf152d2e82196442
                                                  • Instruction Fuzzy Hash: B0416A757442067BEB20DE989C86FAF3B9DEB85751F148036FA08BF2C1C5B4AD014769
                                                  APIs
                                                  • @TcmTrayIcon@SetAnimate$qqro.Z39UARTASSIST(?,?), ref: 00447F8C
                                                  • @TcmImageSlider@SetImageIndex$qqri.Z39UARTASSIST(?,?), ref: 00447FB6
                                                  • @TcmTrayIcon@SetAnimate$qqro.Z39UARTASSIST(?,?), ref: 00447FCB
                                                  • @TcmTrayIcon@SetIcon$qqrp14Graphics@TIcon.Z39UARTASSIST(?,?), ref: 00447FE4
                                                  • @TcmImageSlider@SetImageIndex$qqri.Z39UARTASSIST(?,?), ref: 0044800B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Image$Icon@Tray$Animate$qqroIndex$qqriSlider@$Graphics@IconIcon$qqrp14
                                                  • String ID: $Close$Open
                                                  • API String ID: 146989294-122598363
                                                  • Opcode ID: 2814680cea603b04ac1691d91b66ea1138c3ab1e13a4e5da03db1be03e84606d
                                                  • Instruction ID: 60706f61da78f1756febc3528114eb4d428e862bc2fe34e682a390079ebb1bf3
                                                  • Opcode Fuzzy Hash: 2814680cea603b04ac1691d91b66ea1138c3ab1e13a4e5da03db1be03e84606d
                                                  • Instruction Fuzzy Hash: 1B51C0746041458BE700EF24D4857AA7BB2FF85304F2881B6D8489B3A7CB798D4EDB69
                                                  APIs
                                                  • htons.WS2_32(?), ref: 0047F4ED
                                                  • connect.WS2_32(00000011,?,0000001C), ref: 0047F521
                                                  • @TcmSocket@ErrorCheck$qqripc.Z39UARTASSIST(00000011,?,0000001C,?,00000011,00000011), ref: 0047F52F
                                                    • Part of subcall function 00480C48: WSAGetLastError.WS2_32(00000011,?,00000000,?,0047EA87,00000002), ref: 00480C57
                                                    • Part of subcall function 00480C48: @TcmSocket@ShowError$qqrpci.Z39UARTASSIST(00000011,?,00000000,?,0047EA87,00000002), ref: 00480C93
                                                  • htons.WS2_32(?), ref: 0047F55A
                                                  • connect.WS2_32(00000011,00000002,00000010), ref: 0047F576
                                                  • @TcmSocket@ErrorCheck$qqripc.Z39UARTASSIST(00000011,00000002,00000010,?), ref: 0047F584
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorSocket@$Check$qqripcconnecthtons$Error$qqrpciLastShow
                                                  • String ID: connect() failed$connect() failed
                                                  • API String ID: 2082332313-504624167
                                                  • Opcode ID: 304df6a2cdfeb5212f54584f7988ac3f847f24f8f5df882b1191e56af7564088
                                                  • Instruction ID: f22feb7388138ed8a50f6ef9f0ac68b0bb79c28eb12ad0fbfb37cdb674704187
                                                  • Opcode Fuzzy Hash: 304df6a2cdfeb5212f54584f7988ac3f847f24f8f5df882b1191e56af7564088
                                                  • Instruction Fuzzy Hash: 5E11A57121020596DB44EFB4C8C2BD637A8BF88300F1CC579AD4D9F24BDAB48485D774
                                                  APIs
                                                  • GetObjectA.GDI32(?,00000018,?), ref: 0050B389
                                                  • 73A1A570.USER32(00000000,?,00000018,?,00000000,0050B496,?,00000000,00000000,?,00000000,?), ref: 0050B3AC
                                                  • SelectObject.GDI32(?,?), ref: 0050B41A
                                                  • SelectObject.GDI32(0050BCCC,00000000), ref: 0050B429
                                                  • StretchBlt.GDI32(0050BCCC,00000000,00000000,?,?,?,00000000,00000000,00000004,?,00CC0020), ref: 0050B455
                                                  • SelectObject.GDI32(?,00000000), ref: 0050B463
                                                  • SelectObject.GDI32(0050BCCC,00000000), ref: 0050B471
                                                  • DeleteDC.GDI32(?), ref: 0050B487
                                                  • DeleteDC.GDI32(0050BCCC), ref: 0050B490
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Object$Select$Delete$A570Stretch
                                                  • String ID:
                                                  • API String ID: 1268976527-0
                                                  • Opcode ID: c845c295858798944110c23ea20b694058ba367a00c738697a0aeaf0f321959b
                                                  • Instruction ID: 7667d25a189fe37eff239463f1fef0e9a2cc0a368ea4cbf87d2069d204335575
                                                  • Opcode Fuzzy Hash: c845c295858798944110c23ea20b694058ba367a00c738697a0aeaf0f321959b
                                                  • Instruction Fuzzy Hash: E941DA75A40209AFEB50EAE8C896FAEBBBDFB49700F514415B614E7281D6759E008B60
                                                  APIs
                                                  • @TcmSocket@ControlHBCheckTimer$qqro.Z39UARTASSIST(?,00000001), ref: 0047F5B8
                                                    • Part of subcall function 0047E810: SetTimer.USER32(?,00000001,?,00000000), ref: 0047E849
                                                  • @TcmSocket@IsEmptyAddr$qqrp9TInetAddr.Z39UARTASSIST(?,00000001), ref: 0047F5D2
                                                  • getsockname.WS2_32(00000011,?,0000001C), ref: 0047F605
                                                  • @TcmSocket@ip_ntoa$qqrpx6IPDATApco.Z39UARTASSIST(?,00000001), ref: 0047F634
                                                  • htons.WS2_32(?), ref: 0047F672
                                                  • KillTimer.USER32(?,00000003,?,00000001), ref: 0047F719
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Socket@Timer$AddrAddr$qqrp9ApcoCheckControlEmptyInetKillSocket@ip_ntoa$qqrpx6Timer$qqrogetsocknamehtons
                                                  • String ID:
                                                  • API String ID: 985583281-0
                                                  • Opcode ID: 739e4a57b882156de1a761d053dfec345e46b659ce7b9547e239bc94ff9e9266
                                                  • Instruction ID: 2cf8ab8349858961be5e86f057d867a358fba929034930eb3bfff5141c682bb7
                                                  • Opcode Fuzzy Hash: 739e4a57b882156de1a761d053dfec345e46b659ce7b9547e239bc94ff9e9266
                                                  • Instruction Fuzzy Hash: EA419E709006469AC720EB74C844BEFBBF9BF84300F008D2EE4AA57251EB74694ACB95
                                                  APIs
                                                  • ResetEvent.KERNEL32(?,?,?,004788A8), ref: 00478DBD
                                                  • SetEvent.KERNEL32(?,?,?,?,004788A8), ref: 00478DC8
                                                  • SetCommMask.KERNEL32(?,00000000,?,?,?,?,004788A8), ref: 00478DD5
                                                  • CloseHandle.KERNEL32(?,?,00000000,?,?,?,?,004788A8), ref: 00478DE0
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,?,?,?,?,004788A8), ref: 00478DF0
                                                  • ReleaseMutex.KERNEL32(?,?,000000FF,?,?,00000000,?,?,?,?,004788A8), ref: 00478E11
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,000000FF,?,?,00000000,?,?,?,?,004788A8), ref: 00478E21
                                                  • ReleaseMutex.KERNEL32(?,?,000000FF,?,000000FF,?,?,00000000,?,?,?,?,004788A8), ref: 00478E42
                                                  • @cmSerialCommDriver32@TcmUart@LaunchThreads$qqro.Z39UARTASSIST(?,000000FF,?,000000FF,?,?,00000000,?,?,?,?,004788A8), ref: 00478E4C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommEventMutexObjectReleaseSingleWait$CloseDriver32@HandleLaunchMaskResetSerialThreads$qqroUart@
                                                  • String ID:
                                                  • API String ID: 1183545986-0
                                                  • Opcode ID: fafd286c0dee550cada0de7f98a929b3cd0706b57bb2dfb83324a585127757f4
                                                  • Instruction ID: 6e04ea8c939e93bea78a983525a1dc547a098b61aee1e99448d14bff2d3a5811
                                                  • Opcode Fuzzy Hash: fafd286c0dee550cada0de7f98a929b3cd0706b57bb2dfb83324a585127757f4
                                                  • Instruction Fuzzy Hash: 83212E35504005EBCB05EBA8CE45F9DBBB6BF84314F2042A9F1189B2B2DF319E42EB44
                                                  APIs
                                                  • @cmSerialCommDriver32@TcmUart@UpdateCommTimeouts$qqrv.Z39UARTASSIST ref: 00478E8C
                                                    • Part of subcall function 00478B44: SetCommTimeouts.KERNEL32(?,?), ref: 00478B8F
                                                  • ResetEvent.KERNEL32(?), ref: 00478E9D
                                                  • SetEvent.KERNEL32(?,?), ref: 00478EA8
                                                  • ResetEvent.KERNEL32(?,?,?), ref: 00478EBD
                                                  • SetEvent.KERNEL32(?,?,?,?), ref: 00478EC8
                                                  • @cmSerialCommDriver32@TcmUart@LaunchThreads$qqro.Z39UARTASSIST(?,?), ref: 00478EB2
                                                    • Part of subcall function 00478EF8: CreateThread.KERNEL32(00000000,00002000,?,?,00000000,00000000), ref: 00478F39
                                                    • Part of subcall function 00478EF8: CreateThread.KERNEL32(00000000,00002000,?,?,00000000,00000000), ref: 00478F72
                                                    • Part of subcall function 00478EF8: CreateThread.KERNEL32(00000000,00002000,?,?,00000000,00000000), ref: 00478FAB
                                                  • @cmSerialCommDriver32@TcmUart@LaunchThreads$qqro.Z39UARTASSIST ref: 00478ED4
                                                  • @cmSerialCommDriver32@TcmUart@NotifyCommError$qqri.Z39UARTASSIST ref: 00478EE5
                                                  • @cmSerialCommDriver32@TcmUart@Close$qqrv.Z39UARTASSIST ref: 00478EED
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Comm$Driver32@SerialUart@$Event$CreateThread$LaunchResetThreads$qqro$Close$qqrvError$qqriNotifyTimeoutsTimeouts$qqrvUpdate
                                                  • String ID:
                                                  • API String ID: 1898117476-0
                                                  • Opcode ID: d8143fab02cb319f058224bf9d545da3bf06d9196a1162998d9bb33d1668e478
                                                  • Instruction ID: 334013ab566967609b1a697080961f18655f8d5fc3dbd360a86ca3f979b4b200
                                                  • Opcode Fuzzy Hash: d8143fab02cb319f058224bf9d545da3bf06d9196a1162998d9bb33d1668e478
                                                  • Instruction Fuzzy Hash: 30117731904088EBDB51EBA8C54A9DDBBB2BF45304F2480DDE4546B363CB359F41E748
                                                  Strings
                                                  • Unresolved response expression!!!, xrefs: 00411CE9
                                                  • Not engough response buffer, xrefs: 00411BE4
                                                  • Corrupt response pattern, xrefs: 00411ACF
                                                  • Not engough response buffer, xrefs: 00411A46
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: Corrupt response pattern$Not engough response buffer$Not engough response buffer$Unresolved response expression!!!
                                                  • API String ID: 3850602802-2396646025
                                                  • Opcode ID: b4409134b50516c0ea69e916d4a1dac5f0c33edd5a5d9ea481b82bc27f325e3b
                                                  • Instruction ID: 64120a4abf1b30e22f612dd1c92f668aad55bb6aa15ed5352b400c0374dd3b6b
                                                  • Opcode Fuzzy Hash: b4409134b50516c0ea69e916d4a1dac5f0c33edd5a5d9ea481b82bc27f325e3b
                                                  • Instruction Fuzzy Hash: 5DD13D786092419FC314CF19C49196BB7F5BFA9314F24895EE6D587321E338E886CF8A
                                                  APIs
                                                  • @TcmEdit@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST(?,00000000,00000000), ref: 004AEFCE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Classes@ComponentEdit@$bctr$qqrp18
                                                  • String ID: AUTO$Debounce$It is recommended to set it above 1000ms, otherwise there is a risk of blue screen!$Serial hot-swap options$VJ$ms (
                                                  • API String ID: 2056218710-4166863433
                                                  • Opcode ID: 510b13da244ffd327ee2d9b06ffa1d74e48fc6499c7641d32d8487e846372cf3
                                                  • Instruction ID: 4af3f4c28480f63d36eea478739303090945db536db2d7df69cbf77751a3db29
                                                  • Opcode Fuzzy Hash: 510b13da244ffd327ee2d9b06ffa1d74e48fc6499c7641d32d8487e846372cf3
                                                  • Instruction Fuzzy Hash: E5A18370A001099BDB44EF94C4857EEBBB5FF98304F2081A6E801AB396DB38DE16DB55
                                                  APIs
                                                  • @Cmbitmap@TcmBitmap@$bctr$qqrv.Z39UARTASSIST ref: 00474BA9
                                                    • Part of subcall function 00509D20: MulDiv.KERNEL32(0000000B,?,00000048), ref: 00509D2D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Bitmap@$bctr$qqrvCmbitmap@
                                                  • String ID: About...$Cancel always on top$Window always on top$dlgHelp$dlgToggleOff$dlgToggleOn
                                                  • API String ID: 1434127231-1011513256
                                                  • Opcode ID: 7af7c1aa1f62cc8d5ff29f124b5dcebda806ea4ce42259e7f28c79e386082036
                                                  • Instruction ID: 1b95c449ca97225107dd68e3ee6865c3633b4ee47dc9df111ebb0af7247acb8a
                                                  • Opcode Fuzzy Hash: 7af7c1aa1f62cc8d5ff29f124b5dcebda806ea4ce42259e7f28c79e386082036
                                                  • Instruction Fuzzy Hash: D3A1A4705002068BDB50EF54C486BEEBBF5FF94304F1486A9ED446B386EB75DA06CBA1
                                                  APIs
                                                  • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 004D7DDD
                                                  • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 004D7DF9
                                                  • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 004D7E32
                                                  • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 004D7EAF
                                                  • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 004D7EC8
                                                  • VariantCopy.OLEAUT32(?), ref: 004D7EFD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                                                  • String ID:
                                                  • API String ID: 351091851-3916222277
                                                  • Opcode ID: 4bfcbe52899001bc3ece2cbb1380738b48f422fa4d72e0de6ccb9cba5f5afba6
                                                  • Instruction ID: d22a4d8d0b2e7035bedb7195ddcdc737dc313482331ff9d167a91180ed58927e
                                                  • Opcode Fuzzy Hash: 4bfcbe52899001bc3ece2cbb1380738b48f422fa4d72e0de6ccb9cba5f5afba6
                                                  • Instruction Fuzzy Hash: A951DA75A046299BCB22DB59C8A5BD9B7BCBF48304F4041DBE508A7302E634AF858F65
                                                  APIs
                                                  • GetKeyboardLayoutList.USER32(00000040,?,00000000,0051B88B,?,023C1C14,?,0051B8ED,00000000,?,00530117,00531A48,?,00000000,0053016C), ref: 0051B736
                                                  • RegOpenKeyExA.ADVAPI32(80000002,00000000), ref: 0051B79E
                                                  • RegQueryValueExA.ADVAPI32(?,layout text,00000000,00000000,?,00000100,00000000,0051B847,?,80000002,00000000), ref: 0051B7D8
                                                  • RegCloseKey.ADVAPI32(?,0051B84E,00000000,?,00000100,00000000,0051B847,?,80000002,00000000), ref: 0051B841
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseKeyboardLayoutListOpenQueryValue
                                                  • String ID: 4K$System\CurrentControlSet\Control\Keyboard Layouts\%.8x$layout text
                                                  • API String ID: 1703357764-3824119750
                                                  • Opcode ID: e486251d16b8d8e5d891330212adf6dd16e5ef6ee4f448a18a5aef23c58a3dae
                                                  • Instruction ID: be63b80b4a9faa82158fbe666d90335618c9cee78fb56126c8d66a35d80b7373
                                                  • Opcode Fuzzy Hash: e486251d16b8d8e5d891330212adf6dd16e5ef6ee4f448a18a5aef23c58a3dae
                                                  • Instruction Fuzzy Hash: CD414674A00209AFEB10DF55C985FDEBBF8FB88704F5040A5E904AB252D774AE80CB65
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(Iphlpapi.dll), ref: 0046A72A
                                                  • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 0046A73B
                                                  • FreeLibrary.KERNEL32(00000000,Iphlpapi.dll), ref: 0046A802
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Library$AddressFreeLoadProc
                                                  • String ID: Bluetooth$GetAdaptersInfo$Iphlpapi.dll$Virtual
                                                  • API String ID: 145871493-784332736
                                                  • Opcode ID: fe8430d5dad853f38c0179428d72c05d35437be6b8b7cc6293ce586ff15f0f72
                                                  • Instruction ID: a5f27b06d034782d1914eca0d8ba3c788742aed1229dedd36f3bdcd4f73960cf
                                                  • Opcode Fuzzy Hash: fe8430d5dad853f38c0179428d72c05d35437be6b8b7cc6293ce586ff15f0f72
                                                  • Instruction Fuzzy Hash: 16210635204B0267C710AA94CCC0BB77AECAB84756F04443EBD4466241FB78D9918BBB
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00411DA5
                                                  • ReleaseMutex.KERNEL32(00000000,00000000,000000FF), ref: 00411DC1
                                                  • ReleaseMutex.KERNEL32(00000000,00000000,000000FF), ref: 00411DF4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MutexRelease$ObjectSingleWait
                                                  • String ID: $
                                                  • API String ID: 257779224-227171996
                                                  • Opcode ID: dc0b63deab3a9c7ce4d53f74b14c3a519478b24a34b06a5a89137e75e9d5cddc
                                                  • Instruction ID: 7187abd96b5718ddd86d7d96a898cabc0d65ffd12875382868d76317ca361d83
                                                  • Opcode Fuzzy Hash: dc0b63deab3a9c7ce4d53f74b14c3a519478b24a34b06a5a89137e75e9d5cddc
                                                  • Instruction Fuzzy Hash: 1D31D1316043019BD720DFA8C9C0A9BB7E5BF84300F54891AEA498B356D738E8D1C7A5
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 0047996C
                                                  • @cmSerialCommDriver32@TcmUart@PurgeRead$qqro.Z39UARTASSIST ref: 0047997C
                                                    • Part of subcall function 00479D20: PurgeComm.KERNEL32(EC75FF18,00000008), ref: 00479D4F
                                                  • @cmSerialCommDriver32@TcmUart@SendData$qqrpvi.Z39UARTASSIST ref: 00479996
                                                    • Part of subcall function 0047986C: WaitForSingleObject.KERNEL32(?,000000FF), ref: 0047989B
                                                    • Part of subcall function 0047986C: ReleaseMutex.KERNEL32(?,?,?,000000FF), ref: 004798C7
                                                    • Part of subcall function 0047986C: SetEvent.KERNEL32(?,?,?,?,000000FF), ref: 004798DB
                                                  • Sleep.KERNEL32(00000001), ref: 004799BB
                                                  • @cmSerialCommDriver32@TcmUart@RecvData$qqrpvi.Z39UARTASSIST(00000001), ref: 004799DB
                                                  • GetTickCount.KERNEL32 ref: 00479A0E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Comm$Driver32@SerialUart@$CountData$qqrpviPurgeTick$EventMutexObjectRead$qqroRecvReleaseSendSingleSleepWait
                                                  • String ID: 2
                                                  • API String ID: 1794962170-450215437
                                                  • Opcode ID: a9ede89a54c0e5bfe6f411f696fbb3f4cd2e7b342303b416f2619b4652a33d5a
                                                  • Instruction ID: 4b2440201b6e667131e00eff1ecbde0c6fa8e38b1885701fb99a1e6198272ca0
                                                  • Opcode Fuzzy Hash: a9ede89a54c0e5bfe6f411f696fbb3f4cd2e7b342303b416f2619b4652a33d5a
                                                  • Instruction Fuzzy Hash: 2531F5B0E0020ADBDF14DFA8C5856EEB7B1BF81300F20C55AE819A7354D7789E41DB96
                                                  APIs
                                                  • SetCurrentDirectoryA.KERNEL32(h]K,?,004B5D68,00000000), ref: 0055B655
                                                  • GetCurrentDirectoryA.KERNEL32(00000104,?,h]K,?,004B5D68,00000000), ref: 0055B670
                                                    • Part of subcall function 0055C598: GetLastError.KERNEL32(0055B599,?,?,?,?,00000000,?,?,0055B432,?,?,?,?,00000001,?), ref: 0055C598
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CurrentDirectory$ErrorLast
                                                  • String ID: :$:$=$h]K
                                                  • API String ID: 1128942804-1849354933
                                                  • Opcode ID: 5f370387a1bb86e028971c6f31d8c866fa18eed48affd80ba159f0542e573d24
                                                  • Instruction ID: 475fcfef4a2e3d0dadd7a2c6fbfbe3ef918fa5c963be56dca1f1fa5cdacb1a3c
                                                  • Opcode Fuzzy Hash: 5f370387a1bb86e028971c6f31d8c866fa18eed48affd80ba159f0542e573d24
                                                  • Instruction Fuzzy Hash: 2E01F07040439D5EEB1197F4486D7DD7F68BB51342F5441DBEC805A142D7B15B8CCB52
                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,004E2A96,?,00000000,?,00000001,004E2B36,004E0FEF,004E1037,?,00000000), ref: 004E2A01
                                                  • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,004E2A96,?,00000000,?,00000001,004E2B36,004E0FEF,004E1037), ref: 004E2A07
                                                  • GetStdHandle.KERNEL32(000000F5,004E2A50,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,004E2A96,?,00000000), ref: 004E2A1C
                                                  • WriteFile.KERNEL32(00000000,000000F5,004E2A50,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,004E2A96,?,00000000), ref: 004E2A22
                                                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 004E2A40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileHandleWrite$Message
                                                  • String ID: Error$Runtime error at 00000000
                                                  • API String ID: 1570097196-2970929446
                                                  • Opcode ID: 04b273dd8596842fc2a1c55a2c8e1bec6d466086c331dca4ba82adae9ef7cfcd
                                                  • Instruction ID: 93bbc4d2def9347cada23167616a7b420d29ec9a2ae87a3e676a291353af86c6
                                                  • Opcode Fuzzy Hash: 04b273dd8596842fc2a1c55a2c8e1bec6d466086c331dca4ba82adae9ef7cfcd
                                                  • Instruction Fuzzy Hash: C5F0F6606443C138FE70A3A04F4EF5A2ACCB7D4B21F145616F6646A0D6D6F854C4E7A6
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 004641CE
                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000,?,000000FF), ref: 0046426C
                                                  • WaitForSingleObject.KERNEL32(?,?,?,00000001,00000000,?,000000FF), ref: 00464276
                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0046428F
                                                  • CloseHandle.KERNEL32(?), ref: 004642A0
                                                  • CloseHandle.KERNEL32(?,?), ref: 004642A9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandleObjectSingleWait$CountReleaseSemaphoreTick
                                                  • String ID:
                                                  • API String ID: 159240036-0
                                                  • Opcode ID: 1e0b98fc2e76c7331209d2131a8808b1c9c7b35afe34203a8ba54eda9ba62e45
                                                  • Instruction ID: 4d443b7ab7fd6bb4e4cb013145510df5bc64e55f2b71a9286e272b33f4ac1013
                                                  • Opcode Fuzzy Hash: 1e0b98fc2e76c7331209d2131a8808b1c9c7b35afe34203a8ba54eda9ba62e45
                                                  • Instruction Fuzzy Hash: CC319E756003009BDB18DFA5C9C5E677BEAFFC4300B248989F9568B286D638FC01CB65
                                                  APIs
                                                  • @TPerformanceGraph@ScrollGraph$qqrv.Z39UARTASSIST ref: 004B9A60
                                                  • @TPerformanceGraph@ShiftY$qqrv.Z39UARTASSIST ref: 004B9A68
                                                  • @TPerformanceGraph@FirstY$qqrv.Z39UARTASSIST ref: 004B9A75
                                                  • @TPerformanceGraph@NextY$qqri.Z39UARTASSIST ref: 004B9AF0
                                                  • @TPerformanceGraph@RoundUp$qqrll.Z39UARTASSIST ref: 004B9B0D
                                                  • @TPerformanceGraph@SetScale$qqrl.Z39UARTASSIST ref: 004B9B29
                                                  • @TPerformanceGraph@LastY$qqri.Z39UARTASSIST ref: 004B9B3C
                                                  • @TPerformanceGraph@DisplayPoints$qqrl.Z39UARTASSIST ref: 004B9B46
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Graph@Performance$Y$qqriY$qqrv$DisplayFirstGraph$qqrvLastNextPoints$qqrlRoundScale$qqrlScrollShiftUp$qqrll
                                                  • String ID:
                                                  • API String ID: 284696991-0
                                                  • Opcode ID: d1de98e2a706a2c0dacba0cd835b123ea90aada9b730ee69820bd2fd37dea54f
                                                  • Instruction ID: 9049e48e2602ba1b4ffb6ba20462fe3c7575072d93e8957a0392fd1ac934c850
                                                  • Opcode Fuzzy Hash: d1de98e2a706a2c0dacba0cd835b123ea90aada9b730ee69820bd2fd37dea54f
                                                  • Instruction Fuzzy Hash: 1A31B234E00149EBCB04DF99C5919EDB7B2BB88304F2482AAD915A7355D734AF02DB94
                                                  APIs
                                                  • CharNextA.USER32(00000000,?,00000000,00000000,?,004E12AE), ref: 004E1153
                                                  • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,004E12AE), ref: 004E115D
                                                  • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,004E12AE), ref: 004E117A
                                                  • CharNextA.USER32(00000000,?,00000000,00000000,?,004E12AE), ref: 004E1184
                                                  • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,004E12AE), ref: 004E11AD
                                                  • CharNextA.USER32(00000000,00000000,00000000,?,00000000,00000000,?,004E12AE), ref: 004E11B7
                                                  • CharNextA.USER32(00000000,00000000,00000000,?,00000000,00000000,?,004E12AE), ref: 004E11DB
                                                  • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,004E12AE), ref: 004E11E5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CharNext
                                                  • String ID:
                                                  • API String ID: 3213498283-0
                                                  • Opcode ID: 3badd8ded02f2cc0bf05c13351edb3f1e0da4052d331d2460175cbe27ce7893a
                                                  • Instruction ID: 5e3d41f4077ea3c59ab88d56aac1ef0399384038fba5d4ff1e729ffbe464062d
                                                  • Opcode Fuzzy Hash: 3badd8ded02f2cc0bf05c13351edb3f1e0da4052d331d2460175cbe27ce7893a
                                                  • Instruction Fuzzy Hash: 3421E5647C83D519DB31697A0CC0267EB8E5B6E35272805A7E3C28B32BC57D4C87822E
                                                  APIs
                                                  • RaiseException.KERNEL32(0EEDFADE,C0000025,00000008,?,00000004,?,?,?,?,?,?,00000004,?,00000000,?), ref: 00565B77
                                                  • RaiseException.KERNEL32(0EEFFACE,00000001,00000003,00000000), ref: 00565D60
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionRaise
                                                  • String ID: cctrAddr$typeID || (reThrow && (flags & XDF_ISDELPHIEXCEPTION))$xx.cpp$xx.cpp
                                                  • API String ID: 3997070919-2095381217
                                                  • Opcode ID: c86bf7dcfa0f40a378c57e65e13b1e0b5fac9fbd5ed6924edd27fac6531bdd62
                                                  • Instruction ID: fd0379e0c35f48fb0c2be5c0e42a8150c8ecb094e48b2b9819a372bc6240a4b0
                                                  • Opcode Fuzzy Hash: c86bf7dcfa0f40a378c57e65e13b1e0b5fac9fbd5ed6924edd27fac6531bdd62
                                                  • Instruction Fuzzy Hash: 5FA12374A11608AFCB15DF94D885E9EBBB1FF88314F148159F9096B3A2E731E881CF94
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CountTick
                                                  • String ID: authority/$http://free.cmsoft.cn/assistcenter/$http://free.scomm.cn/assistcenter/$http://www.cmsoft.cn/assistcenter/
                                                  • API String ID: 536389180-3997990144
                                                  • Opcode ID: 782c9274183de0dab6517ec020427a47df8c0d8770c5061df4d5ed5a9bbf3c6d
                                                  • Instruction ID: 87df9122819ee2312e752600508e17578de697b8473abc6b6bc82a9ba06962ac
                                                  • Opcode Fuzzy Hash: 782c9274183de0dab6517ec020427a47df8c0d8770c5061df4d5ed5a9bbf3c6d
                                                  • Instruction Fuzzy Hash: FE514D7090060ACBCB20EF50D5456EEB7F9FF81304F20862BD45697692EB34EE4ADB59
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,0000FFE3,-0058FA1D,0000FFE3), ref: 00403480
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,0000FFE3,00000000,00000000), ref: 004034A3
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,0000FFE3,00000000,00000000,0000FDE9,00000000,?,0000FFE3,00000000,00000000), ref: 004034D4
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,0059FA00,0001FFC6), ref: 004034F5
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000,0000FDE9,00000000,?,0000FFE3,00000000,00000000,0000FDE9,00000000), ref: 00403516
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00403538
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040355D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide
                                                  • String ID:
                                                  • API String ID: 626452242-0
                                                  • Opcode ID: c156d4c659ff4f9670b136affeccdb2b2cdabe89d7a6e4e3d9ea1266db520ddb
                                                  • Instruction ID: ae9a55ba65e15d0795b0522b51f243cdd16810031941c00c15659ae6df13ca43
                                                  • Opcode Fuzzy Hash: c156d4c659ff4f9670b136affeccdb2b2cdabe89d7a6e4e3d9ea1266db520ddb
                                                  • Instruction Fuzzy Hash: E041A6757442067BEB20DE989C86FAB2B9CEB85755F14403AFA08BF2C0C5B4ED054769
                                                  APIs
                                                  • @TcmSocket@TryLockMultiClient$qqrv.Z39UARTASSIST ref: 0047DD64
                                                    • Part of subcall function 0047DD14: WaitForSingleObject.KERNEL32(?,00000000,?,?,0047FB39), ref: 0047DD2F
                                                  • GetTickCount.KERNEL32 ref: 0047DDB9
                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 0047DDF2
                                                  • @TcmSocket@ComboBox_ServerClientInsert$qqrp9TInetAddr.Z39UARTASSIST ref: 0047DE05
                                                  • GetTickCount.KERNEL32 ref: 0047DE9E
                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 0047DEC9
                                                  • @TcmSocket@ComboBox_ServerClientInsert$qqrp9TInetAddr.Z39UARTASSIST ref: 0047DED5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Socket@$AddrBox_ClientComboCountInetInsert$qqrp9ReleaseSemaphoreServerTick$Client$qqrvLockMultiObjectSingleWait
                                                  • String ID:
                                                  • API String ID: 1587921580-0
                                                  • Opcode ID: 09ff6e6a3e07f92cabfe21d4e45b2276138fd3d4175ba04fe11d6e10ccdc3320
                                                  • Instruction ID: b4cbe6b9cff28158001a53acab8ced1c930543323a390ff616525c3174bf6021
                                                  • Opcode Fuzzy Hash: 09ff6e6a3e07f92cabfe21d4e45b2276138fd3d4175ba04fe11d6e10ccdc3320
                                                  • Instruction Fuzzy Hash: 93513671A10600DFCB25DF68C484B9ABBF5BF98300F18C59AE9499F346D774E940CBA5
                                                  APIs
                                                  • SHGetMalloc.SHELL32(?), ref: 004A9A3E
                                                  • SHGetDesktopFolder.SHELL32(?,00000000,004A9B9F), ref: 004A9A88
                                                  • SetErrorMode.KERNEL32(00000001,00000000,004A9B9F), ref: 004A9B09
                                                  • SHBrowseForFolder.SHELL32(?), ref: 004A9B23
                                                  • SetErrorMode.KERNEL32(?,004A9B51,00000001,00000000,004A9B9F), ref: 004A9B3C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorFolderMode$BrowseDesktopMalloc
                                                  • String ID: t@
                                                  • API String ID: 2427564971-3653134846
                                                  • Opcode ID: 5b458264c717bfc54950d2179e95f2ad42eee2703ca53ee2d3c58a2d082c64db
                                                  • Instruction ID: d90214380e2e8d51b55405a3def6276d5004cd902ac344294a7057be3de46780
                                                  • Opcode Fuzzy Hash: 5b458264c717bfc54950d2179e95f2ad42eee2703ca53ee2d3c58a2d082c64db
                                                  • Instruction Fuzzy Hash: 654106B1A00248AFDB11EFA9D885A9EBBF8FB4D300F51446AF504E7661D779AD04CB24
                                                  APIs
                                                  • @TSyncUart@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004435C6
                                                  • @TSyncUart@UpdateSettings$qqrp12TUartOptionso.Z39UARTASSIST(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004435D8
                                                  • @TSyncUart@Open$qqrv.Z39UARTASSIST(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004435DF
                                                  • @TSyncUart@SendData$qqrpvi.Z39UARTASSIST(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00443628
                                                  • @TSyncUart@Close$qqrv.Z39UARTASSIST(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0044362F
                                                    • Part of subcall function 0043B7F4: FindWindowA.USER32(UartAssist,00000000), ref: 0043B822
                                                    • Part of subcall function 0043B7F4: SendMessageA.USER32(00000000,0000004A,00000065), ref: 0043B83C
                                                    • Part of subcall function 0043B7F4: FindWindowExA.USER32(00000000,00000000,UartAssist,00000000), ref: 0043B84B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sync$Uart@$FindSendWindow$Classes@Close$qqrvComponentData$qqrpviMessageOpen$qqrvOptionsoSettings$qqrp12UartUart@$bctr$qqrp18Update
                                                  • String ID: 4K
                                                  • API String ID: 3428542593-1660439029
                                                  • Opcode ID: 2cd96f8b5d675d29e262218f857c9b9cd453320ce713b6ad372630a187bf62fd
                                                  • Instruction ID: 5c204ce964a171fa67c9db98c4cfae9398af1c9c38a530aa13597a670f21d059
                                                  • Opcode Fuzzy Hash: 2cd96f8b5d675d29e262218f857c9b9cd453320ce713b6ad372630a187bf62fd
                                                  • Instruction Fuzzy Hash: E841F971E002056BDB20EF79DC42BDEB7F59B5CB09F14952AE808B7341EA38D9058B68
                                                  APIs
                                                  • htons.WS2_32(00000000), ref: 0047F88C
                                                  • htons.WS2_32(00000000), ref: 0047F8CD
                                                  • sendto.WS2_32(?,00000000,?,00000000,?,00000010), ref: 0047F8F8
                                                  • WSAGetLastError.WS2_32(00000000), ref: 0047F912
                                                  • @TcmSocket@ErrorCheck$qqripc.Z39UARTASSIST(00000000), ref: 0047F931
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Errorhtons$Check$qqripcLastSocket@sendto
                                                  • String ID: send to() failed
                                                  • API String ID: 4154557079-2875333197
                                                  • Opcode ID: 07e97286f0547e7f9d91298c2abd49e51bd4185721cdf0d1fca6903d874d8c57
                                                  • Instruction ID: 7655ed4f20519f67460c23b93d2ed35d49928e5c4465e55d0836e26f93fd85c8
                                                  • Opcode Fuzzy Hash: 07e97286f0547e7f9d91298c2abd49e51bd4185721cdf0d1fca6903d874d8c57
                                                  • Instruction Fuzzy Hash: 8531E8B2D04204ABCB10EF54C8817DAB7A4EF84700F18C57F9D4D9B356E7789948D7A6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: \\.\COM%d
                                                  • API String ID: 0-2455948239
                                                  • Opcode ID: c8111d8f4ab64f38f67263a0a89a723186819a31ab26167a455d676c816ce93e
                                                  • Instruction ID: 2d824ae583e20eac903e5a317bb158e11c9874f987e32357be0eae05c866315f
                                                  • Opcode Fuzzy Hash: c8111d8f4ab64f38f67263a0a89a723186819a31ab26167a455d676c816ce93e
                                                  • Instruction Fuzzy Hash: 6C21F971109381A6DB35AA348CC1BAB3BC47B06714F1C869AEED49F2C7D3A9C885D316
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: RO
                                                  • API String ID: 0-2329933643
                                                  • Opcode ID: 63ef96a35334208f9dc6371353a76f04cf93ccd03a438e65eac26a00ac59712e
                                                  • Instruction ID: b49c87e506332521191d714f5f88b4d9585e939fde2737e39b52ebe7e8cabfbd
                                                  • Opcode Fuzzy Hash: 63ef96a35334208f9dc6371353a76f04cf93ccd03a438e65eac26a00ac59712e
                                                  • Instruction Fuzzy Hash: 8B11B770B4225D56DB50BA3A8809B7B7BC8AF50798F16002EBF45D7342CE2CCC058659
                                                  APIs
                                                  • @cmSerialCommDriver32@TcmUart@fSetPort$qqr15TCommPortNumber.Z39UARTASSIST ref: 0043CEB1
                                                    • Part of subcall function 0047919C: @cmSerialCommDriver32@TcmUart@Close$qqrv.Z39UARTASSIST ref: 004791CE
                                                    • Part of subcall function 0047919C: @cmSerialCommDriver32@TcmUart@Open$qqrv.Z39UARTASSIST ref: 004791DF
                                                  • @cmSerialCommDriver32@TcmUart@LoadSettings$qqr17System@AnsiString.Z39UARTASSIST ref: 0043CEE6
                                                    • Part of subcall function 0047ADE0: @cmSerialCommDriver32@TcmUart@UpdateRegistryOptions$qqr17System@AnsiStringp12TUartOptionso.Z39UARTASSIST ref: 0047AE22
                                                    • Part of subcall function 0047ADE0: @cmSerialCommDriver32@TcmUart@UpdateSettings$qqrp12TUartOptionso.Z39UARTASSIST ref: 0047AE33
                                                  • @cmSerialCommDriver32@TcmUart@fGetParity$qqrv.Z39UARTASSIST ref: 0043CF3E
                                                  • @cmSerialCommDriver32@TcmUart@fGetDataBits$qqrv.Z39UARTASSIST ref: 0043CF59
                                                  • @cmSerialCommDriver32@TcmUart@fGetStopBits$qqrv.Z39UARTASSIST ref: 0043CF74
                                                    • Part of subcall function 00444BD8: @TcmTrayIcon@SetHint$qqr17System@AnsiString.Z39UARTASSIST(?,?), ref: 00444C8B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Comm$Driver32@Serial$Uart@$Uart@f$AnsiSystem@$Bits$qqrvOptionsoStringUartUpdate$Close$qqrvDataHint$qqr17Icon@LoadNumberOpen$qqrvOptions$qqr17Parity$qqrvPortPort$qqr15RegistrySettings$qqr17Settings$qqrp12StopStringp12Tray
                                                  • String ID: UartAssist
                                                  • API String ID: 2229213142-377352531
                                                  • Opcode ID: 59d9f4d959a70cfadacd68d5f4c218fec602333023c911f611942cafa23ec3d8
                                                  • Instruction ID: f2eef261fba652e253966fb4947687aee0937985c2d9f1f4c15a5be3957191d9
                                                  • Opcode Fuzzy Hash: 59d9f4d959a70cfadacd68d5f4c218fec602333023c911f611942cafa23ec3d8
                                                  • Instruction Fuzzy Hash: 8C314B34600505CFC700EF54D8C9AADB7B2FF89304F5891BAEC086B366DB35994ADB95
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Object$Select$BrushCreateDeleteSolid
                                                  • String ID:
                                                  • API String ID: 1979645813-0
                                                  • Opcode ID: d5c2f4e42299b3013618045e9eeea4cb0ee026f5a58027d7f978e3f351647acb
                                                  • Instruction ID: 02417fd2a81681f653aaa2c8b4c65306ee42eb62f8acb76609727498e9179794
                                                  • Opcode Fuzzy Hash: d5c2f4e42299b3013618045e9eeea4cb0ee026f5a58027d7f978e3f351647acb
                                                  • Instruction Fuzzy Hash: D8219475601215AFDB00EF68C989DAABFACFF48354B148555B948CB312D634EE81CBA4
                                                  APIs
                                                  • GetEnvironmentVariableA.KERNEL32(00000000,?,00000104,?,?,?,?,0055C12A,004B5EAE,00000000,?,?,004B5EAD), ref: 0055B754
                                                  • SetEnvironmentVariableA.KERNEL32(0000003D,?,00000000,?,00000104,?,?,?,?,0055C12A,004B5EAE,00000000,?,?,004B5EAD), ref: 0055B773
                                                    • Part of subcall function 0055C598: GetLastError.KERNEL32(0055B599,?,?,?,?,00000000,?,?,0055B432,?,?,?,?,00000001,?), ref: 0055C598
                                                  • SetCurrentDirectoryA.KERNEL32(?,00000000,?,00000104,?,?,?,?,0055C12A,004B5EAE,00000000,?,?,004B5EAD), ref: 0055B783
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnvironmentVariable$CurrentDirectoryErrorLast
                                                  • String ID: :$=
                                                  • API String ID: 2603090644-2134709475
                                                  • Opcode ID: 9f3153722fce537b4b3626254bc113d8b258944ac35e62ed02a55472adddc1d2
                                                  • Instruction ID: b12bd8f127694c05211980277f82ab2e23e2df37182ae29b43d3f1c763eb4827
                                                  • Opcode Fuzzy Hash: 9f3153722fce537b4b3626254bc113d8b258944ac35e62ed02a55472adddc1d2
                                                  • Instruction Fuzzy Hash: AF11E7304083C7A8E7128778486979AFFB8FF96305F14818ADDD457243D775A60DC7A2
                                                  APIs
                                                  • 73A1A570.USER32(00000000), ref: 004F02BA
                                                  • GetTextMetricsA.GDI32(00000000), ref: 004F02C3
                                                    • Part of subcall function 00509A94: CreateFontIndirectA.GDI32(?), ref: 00509BD2
                                                  • SelectObject.GDI32(00000000,00000000), ref: 004F02D2
                                                  • GetTextMetricsA.GDI32(00000000,?), ref: 004F02DF
                                                  • SelectObject.GDI32(00000000,00000000), ref: 004F02E6
                                                  • GetSystemMetrics.USER32(00000006), ref: 004F0314
                                                  • GetSystemMetrics.USER32(00000006), ref: 004F032E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Metrics$ObjectSelectSystemText$A570CreateFontIndirect
                                                  • String ID:
                                                  • API String ID: 1816951023-0
                                                  • Opcode ID: c7d72354c049557daa1d80b91f4b1a96e9e0f9c256078fc4354714863e97fd57
                                                  • Instruction ID: 2340eaf852b20d263ab14a6fb90c851c5a94bf6bddbcbeffeb3613bea469ec85
                                                  • Opcode Fuzzy Hash: c7d72354c049557daa1d80b91f4b1a96e9e0f9c256078fc4354714863e97fd57
                                                  • Instruction Fuzzy Hash: C111ADA17043452BE310B6B88CCAB6B6ACCABC8354F441425FB858B393D9699C54C766
                                                  APIs
                                                  • SelectObject.GDI32(?,?), ref: 0050B41A
                                                  • SelectObject.GDI32(0050BCCC,00000000), ref: 0050B429
                                                  • StretchBlt.GDI32(0050BCCC,00000000,00000000,?,?,?,00000000,00000000,00000004,?,00CC0020), ref: 0050B455
                                                  • SelectObject.GDI32(?,00000000), ref: 0050B463
                                                  • SelectObject.GDI32(0050BCCC,00000000), ref: 0050B471
                                                  • DeleteDC.GDI32(?), ref: 0050B487
                                                  • DeleteDC.GDI32(0050BCCC), ref: 0050B490
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ObjectSelect$Delete$Stretch
                                                  • String ID:
                                                  • API String ID: 1458357782-0
                                                  • Opcode ID: 5d5cab8245a741fdec907fec33ca2535f5960f16d2f6d1ef5f82df5c9e4a08e6
                                                  • Instruction ID: 06436444a3578eadd4d879fe69e3bc252c457021335631dd95acd4bff13d3596
                                                  • Opcode Fuzzy Hash: 5d5cab8245a741fdec907fec33ca2535f5960f16d2f6d1ef5f82df5c9e4a08e6
                                                  • Instruction Fuzzy Hash: B0119C72E40206AFEB50DAE8C99AFAFBBFDBB48700F004414B614E7281C6759D01C7A0
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 004F2335
                                                  • GetTickCount.KERNEL32 ref: 004F2357
                                                    • Part of subcall function 004F21D8: SendMessageA.USER32(00000000,00000140,?,?), ref: 004F21F4
                                                  • SendMessageA.USER32(00000000,0000014E,000000FF,00000000), ref: 004F2439
                                                  • SendMessageA.USER32(00000000,00000142,00000000,00000000), ref: 004F2489
                                                    • Part of subcall function 004F2204: SendMessageA.USER32(00000000,00000140,?,?), ref: 004F2245
                                                    • Part of subcall function 004F2204: SendMessageA.USER32(00000000,0000014E,000000FF,00000000), ref: 004F2271
                                                    • Part of subcall function 004F2204: SendMessageA.USER32(00000000,00000142,00000000,00000000), ref: 004F22A5
                                                  • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 004F25D1
                                                  • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 004F261E
                                                    • Part of subcall function 004F110C: SendMessageA.USER32(00000000,00000157,00000000,00000000), ref: 004F1120
                                                    • Part of subcall function 004F1130: SendMessageA.USER32(00000000,0000014F,00000000,00000000), ref: 004F114D
                                                    • Part of subcall function 004F1130: InvalidateRect.USER32(00000000,000000FF,000000FF), ref: 004F116A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$Send$CountPeekTick$InvalidateRect
                                                  • String ID:
                                                  • API String ID: 2065907832-0
                                                  • Opcode ID: 4ed37ae40a9c2b951a547f4b9c97b79d7d1880092b75aa2cc9380d092d72c9a8
                                                  • Instruction ID: 1d613fec74582479de3dd8aabdd5bb65deffb3991cbf356f713e1d662a026774
                                                  • Opcode Fuzzy Hash: 4ed37ae40a9c2b951a547f4b9c97b79d7d1880092b75aa2cc9380d092d72c9a8
                                                  • Instruction Fuzzy Hash: 85B16A30A0014DDFDF01EBA5CA95BEEB7B5AF45304F2440A6F504AB356CB78AE06DB19
                                                  APIs
                                                  • @Cmlabel@TFontEffect@PutText$qqrp16Graphics@TCanvasii17System@AnsiString.Z39UARTASSIST(?,?,00000000,0048523F), ref: 0048516C
                                                    • Part of subcall function 00484FB8: DrawTextA.USER32(00000000,00000000,00000000,?,00000800), ref: 0048502C
                                                  • @Cmlabel@TFontEffect@PutText$qqrp16Graphics@TCanvasii17System@AnsiString.Z39UARTASSIST(?,?,00000000,0048523F), ref: 004851BD
                                                  • @Cmlabel@TFontEffect@PutText$qqrp16Graphics@TCanvasii17System@AnsiString.Z39UARTASSIST(?,?,?,?,00000000,0048523F), ref: 004851D3
                                                  • @Cmlabel@TFontEffect@PutText$qqrp16Graphics@TCanvasii17System@AnsiString.Z39UARTASSIST(?,?,?,?,?,?,00000000,0048523F), ref: 004851E9
                                                  • @Cmlabel@TFontEffect@PutText$qqrp16Graphics@TCanvasii17System@AnsiString.Z39UARTASSIST(?,?,?,?,?,?,?,?,00000000,0048523F), ref: 004851FF
                                                  • @Cmlabel@TFontEffect@PutText$qqrp16Graphics@TCanvasii17System@AnsiString.Z39UARTASSIST(?,?,00000000,0048523F), ref: 00485224
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AnsiCanvasii17Cmlabel@Effect@FontGraphics@StringSystem@Text$qqrp16$DrawText
                                                  • String ID:
                                                  • API String ID: 3038429608-0
                                                  • Opcode ID: a8f57b77f83aefd15441d5700b6e26afcce43f6a985d66281579fa8410f5b7e1
                                                  • Instruction ID: 00e738a75c989ea7971de33a5513dadcede0697ec3fea50af49d9c85d2fd69a6
                                                  • Opcode Fuzzy Hash: a8f57b77f83aefd15441d5700b6e26afcce43f6a985d66281579fa8410f5b7e1
                                                  • Instruction Fuzzy Hash: 6C411B74B00509AFCB04EF5DC881A9EB7F9EF88314B14C46AB919CB356CA34EE41CB94
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000080,00000000,-000000F6,?,00563682,Abnormal program termination,00564323,?,?,00000000,?,00563693,00000016,005656BA), ref: 005634E7
                                                  • MessageBoxA.USER32(00000000,00000000,00000001,00000000), ref: 00563532
                                                  • GetStdHandle.KERNEL32(000000F4,00000000,-000000F6,?,00563682,Abnormal program termination,00564323,?,?,00000000,?,00563693,00000016,005656BA,?), ref: 0056353E
                                                  • WriteFile.KERNEL32(00000000,0059D2E8,00000002,?,00000000,000000F4,00000000,-000000F6,?,00563682,Abnormal program termination,00564323,?,?,00000000), ref: 00563553
                                                  • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,0059D2E8,00000002,?,00000000,000000F4,00000000,-000000F6,?,00563682,Abnormal program termination), ref: 00563568
                                                  • WriteFile.KERNEL32(00000000,0059D2EB,00000002,?,00000000,00000000,00000000,00000000,?,00000000,00000000,0059D2E8,00000002,?,00000000,000000F4), ref: 0056357B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Write$HandleMessageModuleName
                                                  • String ID:
                                                  • API String ID: 1009477876-0
                                                  • Opcode ID: b68058bcc775e64a53da464373ac506bf9c9fae30ad0a64d8ae2ba055df9d57c
                                                  • Instruction ID: dc223cc9a312690d761db857a7dd7cb71644d0a9346292894f537f41c56afc2f
                                                  • Opcode Fuzzy Hash: b68058bcc775e64a53da464373ac506bf9c9fae30ad0a64d8ae2ba055df9d57c
                                                  • Instruction Fuzzy Hash: 0B21B475600305BAEF20D7649D4AFAA3FACBB61711F400252B506970D2EBB49F49CA72
                                                  APIs
                                                  • @Cmbitmap@TcmBitmap@$bctr$qqrv.Z39UARTASSIST ref: 00486BB2
                                                  • @Cmbitmap@CMRectHeight$qqrrx11Types@TRect.Z39UARTASSIST ref: 00486BBB
                                                  • @Cmbitmap@CMRectWidth$qqrrx11Types@TRect.Z39UARTASSIST(00000000), ref: 00486BC3
                                                  • StretchBlt.GDI32(00000000,00000000,00000000,00000000), ref: 00486C07
                                                  • SetStretchBltMode.GDI32(00000000,00000003), ref: 00486C30
                                                  • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,?,?,00CC0020), ref: 00486C67
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Rect$Cmbitmap@Stretch$Types@$Bitmap@$bctr$qqrvHeight$qqrrx11ModeWidth$qqrrx11
                                                  • String ID:
                                                  • API String ID: 2333992091-0
                                                  • Opcode ID: b1ea0966403de0ddc2da10ae18a5ae8155bce3d3947bba3b0879787ab0ed7f77
                                                  • Instruction ID: 5fc9b842252c0f1a72286ec20edc600e2b8647cf87331aca04ec072e13cba95b
                                                  • Opcode Fuzzy Hash: b1ea0966403de0ddc2da10ae18a5ae8155bce3d3947bba3b0879787ab0ed7f77
                                                  • Instruction Fuzzy Hash: 812117B1304201AFC650EB6DCC85F1B7BEDEF88700F144569FA49CB266CA75EC418BA5
                                                  APIs
                                                  • GetObjectA.GDI32(00000000,0000003C,?), ref: 00439369
                                                  • MulDiv.KERNEL32(00000000,?,00000048), ref: 004393C8
                                                  • CreateFontIndirectA.GDI32(?), ref: 004393D6
                                                  • SelectObject.GDI32(?,00000000), ref: 004393E0
                                                  • SelectObject.GDI32(?,00000000), ref: 004393FC
                                                  • DeleteObject.GDI32(00000000), ref: 00439402
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Object$Select$CreateDeleteFontIndirect
                                                  • String ID:
                                                  • API String ID: 2035526678-0
                                                  • Opcode ID: af047714d8953015f6fb116216fbeafadd597e93ca57ad945708823ee9f47104
                                                  • Instruction ID: 4ad876096319b2fc78c7e6fda839a60252cc5908eced1a5cb98bcb1d5d0e28e9
                                                  • Opcode Fuzzy Hash: af047714d8953015f6fb116216fbeafadd597e93ca57ad945708823ee9f47104
                                                  • Instruction Fuzzy Hash: A4211271E002059FDB40EFA9C889A8EBBFCBF49310F544165F908EB256DA749D45CB94
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 0047139A
                                                  • PurgeComm.KERNEL32(?,00000008), ref: 004713B7
                                                  • @TSyncUart@SendData$qqrpvi.Z39UARTASSIST(?,00000008), ref: 004713C4
                                                  • Sleep.KERNEL32(00000001), ref: 004713E7
                                                  • @TSyncUart@RecvData$qqrpvi.Z39UARTASSIST(00000001), ref: 00471405
                                                  • GetTickCount.KERNEL32 ref: 0047142C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CountData$qqrpviSyncTickUart@$CommPurgeRecvSendSleep
                                                  • String ID:
                                                  • API String ID: 1824029913-0
                                                  • Opcode ID: ef91ee8fbc04e9abfe6819ee02a24cba95af579c90c718745ee3f70b57a542d3
                                                  • Instruction ID: 2159c0bb35576ce69a324ada5e71f2c242d4f190bcaad93cbae489b2e651a873
                                                  • Opcode Fuzzy Hash: ef91ee8fbc04e9abfe6819ee02a24cba95af579c90c718745ee3f70b57a542d3
                                                  • Instruction Fuzzy Hash: 5D219131A002099BDB20EE6DC9856DEB7B9AF84300F11C16AAC09E73A1DA389D44C799
                                                  APIs
                                                  • @TPerformanceGraph@Initialize$qqrl.Z39UARTASSIST(?), ref: 004B9C23
                                                  • @TPerformanceGraph@GetBandCount$qqrv.Z39UARTASSIST(?), ref: 004B9C46
                                                  • @TPerformanceGraph@FirstY$qqrv.Z39UARTASSIST(?), ref: 004B9C5E
                                                  • @TPerformanceGraph@NextY$qqri.Z39UARTASSIST(?), ref: 004B9C68
                                                  • @TPerformanceGraph@DisplayPoints$qqrl.Z39UARTASSIST(?), ref: 004B9CA0
                                                  • @TPerformanceGraph@NextY$qqri.Z39UARTASSIST(?), ref: 004B9CAB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Graph@Performance$NextY$qqri$BandCount$qqrvDisplayFirstInitialize$qqrlPoints$qqrlY$qqrv
                                                  • String ID:
                                                  • API String ID: 3754224730-0
                                                  • Opcode ID: c7d436b034268089a4649cf1344048ab2298e8a832d20b0ec08bde8072c0b9de
                                                  • Instruction ID: 1bd902a5a5df6f61a1b936f4d07f6f8a57fdd27e82a224a83dbfd26fe2f8e2cc
                                                  • Opcode Fuzzy Hash: c7d436b034268089a4649cf1344048ab2298e8a832d20b0ec08bde8072c0b9de
                                                  • Instruction Fuzzy Hash: 00317174A00109DBCB04DFA9D5819DEF7B1BF89314F2442AAE909B7351DB30AE41DB94
                                                  APIs
                                                  • 73A1A570.USER32(00000000), ref: 004F3936
                                                    • Part of subcall function 00509A94: CreateFontIndirectA.GDI32(?), ref: 00509BD2
                                                  • SelectObject.GDI32(00000000,00000000), ref: 004F3947
                                                  • GetTextExtentPoint32A.GDI32(00000000,00000000,00000000,?), ref: 004F3979
                                                  • SelectObject.GDI32(00000000,00000000), ref: 004F3980
                                                  • GetSystemMetrics.USER32(00000005), ref: 004F398F
                                                  • GetSystemMetrics.USER32(00000006), ref: 004F399D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MetricsObjectSelectSystem$A570CreateExtentFontIndirectPoint32Text
                                                  • String ID:
                                                  • API String ID: 3567956377-0
                                                  • Opcode ID: f4922f6685df032d8d73a739ec57d3667c0467b362f976a73cac24f7bb42fb78
                                                  • Instruction ID: 035eebdb39554ef26b63d7c141fc8d9fd0b183d141de2d62a3e9728930dad461
                                                  • Opcode Fuzzy Hash: f4922f6685df032d8d73a739ec57d3667c0467b362f976a73cac24f7bb42fb78
                                                  • Instruction Fuzzy Hash: 9121A4756002156BD710EF65CC8AFAF7BADFF89310F014165F914D7282DAB89A04CBA5
                                                  APIs
                                                  • @TcmSocket@TryLockMultiClient$qqrv.Z39UARTASSIST ref: 0047FA8C
                                                  • @TcmSocket@SendTo$qqripvi.Z39UARTASSIST ref: 0047FAB5
                                                  • GetTickCount.KERNEL32 ref: 0047FABE
                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 0047FAE3
                                                  • SetTimer.USER32(?,00000002,000003E8,00000000), ref: 0047FAFF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Socket@$Client$qqrvCountLockMultiReleaseSemaphoreSendTickTimerTo$qqripvi
                                                  • String ID:
                                                  • API String ID: 2052836949-0
                                                  • Opcode ID: b0dbe11d653e208a7c273f2ac5faba5c6b4a21cb907b9d293642540993557379
                                                  • Instruction ID: 7d733e4a2719720d23600536d6b299438becc8bce5a2921b201ed927af988288
                                                  • Opcode Fuzzy Hash: b0dbe11d653e208a7c273f2ac5faba5c6b4a21cb907b9d293642540993557379
                                                  • Instruction Fuzzy Hash: 2221D87160474067D720EA25C881BEBB7D9AF94700F14C82FF48D47395D679BC49C76A
                                                  APIs
                                                  • ValidateRect.USER32(00000000,00000000), ref: 00500C54
                                                  • InvalidateRect.USER32(00000000,00000000,000000FF,00000000,00000000), ref: 00500C65
                                                  • GetClientRect.USER32(00000000), ref: 00500C73
                                                  • MapWindowPoints.USER32(00000000,00000000,00000000,00000002), ref: 00500C93
                                                  • ValidateRect.USER32(00000000,?,00000000,00000000,000000FF,00000000,00000000), ref: 00500CA5
                                                  • InvalidateRect.USER32(00000000,00000000,00000000,00000000,?,00000000,00000000,000000FF,00000000,00000000), ref: 00500CBD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Rect$InvalidateValidate$ClientPointsWindow
                                                  • String ID:
                                                  • API String ID: 2846033224-0
                                                  • Opcode ID: 957d546d3573720c1be42d94c87c62c0f5307ec5a358a7ed92c138653b039287
                                                  • Instruction ID: 6993a52d5c8acbcc691bfe2b0c990f142c1c85d6f0fba92fcadea6ea94e3a2bb
                                                  • Opcode Fuzzy Hash: 957d546d3573720c1be42d94c87c62c0f5307ec5a358a7ed92c138653b039287
                                                  • Instruction Fuzzy Hash: 9DF0AF7069070366DA10BA789C8FF4A3F8C7B95710F000A347519EB287DE78F8858A76
                                                  APIs
                                                    • Part of subcall function 0050A2A8: CreateBrushIndirect.GDI32(?), ref: 0050A352
                                                  • UnrealizeObject.GDI32(00000000), ref: 0050B118
                                                  • SelectObject.GDI32(?,00000000), ref: 0050B12A
                                                  • SetBkColor.GDI32(?,00000000), ref: 0050B14D
                                                  • SetBkMode.GDI32(?,00000002), ref: 0050B158
                                                  • SetBkColor.GDI32(?,00000000), ref: 0050B173
                                                  • SetBkMode.GDI32(?,00000001), ref: 0050B17E
                                                    • Part of subcall function 00509578: GetSysColor.USER32(8B0050AE), ref: 00509582
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                  • String ID:
                                                  • API String ID: 3527656728-0
                                                  • Opcode ID: 60b6de37cc9273a24748d8718e394b008596fbd3f9c533ca6e2ba13d4c400d13
                                                  • Instruction ID: c73de8cf75f154cb55467499fa52002b275b4f191d676f3fa356ca01ed539f6e
                                                  • Opcode Fuzzy Hash: 60b6de37cc9273a24748d8718e394b008596fbd3f9c533ca6e2ba13d4c400d13
                                                  • Instruction Fuzzy Hash: FBF066B96402029BDA00FFA8DACB94B6F9C7F953027448490B904DF29BCA66DC108731
                                                  APIs
                                                  • @TCCalendar@GetDateElement$qqri.Z39UARTASSIST ref: 004B4663
                                                  • @TCCalendar@GetDateElement$qqri.Z39UARTASSIST ref: 004B4681
                                                  • @TCCalendar@GetDateElement$qqri.Z39UARTASSIST ref: 004B4693
                                                  • @TCCalendar@SetDateElement$qqrii.Z39UARTASSIST ref: 004B46AA
                                                  • @TCCalendar@GetDateElement$qqri.Z39UARTASSIST ref: 004B46B7
                                                  • @TCCalendar@SetDateElement$qqrii.Z39UARTASSIST ref: 004B46C7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Calendar@Date$Element$qqri$Element$qqrii
                                                  • String ID:
                                                  • API String ID: 3550019470-0
                                                  • Opcode ID: adb8ef6b38a7328a9e587f7a7a4fd3e7339856b04c8a589523b3d8210c78485f
                                                  • Instruction ID: a601343adee9da652d6c4c4b473d666a5a65f89c12d2b22c493e658178913ba2
                                                  • Opcode Fuzzy Hash: adb8ef6b38a7328a9e587f7a7a4fd3e7339856b04c8a589523b3d8210c78485f
                                                  • Instruction Fuzzy Hash: DBF0E130B04004DBDB04E699C542BDE73E6DBC5304F28407AE8049B797CB7AAE129729
                                                  APIs
                                                  • @TCCalendar@GetDateElement$qqri.Z39UARTASSIST ref: 004B46DF
                                                  • @TCCalendar@GetDateElement$qqri.Z39UARTASSIST ref: 004B46FD
                                                  • @TCCalendar@GetDateElement$qqri.Z39UARTASSIST ref: 004B470F
                                                  • @TCCalendar@SetDateElement$qqrii.Z39UARTASSIST ref: 004B4726
                                                  • @TCCalendar@GetDateElement$qqri.Z39UARTASSIST ref: 004B4733
                                                  • @TCCalendar@SetDateElement$qqrii.Z39UARTASSIST ref: 004B4743
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Calendar@Date$Element$qqri$Element$qqrii
                                                  • String ID:
                                                  • API String ID: 3550019470-0
                                                  • Opcode ID: 20ab2a4cbbd17920599c3717c81ef36c7ed8b37c66dc66bbbf09564f2d91462e
                                                  • Instruction ID: b08d661de41f6e00a6bfb22a4430748b00d7cc805c4ff60cca1af35ac1c6ac7d
                                                  • Opcode Fuzzy Hash: 20ab2a4cbbd17920599c3717c81ef36c7ed8b37c66dc66bbbf09564f2d91462e
                                                  • Instruction Fuzzy Hash: 7FF0EC30B04004DBDB00EA9AD582BDE73E5DB85304F28506AE8459B797DB7AAE429728
                                                  APIs
                                                  • inet_addr.WS2_32(?), ref: 00480936
                                                  • gethostbyname.WS2_32(00000000), ref: 0048096C
                                                  • gethostname.WS2_32(?,00000040), ref: 00480989
                                                  • gethostbyname.WS2_32(?), ref: 0048099A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: gethostbyname$gethostnameinet_addr
                                                  • String ID: 255.255.255.255
                                                  • API String ID: 2384514453-2422070025
                                                  • Opcode ID: f22ff541561cc0cf35f73bc82a845455c09c29622af3145bac55d229d5ea3fbf
                                                  • Instruction ID: 86bcb9611cd433d3fe1060a7d8bf9aaacf639610bcee55d8beb42b7c9a1eefda
                                                  • Opcode Fuzzy Hash: f22ff541561cc0cf35f73bc82a845455c09c29622af3145bac55d229d5ea3fbf
                                                  • Instruction Fuzzy Hash: 7991D2706283019BD7A8FE68C48077F77D5AF95314F148D2EE49687392C23CD88AD75A
                                                  APIs
                                                  • @TcmSocket@GenIPPortString$qqrp9TInetAddrpc.Z39UARTASSIST(?,00000000,?,0047DEDA), ref: 0047E261
                                                    • Part of subcall function 0047E5B0: @TcmSocket@ip_ntoa$qqrpx6IPDATApco.Z39UARTASSIST(?,?,0047E266,?,00000000,?,0047DEDA), ref: 0047E5C9
                                                  • @TcmSocket@ParseInetAddr$qqrpxcp9TInetAddro.Z39UARTASSIST ref: 0047E32C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Inet$Socket@$Addr$qqrpxcp9AddroAddrpcApcoParsePortSocket@ip_ntoa$qqrpx6String$qqrp9
                                                  • String ID: ALL CLIENTS ($D
                                                  • API String ID: 2114847395-3993225547
                                                  • Opcode ID: 23c36384405fbe58083e5c2a986ac664989eacb36a01c33a383483406fcc75d5
                                                  • Instruction ID: dbd8f680c06940efc32fc78c4a367affd62353d9a64f1c62b61a449fca904940
                                                  • Opcode Fuzzy Hash: 23c36384405fbe58083e5c2a986ac664989eacb36a01c33a383483406fcc75d5
                                                  • Instruction Fuzzy Hash: 04B1E874E00209CFCB04DFA5C485AEEB7B5FF88304F2486AAD81AAB355D734A946CF55
                                                  APIs
                                                  • @Cmmenu@TcmMenu@DrawGradualBar$qqrp16Graphics@TCanvasrx11Types@TRect.Z39UARTASSIST ref: 00489A6E
                                                  • @Cmmenu@TcmMenu@DrawMenuText$qqrp16Graphics@TCanvasiip15Menus@TMenuItem.Z39UARTASSIST(?,?), ref: 00489B5C
                                                  • @Cmmenu@TcmMenu@DrawMenuText$qqrp16Graphics@TCanvasiip15Menus@TMenuItem.Z39UARTASSIST(?,?,?,?), ref: 00489B73
                                                  • @Cmmenu@TcmMenu@DrawMenuText$qqrp16Graphics@TCanvasiip15Menus@TMenuItem.Z39UARTASSIST(?,?), ref: 00489B91
                                                    • Part of subcall function 0050A9AC: FillRect.USER32(?,?,00000000), ref: 0050A9D4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Menu$Cmmenu@DrawGraphics@Menu@$Canvasiip15ItemMenus@Text$qqrp16$Rect$Bar$qqrp16Canvasrx11FillGradualTypes@
                                                  • String ID: RO
                                                  • API String ID: 3743952999-2329933643
                                                  • Opcode ID: c362b35b7882a6405c44af3afd012c6a50ff162f2529654de88a173f886b82cf
                                                  • Instruction ID: 1680fb62abd5dcfd0c26c2c98d64d1bb1b03f4636baa5446953acd5fec142e32
                                                  • Opcode Fuzzy Hash: c362b35b7882a6405c44af3afd012c6a50ff162f2529654de88a173f886b82cf
                                                  • Instruction Fuzzy Hash: 2E814970B006099FCB04EFA9C9859AEB7F6FF88304F148569E845AB346CB34ED45CB95
                                                  APIs
                                                    • Part of subcall function 004E1208: GetCommandLineA.KERNEL32(00000000,004E1259,?,?,?,00000000,?,00443672,00000000,005DFA4C), ref: 004E121F
                                                  • @cmSerialCommDriver32@TcmUart@UpdateRegistryOptions$qqr17System@AnsiStringp12TUartOptionso.Z39UARTASSIST(?,?), ref: 0044389D
                                                  • PostMessageA.USER32(00000000,0000040F,?,?), ref: 004438DE
                                                    • Part of subcall function 004E1268: GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 004E128C
                                                    • Part of subcall function 004E1268: GetCommandLineA.KERNEL32 ref: 004E129E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommandLine$AnsiCommDriver32@FileMessageModuleNameOptions$qqr17OptionsoPostRegistrySerialStringp12System@UartUart@Update
                                                  • String ID: -pos$D$UartAssist
                                                  • API String ID: 1504899037-691800880
                                                  • Opcode ID: 44ddab8899c1bff27ee0e063b2b92124e60b6321ac0c94772b7324826cb718b2
                                                  • Instruction ID: 64e07887cae1f8cc953ba02e35cd1014b891cdb3d7f5cbe11e34e64baa334077
                                                  • Opcode Fuzzy Hash: 44ddab8899c1bff27ee0e063b2b92124e60b6321ac0c94772b7324826cb718b2
                                                  • Instruction Fuzzy Hash: 13718171D0020ACBDF14EFA9D8456EEB7B5FF84305F10812AE805B7292DB389A46CB59
                                                  APIs
                                                  • UnregisterHotKey.USER32(00000000,00000000), ref: 0049927A
                                                  • RegisterHotKey.USER32(00000000,00000000,00000001,?), ref: 004992C3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: RegisterUnregister
                                                  • String ID: $Modification failed, hotkey already exists!$Prompt
                                                  • API String ID: 2330324139-418848957
                                                  • Opcode ID: 1349199563a016bc7af1f1e8f7c5c7075e2d41be74edda740c1643ddc5246e34
                                                  • Instruction ID: 1a3b3363ef2213143d2fbd3b947faa37bd1a7a901d6012c40c19d99e4910cf93
                                                  • Opcode Fuzzy Hash: 1349199563a016bc7af1f1e8f7c5c7075e2d41be74edda740c1643ddc5246e34
                                                  • Instruction Fuzzy Hash: 4761D330A0424A9BDF25DBACC4557EEBFB5AF9A314F08026AE841A73D2D7394C4AC355
                                                  APIs
                                                  • MessageBoxA.USER32(?,005828E5,005828E6,00000021), ref: 0046BCD8
                                                  • ShellExecuteA.SHELL32(?,00000000,0046B8FF,00000000,00000000,00000001), ref: 0046BCF8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteMessageShell
                                                  • String ID: --------------------------------------------------${'X${'X
                                                  • API String ID: 649218774-487041030
                                                  • Opcode ID: ccb6b8dd6bf69ee52b5a94a6604689c5d3dca038ed8305b1d37faf7690fa7f41
                                                  • Instruction ID: 5fe92261f7e4ef377c63826d77ecfd0cafc4d3f1313e680622c85271db902103
                                                  • Opcode Fuzzy Hash: ccb6b8dd6bf69ee52b5a94a6604689c5d3dca038ed8305b1d37faf7690fa7f41
                                                  • Instruction Fuzzy Hash: 1751487090060ADFCB20DFA0C455AEFF7F9FF84300F10866AD901A7655EB74AA0ADB95
                                                  APIs
                                                    • Part of subcall function 004CB3D0: RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,?,?,00000000,004CB4D5), ref: 004CB44A
                                                  • @TSyncUart@UpdateSettings$qqrp12TUartOptionso.Z39UARTASSIST ref: 0047155E
                                                    • Part of subcall function 004CB33C: RegCloseKey.ADVAPI32(00010000,004CB218,004CB393,004CB218,00000001,004CB2EA,?,?,004714DF), ref: 004CB34D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenOptionsoSettings$qqrp12SyncUartUart@Update
                                                  • String ID: COM$COMPort$D$SOFTWARE\CMSOFT\
                                                  • API String ID: 1592612479-2195040797
                                                  • Opcode ID: e96897e6855e89436f71246327fde2150f87a97713b6255bcf3a69303c48a314
                                                  • Instruction ID: 37e42f722049ea4b60e927495d438b9ad30a1ea3259d341c8724c0dc88720e4c
                                                  • Opcode Fuzzy Hash: e96897e6855e89436f71246327fde2150f87a97713b6255bcf3a69303c48a314
                                                  • Instruction Fuzzy Hash: 28512D74D0120E8BCB00EFD4C495AEEFBB5FF88314F14516AD800B7256DB355A4A8BA5
                                                  APIs
                                                  • @TcmAutoUpgrader@ReadConfigValue$qqrpc.Z39UARTASSIST ref: 0043B418
                                                    • Part of subcall function 0046B5B8: @TcmAutoUpgrader@ReadConfigValue$qqrpct1pi.Z39UARTASSIST ref: 0046B5EF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AutoConfigReadUpgrader@$Value$qqrpcValue$qqrpct1pi
                                                  • String ID: 8$VICECENTER$VICECENTER$VICECENTER
                                                  • API String ID: 4141635535-3935447603
                                                  • Opcode ID: 588a7612472823be7009ef24596a7e62f2aeae0420bba0c3aad7044b9844e46f
                                                  • Instruction ID: 77541042ef393a4d0ace03dacb52811a87d2dbc48a5a948bc04437b28f995702
                                                  • Opcode Fuzzy Hash: 588a7612472823be7009ef24596a7e62f2aeae0420bba0c3aad7044b9844e46f
                                                  • Instruction Fuzzy Hash: 33419370A0010ADBCB10EB94D946AEEBBB5FF48304F204166E90467392EB349E05DBDE
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00464320
                                                  • htons.WS2_32(?), ref: 00464394
                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000,000005E8,000005DC,?), ref: 004643EE
                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 0046445E
                                                  Strings
                                                  • ####Socket inqueue is out of space!, xrefs: 00464444
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ReleaseSemaphore$ObjectSingleWaithtons
                                                  • String ID: ####Socket inqueue is out of space!
                                                  • API String ID: 4175848404-1006925820
                                                  • Opcode ID: d04905436f47ca2d8315886e50016f64767c7fe388395023f3500e7f79121ffd
                                                  • Instruction ID: 622e31ce2f6ac9748c97dc54ee09345de851798f5a1eb73b1f913991f1b650e0
                                                  • Opcode Fuzzy Hash: d04905436f47ca2d8315886e50016f64767c7fe388395023f3500e7f79121ffd
                                                  • Instruction Fuzzy Hash: 974199B1A00205EFDF14DF95C885BAFB7B8FF88704F10815AE904AB241E774A944CB96
                                                  APIs
                                                  • @cmSerialCommDriver32@TcmUart@fSetActive$qqro.Z39UARTASSIST ref: 0043CCED
                                                    • Part of subcall function 0047893C: @cmSerialCommDriver32@TcmUart@Open$qqrv.Z39UARTASSIST ref: 0047895C
                                                  Strings
                                                  • Device inserted, reconnecting..., xrefs: 0043CDF4
                                                  • Decice is pulled out!, xrefs: 0043CD02
                                                  • Device inserted, reconnecting..., xrefs: 0043CE14
                                                  • Decice is pulled out!, xrefs: 0043CD22
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommDriver32@Serial$Active$qqroOpen$qqrvUart@Uart@f
                                                  • String ID: Decice is pulled out!$Decice is pulled out!$Device inserted, reconnecting...$Device inserted, reconnecting...
                                                  • API String ID: 3215387241-2498386668
                                                  • Opcode ID: caba67a923d166a61b9f03a98bb725a6ec6852fcd85a1bc63af0bd1a16e48055
                                                  • Instruction ID: 2b9d56b1dc0e17620ad19a1bce901e943096626b2a471e6612b5dd5d3a229e8c
                                                  • Opcode Fuzzy Hash: caba67a923d166a61b9f03a98bb725a6ec6852fcd85a1bc63af0bd1a16e48055
                                                  • Instruction Fuzzy Hash: 2841F834600245CFD710EB58E8897AABBF1FF59304F449177E4489B3A2CB389D89EB59
                                                  APIs
                                                  • SetEvent.KERNEL32(00000470), ref: 00441086
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Event
                                                  • String ID: $Prompt$Send fail, no connection available!$Stopping
                                                  • API String ID: 4201588131-1658881785
                                                  • Opcode ID: 71d55d606f6de9c7577aeaf8f5ff7c61d4086ce9d47cba96484602fadf831cf3
                                                  • Instruction ID: 932292e5d020fbec4af81afbbc2d906d842ffe77c08781ad3b114f0142d45229
                                                  • Opcode Fuzzy Hash: 71d55d606f6de9c7577aeaf8f5ff7c61d4086ce9d47cba96484602fadf831cf3
                                                  • Instruction Fuzzy Hash: 394137309041898BEB10DB58D8857AEBBF1FB49304F108167C80597772D77849CAEB5E
                                                  APIs
                                                    • Part of subcall function 004D0E0C: GetFullPathNameA.KERNEL32(00000000,00000104,?,?,?,?,004B5CD4), ref: 004D0E2B
                                                  • @Cdiroutl@TCDirectoryOutline@ForceCase$qqrrx17System@AnsiString.Z39UARTASSIST ref: 004B5CE9
                                                  • @Cdiroutl@TCDirectoryOutline@SetDrive$qqrc.Z39UARTASSIST ref: 004B5DA1
                                                  • @Cdiroutl@TCDirectoryOutline@WalkTree$qqrrx17System@AnsiString.Z39UARTASSIST ref: 004B5DAE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Cdiroutl@DirectoryOutline@$AnsiStringSystem@$Case$qqrrx17Drive$qqrcForceFullNamePathTree$qqrrx17Walk
                                                  • String ID: $.ZK
                                                  • API String ID: 960543299-3141183068
                                                  • Opcode ID: 1e395b3924ea3d4917421b8018c2a85dd4e36019e3da7388396721692346abd4
                                                  • Instruction ID: 82dacddb252240c779a66c9c947cc06b9f95d8b3152e1e17368592046544c4c9
                                                  • Opcode Fuzzy Hash: 1e395b3924ea3d4917421b8018c2a85dd4e36019e3da7388396721692346abd4
                                                  • Instruction Fuzzy Hash: 38411B7490150DABCF00EBA4D585ADEF7BAFF44304F6046A6E804A7252EB389F458BA5
                                                  APIs
                                                  • CreateThread.KERNEL32(00000000,00000000,00417EC8,?,00000000,00000000), ref: 00417009
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateThread
                                                  • String ID: .lic$Prompt$Sure to cancel the current authorization?$UartAssist
                                                  • API String ID: 2422867632-2986687754
                                                  • Opcode ID: 0e5c9f380ce7afdd9cc07e783a7b7f2ca44e3a2eda66f11a1def49f4a4e1f97a
                                                  • Instruction ID: e1e7f72b27a404d6608555825d5c8aa48e306fa1c33e727c862d6c67ac297b70
                                                  • Opcode Fuzzy Hash: 0e5c9f380ce7afdd9cc07e783a7b7f2ca44e3a2eda66f11a1def49f4a4e1f97a
                                                  • Instruction Fuzzy Hash: D0418F74E0010ADBDB00EBA4D8867EEBBF5FF95300F108276E814A7392DB749946CB55
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,?), ref: 0047684D
                                                  • CreateWindowExA.USER32(00000000,tooltips_class32,00000000,00000041,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0047686E
                                                  • SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,00000000,tooltips_class32,00000000,00000041,00000000,00000000,00000000,00000000,00000000), ref: 00476886
                                                  • SendMessageA.USER32(?,00000404,00000000), ref: 004768CF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$CreateHandleMessageModuleSend
                                                  • String ID: tooltips_class32
                                                  • API String ID: 1589294261-1918224756
                                                  • Opcode ID: 56ae58de72e1193a2cd08a62d36a9b80b2b181126bc9ad68f01c71ecc1ea29ef
                                                  • Instruction ID: 4c17d36248ae7014c4ae3f7e63b0e7fa5d00e582ae69d0eec540ab263086bae6
                                                  • Opcode Fuzzy Hash: 56ae58de72e1193a2cd08a62d36a9b80b2b181126bc9ad68f01c71ecc1ea29ef
                                                  • Instruction Fuzzy Hash: D9215A74781202AFE314DF58CC86F5ABBA5FF89705F204159F614AB3C2D7B1AA21CB94
                                                  APIs
                                                  • @TcmAutoUpgrader@ReadConfigValue$qqrpc.Z39UARTASSIST ref: 0043B5BE
                                                    • Part of subcall function 0046B5B8: @TcmAutoUpgrader@ReadConfigValue$qqrpct1pi.Z39UARTASSIST ref: 0046B5EF
                                                  • @TcmAutoUpgrader@ReadConfigValue$qqrpc.Z39UARTASSIST ref: 0043B62C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AutoConfigReadUpgrader@$Value$qqrpc$Value$qqrpct1pi
                                                  • String ID: $QQGROUP$QQNUMBER
                                                  • API String ID: 715816077-2643771206
                                                  • Opcode ID: 1223e233e603f52b0fd51d350db010927cfd6c0c1d76b5cfd3eb8c904719a924
                                                  • Instruction ID: 363d099483b20a7475c1a0ffa0b99f8a47d933e1d310da235a12fbda9c4cc888
                                                  • Opcode Fuzzy Hash: 1223e233e603f52b0fd51d350db010927cfd6c0c1d76b5cfd3eb8c904719a924
                                                  • Instruction Fuzzy Hash: 3B31607190020AEACF14DF84C486BEEB374FF44304F1491BBE9096B292EB745B09DB96
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime
                                                  • String ID: hello$http://free.cmsoft.cn/tools/ntp/?handler=%d$stamp$time
                                                  • API String ID: 481472006-1147298834
                                                  • Opcode ID: db4cd798a69074aa32786ea2794c70a3a86d955a285ce8b421197f124974dca2
                                                  • Instruction ID: 2d5482be50e4afb3f690d0a3a0ea8fcc2a5d76ebc650ece19942f64135c3ae09
                                                  • Opcode Fuzzy Hash: db4cd798a69074aa32786ea2794c70a3a86d955a285ce8b421197f124974dca2
                                                  • Instruction Fuzzy Hash: 3E210B71D002086ACB10F7649C46BED7B78EB54314F4045EAF948F2185FEB49B94CB5A
                                                  APIs
                                                  • SetupDiGetClassDevsA.SETUPAPI(0059B0AC,00000000,00000000,00000002), ref: 004711D5
                                                  • SetupDiGetDeviceRegistryPropertyA.SETUPAPI(00000000,?,0000000C,00000000,?,00000104,00000000), ref: 00471213
                                                  • SetupDiEnumDeviceInfo.SETUPAPI(00000000,00000000,?), ref: 00471251
                                                  • SetupDiDestroyDeviceInfoList.SETUPAPI(00000000), ref: 0047125B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Setup$Device$Info$ClassDestroyDevsEnumListPropertyRegistry
                                                  • String ID: (COM
                                                  • API String ID: 3478351294-1234306483
                                                  • Opcode ID: fced2286acd962d13296cb29170b2e60fcf968954b1b3e90872d9b217508a649
                                                  • Instruction ID: 16d38632641f22bb4524d023c90b9cc2007cb9717a572fdbf009734542c2a279
                                                  • Opcode Fuzzy Hash: fced2286acd962d13296cb29170b2e60fcf968954b1b3e90872d9b217508a649
                                                  • Instruction Fuzzy Hash: C5113A311483447AE230A6285C46FEF7B8CEBC2710F04855AFDC9AB1C2D6B8594583AA
                                                  APIs
                                                  • RtlInitializeCriticalSection.NTDLL(005E1348), ref: 004E01DA
                                                  • RtlEnterCriticalSection.NTDLL(005E1348), ref: 004E01ED
                                                  • LocalAlloc.KERNEL32(00000000,00000FF8,005E1348,00000000,$,?,?,004E0A5E,0420CE44,?,00000000,?,?,004E044D,004E0462,004E05B3), ref: 004E0217
                                                  • RtlLeaveCriticalSection.NTDLL(005E1348), ref: 004E0274
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                  • String ID: $
                                                  • API String ID: 730355536-1178188002
                                                  • Opcode ID: 26209a3eae6947116f3ac313e040f3025e3a82b4b2abc6b79eee337b60cb38d8
                                                  • Instruction ID: c6a488092afc473c34adfa7e3cc5862c2823c58dd24e9f6f8bc24a498783260d
                                                  • Opcode Fuzzy Hash: 26209a3eae6947116f3ac313e040f3025e3a82b4b2abc6b79eee337b60cb38d8
                                                  • Instruction Fuzzy Hash: 8201E530A44BC09ED3196BAA981A7193EC5F79D310F4048BAF0809AA91C6B84C84C71D
                                                  APIs
                                                  • GetClassInfoA.USER32(00400000,BUTTON,?), ref: 00531119
                                                  • GetClassInfoA.USER32(00000000,BUTTON,?), ref: 00531129
                                                  • GetClassInfoA.USER32(00400000,BUTTON,?), ref: 0053113F
                                                  • GetClassInfoA.USER32(?,BUTTON,?), ref: 00531151
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ClassInfo
                                                  • String ID: BUTTON
                                                  • API String ID: 3534257612-3405671355
                                                  • Opcode ID: 2041e0a0581f45601c2105a4f42029f0cbce15bed4eb1613afa54cd577144b44
                                                  • Instruction ID: 81551e60a015202c45d97ca164d621db136ed0ab4a14fddf6233409a62974457
                                                  • Opcode Fuzzy Hash: 2041e0a0581f45601c2105a4f42029f0cbce15bed4eb1613afa54cd577144b44
                                                  • Instruction Fuzzy Hash: D801FFB26155166BAB10DFA9CD84EE27FECEF49310B110162FE04CB215E360EC00CBA4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c9fcb138427c1c51c6db5a29f3accbecc62710ab0089ef68804b1d3d98f69238
                                                  • Instruction ID: 101d7abc9537f5ac47e095e01ff9720089535a202181295d77f2db03766750a4
                                                  • Opcode Fuzzy Hash: c9fcb138427c1c51c6db5a29f3accbecc62710ab0089ef68804b1d3d98f69238
                                                  • Instruction Fuzzy Hash: 06B19B6140E3C05FD7139B7099A1AA57FB1AF53314F1E81EFD488CB1A3C2298C09D76A
                                                  APIs
                                                  • StretchBlt.GDI32(00000000,00000000,?,?,00000000,?,00000000,?,?,00000010,00CC0020), ref: 004763E4
                                                  • StretchBlt.GDI32(00000000,?,?,?,00000000,?,?,?,?,00000010,00CC0020), ref: 0047640D
                                                  • StretchBlt.GDI32(00000000,?,00000000,?,?,?,?,00000000,00000004,?,00CC0020), ref: 00476436
                                                  • StretchBlt.GDI32(00000000,?,?,?,?,?,?,?,00000010,?,00CC0020), ref: 00476466
                                                  • @TcmForm@DrawTitle$qqrp16Graphics@TCanvasii17System@AnsiString.Z39UARTASSIST(?,00000007,00000000,?,?,?,?,?,?,?,00000010,?,00CC0020,00000000,?,00000000), ref: 004764C5
                                                    • Part of subcall function 0050A9AC: FillRect.USER32(?,?,00000000), ref: 0050A9D4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Stretch$AnsiCanvasii17DrawFillForm@Graphics@RectStringSystem@Title$qqrp16
                                                  • String ID:
                                                  • API String ID: 200441658-0
                                                  • Opcode ID: 335e8e4a44e1f181b59941618d07b580cf7aee55ca86476f899e0d7bcec6173d
                                                  • Instruction ID: c23e08ce1400c17b176fa214e6efc260044468486bfd002be88f5e10c5d985a9
                                                  • Opcode Fuzzy Hash: 335e8e4a44e1f181b59941618d07b580cf7aee55ca86476f899e0d7bcec6173d
                                                  • Instruction Fuzzy Hash: BBB10B71A10118EFDB04DF98D885FEEBBB9FF89700F148159F905AB295DA74AC01CBA0
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Ellipse
                                                  • String ID:
                                                  • API String ID: 2210316278-0
                                                  • Opcode ID: 7e48539de5f06cdb10eb256657d1ad7582fc261d26b0d171ed7d7cb69c19a60a
                                                  • Instruction ID: 28c41e3f7c7bd34db676da15886fd139cbc12b64de23727633e8fd7b04843f63
                                                  • Opcode Fuzzy Hash: 7e48539de5f06cdb10eb256657d1ad7582fc261d26b0d171ed7d7cb69c19a60a
                                                  • Instruction Fuzzy Hash: 2C81E775A00219AFCB51DFA9C885ADEBBF4BF48300F044596E948EB355D634AE80CB54
                                                  APIs
                                                  • SetTimer.USER32(00000000,0000000C,000001F4,00000000), ref: 00409438
                                                  • SendMessageA.USER32(00000000,00001015,00000000,00000000), ref: 00409475
                                                  • SendMessageA.USER32(00000000,00001015,00000000,00000000), ref: 00409503
                                                  • GetAsyncKeyState.USER32(00000001), ref: 0040953A
                                                  • KillTimer.USER32(00000000,0000000C,?,?,?,?,0049A357), ref: 0040954E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MessageSendTimer$AsyncKillState
                                                  • String ID:
                                                  • API String ID: 3141268707-0
                                                  • Opcode ID: 6671076f9106cb8c4e4f5579ea95dadca100229d8dded0c622fc2cfbeb58f8f1
                                                  • Instruction ID: fb77f2f3d6b047f2611e9e3de70d2ac7463ff4707b8a139c321d470586086479
                                                  • Opcode Fuzzy Hash: 6671076f9106cb8c4e4f5579ea95dadca100229d8dded0c622fc2cfbeb58f8f1
                                                  • Instruction Fuzzy Hash: B0419731300602BFD21AEA35CC89BAAF75DBBC1740F144626F469E72C2CB79BD51C656
                                                  APIs
                                                  • GetCurrentThreadId.KERNEL32 ref: 004C8F1D
                                                  • GetCurrentThreadId.KERNEL32 ref: 004C8F2C
                                                  • RtlEnterCriticalSection.NTDLL(005E0A68), ref: 004C8F67
                                                  • SetEvent.KERNEL32(?,?,005E0A68,?,?,00000000), ref: 004C8FFB
                                                  • RtlLeaveCriticalSection.NTDLL(005E0A68), ref: 004C9024
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalCurrentSectionThread$EnterEventLeave
                                                  • String ID:
                                                  • API String ID: 130076905-0
                                                  • Opcode ID: 7a2daf1d3c05c77ae41d8cf5daa1270b32c63d7356933173182246ca9d323baf
                                                  • Instruction ID: 2fea30af2fcc91b9b64a6b509dd9eb07bfc6ccb9340704086cce33c19d1b059a
                                                  • Opcode Fuzzy Hash: 7a2daf1d3c05c77ae41d8cf5daa1270b32c63d7356933173182246ca9d323baf
                                                  • Instruction Fuzzy Hash: AF315238604284AFD750CB6AEC49F6A7BF9FB59304F1140AFF400872A1CB799C44DB24
                                                  APIs
                                                  • GetCapture.USER32 ref: 0051D603
                                                  • SendMessageA.USER32(00000000,-0000BBEE,023C2008,?), ref: 0051D657
                                                  • GetWindowLongA.USER32(00000000,000000FA), ref: 0051D667
                                                  • SendMessageA.USER32(00000000,-0000BBEE,023C2008,?), ref: 0051D686
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MessageSend$CaptureLongWindow
                                                  • String ID:
                                                  • API String ID: 1158686931-0
                                                  • Opcode ID: 2fbda3e493915d73ef9cae3a2d01f476a2eee53302915c99f03438d0bfcd3a1a
                                                  • Instruction ID: b42c62c19e00e6fe2485013c4c955ebea3a61783b618ee0ee43a6092f49c7456
                                                  • Opcode Fuzzy Hash: 2fbda3e493915d73ef9cae3a2d01f476a2eee53302915c99f03438d0bfcd3a1a
                                                  • Instruction Fuzzy Hash: E111607120420AAFE770FA588D84FA77BECBB54310B204528FD9DC7642EA55FC908B70
                                                  APIs
                                                  • @TcmSocket@TryLockMultiClient$qqrv.Z39UARTASSIST ref: 0047E5FA
                                                    • Part of subcall function 0047DD14: WaitForSingleObject.KERNEL32(?,00000000,?,?,0047FB39), ref: 0047DD2F
                                                  • GetTickCount.KERNEL32 ref: 0047E602
                                                  • closesocket.WS2_32(?), ref: 0047E64C
                                                  • @TcmSocket@ComboBox_ClientRemove$qqrpv.Z39UARTASSIST(?), ref: 0047E655
                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 0047E6AC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Socket@$Box_ClientClient$qqrvComboCountLockMultiObjectReleaseRemove$qqrpvSemaphoreSingleTickWaitclosesocket
                                                  • String ID:
                                                  • API String ID: 4133281827-0
                                                  • Opcode ID: c1091bfeebedbfc2dd65556f15ba28f11393a03f513de700561d58b4ae140458
                                                  • Instruction ID: dbd308c2cd38c60395c1708d37725a5b7296569556ea5b3c56dfc339b32b28ba
                                                  • Opcode Fuzzy Hash: c1091bfeebedbfc2dd65556f15ba28f11393a03f513de700561d58b4ae140458
                                                  • Instruction Fuzzy Hash: 24214830604601AFC714DF29C5C4AAABBE5BF88314F54CA4EE89D87396CB34E851CB96
                                                  APIs
                                                  • 73A1A570.USER32(00000000,00000001), ref: 0055333C
                                                  • GetTextMetricsA.GDI32(?,?), ref: 0055335A
                                                    • Part of subcall function 00509A94: CreateFontIndirectA.GDI32(?), ref: 00509BD2
                                                  • SelectObject.GDI32(?,00000000), ref: 0055336F
                                                  • GetTextMetricsA.GDI32(?,?), ref: 0055337E
                                                  • SelectObject.GDI32(?,00000000), ref: 00553388
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MetricsObjectSelectText$A570CreateFontIndirect
                                                  • String ID:
                                                  • API String ID: 977181872-0
                                                  • Opcode ID: e1ed9a80d93eed0c969271a6ec7a5c050c860fc76be295bc4be1f3f0ce2e1a59
                                                  • Instruction ID: edfc4ccb8a69d465fbc7a7220e292f41050a46c0c6f3e48bd5fef73a32d27437
                                                  • Opcode Fuzzy Hash: e1ed9a80d93eed0c969271a6ec7a5c050c860fc76be295bc4be1f3f0ce2e1a59
                                                  • Instruction Fuzzy Hash: 8B01EC75A04209BFDB50EBE8CC56E9EBBFCFB88700F410461B604E7652D6359E40CB60
                                                  APIs
                                                  • UnhookWindowsHookEx.USER32(00000000), ref: 0051C28B
                                                  • SetEvent.KERNEL32(00000000,0051E60E,00000000,0051D6C3,?,?,023C2008,00000001,0051D783,?,?,?,023C2008), ref: 0051C2A6
                                                  • GetCurrentThreadId.KERNEL32 ref: 0051C2AB
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0051E60E,00000000,0051D6C3,?,?,023C2008,00000001,0051D783,?,?,?,023C2008), ref: 0051C2C0
                                                  • CloseHandle.KERNEL32(00000000,00000000,0051E60E,00000000,0051D6C3,?,?,023C2008,00000001,0051D783,?,?,?,023C2008), ref: 0051C2CB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCurrentEventHandleHookObjectSingleThreadUnhookWaitWindows
                                                  • String ID:
                                                  • API String ID: 2429646606-0
                                                  • Opcode ID: f179b91a15291018a55f74530d2574b68a0ec0009ffb1a7959b0df81d2013f9f
                                                  • Instruction ID: 666d551f4f1c69471a6e2ee5112e76f92ef4feef2a34f5757a7484cfb100368f
                                                  • Opcode Fuzzy Hash: f179b91a15291018a55f74530d2574b68a0ec0009ffb1a7959b0df81d2013f9f
                                                  • Instruction Fuzzy Hash: F1F01C795006C49BD718EBF8ECCDA593BECB3A4310F000916B0D2CB1A1E7349488EF58
                                                  APIs
                                                  • MessageBoxA.USER32(00000000,0056CCAC,Prompt,00000030), ref: 00408ED3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message
                                                  • String ID: 8$Not found "$Prompt
                                                  • API String ID: 2030045667-3750173787
                                                  • Opcode ID: cc41ebea14d8a8fd2436d958263ecffbb257b69cc9a48b413c6de4b0e1b67f4d
                                                  • Instruction ID: fbe673ffa27f264325c805ba8cbec6d40b533d4a7b86a76c76d87f00f59d5898
                                                  • Opcode Fuzzy Hash: cc41ebea14d8a8fd2436d958263ecffbb257b69cc9a48b413c6de4b0e1b67f4d
                                                  • Instruction Fuzzy Hash: CCC1CF30D11259DBDB00EBA4C949BEEBBB5FF80304F14403AE845BB386DB785909CBA5
                                                  APIs
                                                    • Part of subcall function 0052D308: KiUserCallbackDispatcher.NTDLL(?,?,0056BEC0,?,00406375), ref: 0052D31B
                                                  • LoadBitmapA.USER32(?,00000000), ref: 0044B1A9
                                                  • @TcmButton@$bctr$qqrp18Classes@TComponent.Z39UARTASSIST ref: 0044B316
                                                  • @TcmButton@SetCheckStyle$qqr31Cmcheckbutton@TCheckButtonStyle.Z39UARTASSIST ref: 0044B379
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Check$BitmapButtonButton@Button@$bctr$qqrp18CallbackClasses@Cmcheckbutton@ComponentDispatcherLoadStyleStyle$qqr31User
                                                  • String ID: {W
                                                  • API String ID: 2182213814-3406969006
                                                  • Opcode ID: be3b7c99bb3deee29ff2a85a88a68eaa1a7374d2c5de4cfd163c8fbea89e29f6
                                                  • Instruction ID: 86603e6bc2ad54374662a07fbbcec369bd3d67ed27027a40c0a23e8e66c67c3c
                                                  • Opcode Fuzzy Hash: be3b7c99bb3deee29ff2a85a88a68eaa1a7374d2c5de4cfd163c8fbea89e29f6
                                                  • Instruction Fuzzy Hash: 21A129B4A002158BDB14DF68C885BDDBBF5BF89304F1481B9E908AF396CB716946CF54
                                                  APIs
                                                  • @Cdiroutl@TCDirectoryOutline@ForceCase$qqrrx17System@AnsiString.Z39UARTASSIST ref: 004B639F
                                                  • @Cdiroutl@TCDirectoryOutline@GetChildNamed$qqrrx17System@AnsiStringl.Z39UARTASSIST ref: 004B65E2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AnsiCdiroutl@DirectoryOutline@System@$Case$qqrrx17ChildForceNamed$qqrrx17StringStringl
                                                  • String ID: 2YK$P
                                                  • API String ID: 4150159167-1300926112
                                                  • Opcode ID: ddfa1173472c85c88bf97717f7170fd2c70b2bf1d72932ab3dcd89dc314c6531
                                                  • Instruction ID: 20ac78225ca8af3607c881d72cdb353a3eaf9c09d12e47862b68c9ed1c57b630
                                                  • Opcode Fuzzy Hash: ddfa1173472c85c88bf97717f7170fd2c70b2bf1d72932ab3dcd89dc314c6531
                                                  • Instruction Fuzzy Hash: 8C91F870D1011EDBCF04EFD0D88AAEDB7B9FF94304F10816AE41567266EB349A0A9F95
                                                  APIs
                                                  • @cmSerialCommDriver32@TcmUart@fGetFCtrl$qqrv.Z39UARTASSIST(0056B57C), ref: 004A0870
                                                  • @cmSerialCommDriver32@TcmUart@fSetFCtrl$qqr12TFlowControl.Z39UARTASSIST(0056B57C), ref: 004A087F
                                                  • @cmSerialCommDriver32@TcmUart@SetSyncRequesting$qqro.Z39UARTASSIST(0056B57C), ref: 004A088B
                                                    • Part of subcall function 00478E60: @cmSerialCommDriver32@TcmUart@UpdateCommTimeouts$qqrv.Z39UARTASSIST ref: 00478E8C
                                                    • Part of subcall function 00478E60: ResetEvent.KERNEL32(?), ref: 00478E9D
                                                    • Part of subcall function 00478E60: SetEvent.KERNEL32(?,?), ref: 00478EA8
                                                    • Part of subcall function 00478E60: @cmSerialCommDriver32@TcmUart@LaunchThreads$qqro.Z39UARTASSIST(?,?), ref: 00478EB2
                                                    • Part of subcall function 00478E60: ResetEvent.KERNEL32(?,?,?), ref: 00478EBD
                                                    • Part of subcall function 00478E60: SetEvent.KERNEL32(?,?,?,?), ref: 00478EC8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Comm$Driver32@Serial$Event$Uart@$ResetUart@f$ControlCtrl$qqr12Ctrl$qqrvFlowLaunchRequesting$qqroSyncThreads$qqroTimeouts$qqrvUpdate
                                                  • String ID:
                                                  • API String ID: 4068052791-3916222277
                                                  • Opcode ID: 8f7557ddc93e463a3baec4ff91b62a33f5dcdd64c97c37b514575ed948d65acf
                                                  • Instruction ID: 6675fbb37fc36f19055d8fdda6bdffcd842d79d6b2d4a514d368c91f54f906f0
                                                  • Opcode Fuzzy Hash: 8f7557ddc93e463a3baec4ff91b62a33f5dcdd64c97c37b514575ed948d65acf
                                                  • Instruction Fuzzy Hash: 2661E130A00605DFDB20EF64C886BABB7B5FF95300F14852FD405A7291E738AE49CB98
                                                  APIs
                                                  • ResetEvent.KERNEL32(00000470), ref: 0043D79C
                                                  • SetEvent.KERNEL32(0000046C,00000470), ref: 0043D7A7
                                                  • Sleep.KERNEL32(0000000A,0000046C,00000470), ref: 0043D7BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Event$ResetSleep
                                                  • String ID: ,
                                                  • API String ID: 3112119646-3772416878
                                                  • Opcode ID: 1f407684834f92ae06bbc30182aac652ea4d9b9be6d26a1a13bfa38985206ded
                                                  • Instruction ID: a5b43e556af5ac6c23679ffaae875bc3af26da534ba9ac76ce26bc459559b34e
                                                  • Opcode Fuzzy Hash: 1f407684834f92ae06bbc30182aac652ea4d9b9be6d26a1a13bfa38985206ded
                                                  • Instruction Fuzzy Hash: 3181133090024ACFDB10DB64E889BEDB7F1BB49304F1051ABD405972A2CB786D49EB59
                                                  APIs
                                                  • @cmSerialCommDriver32@TcmUart@fGetFCtrl$qqrv.Z39UARTASSIST(00570DB0), ref: 00440F00
                                                  • @cmSerialCommDriver32@TcmUart@fSetFCtrl$qqr12TFlowControl.Z39UARTASSIST ref: 00440F20
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommDriver32@SerialUart@f$ControlCtrl$qqr12Ctrl$qqrvFlow
                                                  • String ID: Send$Stop
                                                  • API String ID: 2251837308-1901089382
                                                  • Opcode ID: 1a4a7c8e8dc2223c82083914f6cda7ca6afc42fc4631dd25f8561f01fd600748
                                                  • Instruction ID: 632d8d1514f2556a7058b52650d51d2d48226e40a413b25e291a1cbc51291555
                                                  • Opcode Fuzzy Hash: 1a4a7c8e8dc2223c82083914f6cda7ca6afc42fc4631dd25f8561f01fd600748
                                                  • Instruction Fuzzy Hash: ED512E34700600CFD324EB28C49869AB7F6FF89305F20847AE95A8B365DF75AD4ADB45
                                                  APIs
                                                  • @TcmSocket@TryLockMultiClient$qqrv.Z39UARTASSIST ref: 0047FC7D
                                                    • Part of subcall function 0047DD14: WaitForSingleObject.KERNEL32(?,00000000,?,?,0047FB39), ref: 0047DD2F
                                                  • closesocket.WS2_32(?), ref: 0047FCA6
                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 0047FDB2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Client$qqrvLockMultiObjectReleaseSemaphoreSingleSocket@Waitclosesocket
                                                  • String ID: ALL CLIENTS (
                                                  • API String ID: 438266427-2699958977
                                                  • Opcode ID: e641f9b2283dad040fadbd41565efca9ba9c98ba6d0c613bbe023ebacb575cbe
                                                  • Instruction ID: dd7a55ed21580c460b0dde29648422e70858e53512183f709b74d81d95d60e8e
                                                  • Opcode Fuzzy Hash: e641f9b2283dad040fadbd41565efca9ba9c98ba6d0c613bbe023ebacb575cbe
                                                  • Instruction Fuzzy Hash: 45413070A0020ADFCB04DF94D485AEEFBF5FF88310F1485AAE905AB356DB74A945CB90
                                                  APIs
                                                  • 73A1A570.USER32(00000000,00000000), ref: 00510541
                                                  • CreateHalftonePalette.GDI32(00000000,00000000,00000000), ref: 0051054E
                                                  • DeleteObject.GDI32(00000000), ref: 005105CB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: A570CreateDeleteHalftoneObjectPalette
                                                  • String ID: (
                                                  • API String ID: 1897567740-3887548279
                                                  • Opcode ID: 399dcb8f9d9f9bfcec604902cc81e515505ca486c8ed43fb71865d6c49cdf446
                                                  • Instruction ID: 35db6e8162a96f8599c9db9fe3b61917fcf30161d8594504f18f4358b9b05e00
                                                  • Opcode Fuzzy Hash: 399dcb8f9d9f9bfcec604902cc81e515505ca486c8ed43fb71865d6c49cdf446
                                                  • Instruction Fuzzy Hash: B841AF30A042099FEB14DFA8C489BDEBBF6FF49304F1140A6E404A7391D6B49E85DB81
                                                  APIs
                                                  • VirtualQuery.KERNEL32(?,?,0000001C,00000000,004D4C6F,?,?,?,?,004D4CD9,?,00000000,004D4D3B), ref: 004D4B1F
                                                  • GetModuleFileNameA.KERNEL32(?,?,00000105,?,?,0000001C,00000000,004D4C6F,?,?,?,?,004D4CD9), ref: 004D4B41
                                                    • Part of subcall function 004E4E74: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004E4EA5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileLoadModuleNameQueryStringVirtual
                                                  • String ID: HjM$HkM
                                                  • API String ID: 902310565-1010384884
                                                  • Opcode ID: e090ac6acd870e42b4176be7696239925b1aa1c29542c111288f5cae10dbac99
                                                  • Instruction ID: 4d7515481cd73b8e8530e1d52da412e432866f8bfa424b235571ac060c538d1a
                                                  • Opcode Fuzzy Hash: e090ac6acd870e42b4176be7696239925b1aa1c29542c111288f5cae10dbac99
                                                  • Instruction Fuzzy Hash: 8D410330900658CFDB60DF69CC85BCAB7B9AB99304F4040E6E408EB351D778AE88CF55
                                                  APIs
                                                    • Part of subcall function 004D2760: GetLocalTime.KERNEL32(?), ref: 004D2768
                                                  • PostMessageA.USER32(00000000,000000B7,00000000,00000000), ref: 00441604
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalMessagePostTime
                                                  • String ID: [%s]# %s$ $yyyy-MM-dd HH:mm:ss.ZZZ
                                                  • API String ID: 1062205982-445605845
                                                  • Opcode ID: 2dfb7189e8253b7e29f9b6d94c293024815588746ce223d9ff1a3ea70388379b
                                                  • Instruction ID: 06ad535751817f11faf6030207d1078d960bb4eed623084a198a1ecd4bd34581
                                                  • Opcode Fuzzy Hash: 2dfb7189e8253b7e29f9b6d94c293024815588746ce223d9ff1a3ea70388379b
                                                  • Instruction Fuzzy Hash: 76413970A002459FE700EF58D88A7AE7BF0FB81304F14426BE4469B3E2DBB46D89DB55
                                                  APIs
                                                  • UnregisterHotKey.USER32(00000000,?,?,?,00000021), ref: 00498C54
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Unregister
                                                  • String ID: $Prompt$Sure to delete selected %d records?
                                                  • API String ID: 315482161-3851864719
                                                  • Opcode ID: c8ec6c9c95d2babf95bb5d598f193d9921496e5fb571da3f135fa2f007be5bc2
                                                  • Instruction ID: afbecf13f11fc66b68da1a91d19e3b0a8606c9de30bfd8f94dd9eb6b8c360478
                                                  • Opcode Fuzzy Hash: c8ec6c9c95d2babf95bb5d598f193d9921496e5fb571da3f135fa2f007be5bc2
                                                  • Instruction Fuzzy Hash: AA31A670A003499BDB10EB68C889B9E7FB8BF89304F04417AED05AB352DF759909C799
                                                  APIs
                                                  • UnregisterHotKey.USER32(00000000,?,00000021), ref: 00498AE3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Unregister
                                                  • String ID: @$Prompt$Sure to delete all data records?
                                                  • API String ID: 315482161-4029161809
                                                  • Opcode ID: 0ed3df33b60b0c6bfb207ddcbf882f1d89525b85a1b5fa6129abde8ce8014870
                                                  • Instruction ID: 7de1e6a0ecf085a759125f01d7199f37578a594ceba8b359344f70f837951a47
                                                  • Opcode Fuzzy Hash: 0ed3df33b60b0c6bfb207ddcbf882f1d89525b85a1b5fa6129abde8ce8014870
                                                  • Instruction Fuzzy Hash: BD317070A002499FCB11EB68D4897AEBBF5FB85304F14417AE805AB356CB74AC45CB95
                                                  APIs
                                                  • ShellExecuteA.SHELL32(?,00000000,0056F12B,00000000,00000000,00000001), ref: 00416941
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID: #rank$donate/$http://www.cmsoft.cn/assistcenter/
                                                  • API String ID: 587946157-3503382147
                                                  • Opcode ID: 1492f719771eed29bc30da4f97fc570c2e1abd712414a534bf3826370e35e362
                                                  • Instruction ID: 5203e865ec4c6ff0edcb9a1f7e4e4437d70394f694ca3cbe135837f04e2d8181
                                                  • Opcode Fuzzy Hash: 1492f719771eed29bc30da4f97fc570c2e1abd712414a534bf3826370e35e362
                                                  • Instruction Fuzzy Hash: F7311E7090010ADBCF44EF90D496BAFB7B9FF84300F5085A6D8056B29AEB74DA16DB51
                                                  APIs
                                                    • Part of subcall function 0050C098: GetObjectA.GDI32(?,00000054), ref: 0050C0AC
                                                  • GetDIBits.GDI32(00000000,?,00000000,?,00000000,?,00000000), ref: 0050C24E
                                                  • DeleteDC.GDI32(00000000), ref: 0050C27F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BitsDeleteObject
                                                  • String ID: jQ$jQ
                                                  • API String ID: 2773124069-37713549
                                                  • Opcode ID: 82277707a5818bf8820355d60e2ad23afa582fe5a75172bd4fea466bc860fa74
                                                  • Instruction ID: 81c7bebceab84668a52a1472cd72717b67203414187718c3f8e44f51c944fa90
                                                  • Opcode Fuzzy Hash: 82277707a5818bf8820355d60e2ad23afa582fe5a75172bd4fea466bc860fa74
                                                  • Instruction Fuzzy Hash: C4113A79A04205BBDB10DBE98C95F9EBFFCFB8A710F508564B914E7281E6749D008760
                                                  APIs
                                                  • send.WS2_32(000000FF,00000000,00000000,00000000), ref: 0047F9F4
                                                  • WSAGetLastError.WS2_32(000000FF,00000000,00000000,00000000), ref: 0047FA0E
                                                  • @TcmSocket@ErrorCheck$qqripc.Z39UARTASSIST(000000FF,00000000,00000000,00000000), ref: 0047FA2D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Error$Check$qqripcLastSocket@send
                                                  • String ID: send to() failed
                                                  • API String ID: 1990143658-2875333197
                                                  • Opcode ID: e87ee806363ec887404083b0d930094a2ab2d31e2980035caa25a24a4ee4c290
                                                  • Instruction ID: 2e82f9d36d8dfb0dbef06b09d3f618343e3def94093aee179951460a8c6c2089
                                                  • Opcode Fuzzy Hash: e87ee806363ec887404083b0d930094a2ab2d31e2980035caa25a24a4ee4c290
                                                  • Instruction Fuzzy Hash: F1113DB2A08205BBDB20957C5C427DF76A49F84320F20C63BE52DD73C1E538CC498399
                                                  APIs
                                                  • GetMenuItemInfoA.USER32(00000000,00000000,000000FF), ref: 004F9AB2
                                                  • SetMenuItemInfoA.USER32(00000000,00000000,000000FF), ref: 004F9B04
                                                  • DrawMenuBar.USER32(00000000), ref: 004F9B11
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Menu$InfoItem$Draw
                                                  • String ID: P
                                                  • API String ID: 3227129158-3110715001
                                                  • Opcode ID: 02bc53f4d9a835b7ce47c4f89d8d92cfa4105f5195c97d8a0b2c3646e5cf90df
                                                  • Instruction ID: bbee3f3d05b156ea0973354d1afc72708aa06cd5b63150ec5d3b1f52d9517aa5
                                                  • Opcode Fuzzy Hash: 02bc53f4d9a835b7ce47c4f89d8d92cfa4105f5195c97d8a0b2c3646e5cf90df
                                                  • Instruction Fuzzy Hash: D611CE30605205AFD310DF29CC85BAB7AD8AF84364F148629F194CB3D9E739DC84C78A
                                                  APIs
                                                  • SetFilePointer.KERNEL32(000000FF,?,00000000,00000001), ref: 0045EEBB
                                                  • WriteFile.KERNEL32(000000FF,00000000,?,0000001F,00000000,000000FF,?,00000000,00000001), ref: 0045EEDB
                                                  • WriteFile.KERNEL32(000000FF,</Table></Worksheet></Workbook>,?,?,00000000,000000FF,00000000,?,0000001F,00000000,000000FF,?,00000000,00000001), ref: 0045EEF5
                                                  Strings
                                                  • </Table></Worksheet></Workbook>, xrefs: 0045EEEC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Write$Pointer
                                                  • String ID: </Table></Worksheet></Workbook>
                                                  • API String ID: 2567243663-1160089620
                                                  • Opcode ID: f0c6b5104a592aee5c27be8499ef420236fc0e39e41b3245c966ceb65db14a93
                                                  • Instruction ID: 4a6d8c471680469aea077da98c48d92e3a38e87ebc541f84c02de2afc7d91c7d
                                                  • Opcode Fuzzy Hash: f0c6b5104a592aee5c27be8499ef420236fc0e39e41b3245c966ceb65db14a93
                                                  • Instruction Fuzzy Hash: 1E0121722082007FD718DE58D886FAB77ECAB88724F10464DF6598B2C6DB74DC51C7A6
                                                  APIs
                                                  • FindWindowA.USER32(UartAssist,00000000), ref: 0043B822
                                                  • SendMessageA.USER32(00000000,0000004A,00000065), ref: 0043B83C
                                                  • FindWindowExA.USER32(00000000,00000000,UartAssist,00000000), ref: 0043B84B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FindWindow$MessageSend
                                                  • String ID: UartAssist
                                                  • API String ID: 1134572027-377352531
                                                  • Opcode ID: 2c45f2c88e6d0a3aeec7cd6c050d98195e0ecd3628429e1ee2867c086a50a6b1
                                                  • Instruction ID: 3795a7854f3168cf9f48d69e552b5519762f929662dad3af88264303c89c70c1
                                                  • Opcode Fuzzy Hash: 2c45f2c88e6d0a3aeec7cd6c050d98195e0ecd3628429e1ee2867c086a50a6b1
                                                  • Instruction Fuzzy Hash: 70F068A1B407167BE620A6585CD2F577A8CEBD8B50F05C12AB74CAB291E6B48C4446D2
                                                  APIs
                                                  • ReleaseMutex.KERNEL32(?,?,000000FF,?,000000FF), ref: 00465AF9
                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00465B09
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,000000FF), ref: 00465B15
                                                  Strings
                                                  • HTTP_AsyncReponseThreadProc terminated, xrefs: 00465B1E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ObjectSingleWait$MutexRelease
                                                  • String ID: HTTP_AsyncReponseThreadProc terminated
                                                  • API String ID: 1412826340-452453133
                                                  • Opcode ID: e72ecb7277c2c0420eb879f49703b3f3c339063e7b5281eb3f706b23a92c0ea8
                                                  • Instruction ID: 1de62bedaff1f976dcdfb92b6fb20c3c58823b17c115ae6b215447b27d182e3d
                                                  • Opcode Fuzzy Hash: e72ecb7277c2c0420eb879f49703b3f3c339063e7b5281eb3f706b23a92c0ea8
                                                  • Instruction Fuzzy Hash: 2AF0F431104606ABCB10EF99CC82A4B3B9CEF40334F200316FC11972C6EB38DC4186AA
                                                  APIs
                                                  • LoadBitmapA.USER32(?,SPLITTER_HOR), ref: 00406166
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00406192
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BitmapLoadObjectSelect
                                                  • String ID: 5u~$SPLITTER_HOR
                                                  • API String ID: 1161856002-3241009401
                                                  • Opcode ID: a50af7abbbce18c0e1cea9d1b9d22c766fac722c0b740c2cbf39274e1b23370d
                                                  • Instruction ID: e034203306f86fee64d54faf5908885319fdda7aab2f195bb386152c3e969c1c
                                                  • Opcode Fuzzy Hash: a50af7abbbce18c0e1cea9d1b9d22c766fac722c0b740c2cbf39274e1b23370d
                                                  • Instruction Fuzzy Hash: E801C8706043058BDB05EF34C8C9A9A37A9BF89300F5444B9EC089F25ACB35DC428B60
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(comctl32.dll,004BB47D,00000100,00541466), ref: 004BB41A
                                                  • GetProcAddress.KERNEL32(74B30000,InitCommonControlsEx), ref: 004BB438
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: InitCommonControlsEx$comctl32.dll
                                                  • API String ID: 1646373207-802336580
                                                  • Opcode ID: 06c0a340fe8b0394b4f2aeed1cb5738d6ca2e1c9ce4245f7bdb7750ddd835d80
                                                  • Instruction ID: 6a466c90a47dbdabe89071647987c6a07480990c04ddb27f578638636656558a
                                                  • Opcode Fuzzy Hash: 06c0a340fe8b0394b4f2aeed1cb5738d6ca2e1c9ce4245f7bdb7750ddd835d80
                                                  • Instruction Fuzzy Hash: 8FD05E7082138A8AC708ABA8DCDAB893654F360304F00643AA0414FDE2CBFC0488EFA5
                                                  APIs
                                                  • GetDesktopWindow.USER32 ref: 0052BAAC
                                                  • GetDesktopWindow.USER32 ref: 0052BBD1
                                                  • SetCursor.USER32(00000000), ref: 0052BC26
                                                    • Part of subcall function 00535CFC: ShowCursor.USER32(000000FF,00000000,?,0052BC01), ref: 00535D33
                                                  • SetCursor.USER32(00000000), ref: 0052BC11
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Cursor$DesktopWindow$Show
                                                  • String ID:
                                                  • API String ID: 110329033-0
                                                  • Opcode ID: 5ab7dccce32c5e96be823993803ce5f41c495b52af110c7d5ecefa608e5a61a5
                                                  • Instruction ID: ef682b9b1a64c8240f7cbedb3fc54f1dae57fe4195e2ec36a470653c7da5b843
                                                  • Opcode Fuzzy Hash: 5ab7dccce32c5e96be823993803ce5f41c495b52af110c7d5ecefa608e5a61a5
                                                  • Instruction Fuzzy Hash: BE915C74601A928FD318DF29EAC8EA57BE1BFE5340F048596E4858B3A6D730EC48DF45
                                                  APIs
                                                  • LPtoDP.GDI32(00000000,?,00000006), ref: 0043827D
                                                  • CreatePolygonRgn.GDI32(?,00000006,00000001), ref: 0043828A
                                                  • SelectClipRgn.GDI32(00000000,00000000), ref: 00438293
                                                  • DeleteObject.GDI32(00000000), ref: 00438299
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ClipCreateDeleteObjectPolygonSelect
                                                  • String ID:
                                                  • API String ID: 4180103009-0
                                                  • Opcode ID: fea621ca975dc0c24bc778d4c0615e66ef6b0415e059bd28c1d3015f690021b9
                                                  • Instruction ID: 76483f7eb5cec81197128b11c4a29a5580514158b8078bdaa42066a7e90ca41d
                                                  • Opcode Fuzzy Hash: fea621ca975dc0c24bc778d4c0615e66ef6b0415e059bd28c1d3015f690021b9
                                                  • Instruction Fuzzy Hash: A751E274A00219EFCB00DF99C880DAEF7B9BF48314F04959AF905EB245DB74AD45CBA5
                                                  APIs
                                                  • GetFileAttributesA.KERNEL32(?,?,?,?), ref: 0055B050
                                                  • CreateFileA.KERNEL32(?,?,?,?,00000005,00000000,00000000,?,?,?,?), ref: 0055B108
                                                  • GetLastError.KERNEL32(?,?,?,?,00000005,00000000,00000000,?,?,?,?), ref: 0055B114
                                                  • CloseHandle.KERNEL32(00000000), ref: 0055B185
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$AttributesCloseCreateErrorHandleLast
                                                  • String ID:
                                                  • API String ID: 2927643983-0
                                                  • Opcode ID: 3105a6216f009f406618ce75470915a142f57993a4ab6bc289a8cec4e9dfd854
                                                  • Instruction ID: 23e2b6ff56ce64c19db22e2ce6e06acafafb6fc83cb20b0cb1b7c9cbacf827a5
                                                  • Opcode Fuzzy Hash: 3105a6216f009f406618ce75470915a142f57993a4ab6bc289a8cec4e9dfd854
                                                  • Instruction Fuzzy Hash: A25108319046099AFB148E68C8BD7BF7FA4FB45322F248617ED268B1E1D7759A4CC701
                                                  APIs
                                                    • Part of subcall function 0052B8EC: WindowFromPoint.USER32(0052B6DE,005E15E8,00000000,0052B4CE,?,005E15D0,?), ref: 0052B8F2
                                                    • Part of subcall function 0052B8EC: GetParent.USER32(00000000), ref: 0052B909
                                                  • GetWindow.USER32(00000000,00000004), ref: 0052B4D6
                                                  • GetCurrentThreadId.KERNEL32 ref: 0052B5AA
                                                  • GetWindowRect.USER32(00000000,?), ref: 0052B5C7
                                                  • IntersectRect.USER32(?,?,?), ref: 0052B635
                                                    • Part of subcall function 0052AA3C: GlobalFindAtomA.KERNEL32(00000000,?,004FA199,?,004F94D9,?,?,00000000,?,?,004FA8F7,?,?,0046D86B), ref: 0052AA50
                                                    • Part of subcall function 0052AA3C: GetPropA.USER32(?,00000000), ref: 0052AA67
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$Rect$AtomCurrentFindFromGlobalIntersectParentPointPropThread
                                                  • String ID:
                                                  • API String ID: 2329882401-0
                                                  • Opcode ID: 03102d2d18eb79d63db5e3519a9700fb2cd89315d4ccda794fdb60ca0faa48e2
                                                  • Instruction ID: 77c8b20dee59aba03d069942c411a174512b7d4880864de4b4e68fed2c776544
                                                  • Opcode Fuzzy Hash: 03102d2d18eb79d63db5e3519a9700fb2cd89315d4ccda794fdb60ca0faa48e2
                                                  • Instruction Fuzzy Hash: FF517D31A006159FDB10DF6DE885AAEBBF4BF49350F1441A1E845EB391D730EE41CBA1
                                                  APIs
                                                  • StretchBlt.GDI32(00000000,00000001,00000005,00000000), ref: 0047617A
                                                  • StretchBlt.GDI32(00000000,00000001,00000005,00000000), ref: 004761A8
                                                  • @TcmForm@DrawTitle$qqrp16Graphics@TCanvasii17System@AnsiString.Z39UARTASSIST(?,00000007,00000000,00000001,00000005,00000000), ref: 00476207
                                                  • InvalidateRect.USER32(00000000,?,00000000,?,00000007,00000000,00000001,00000005,00000000), ref: 0047625A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Stretch$AnsiCanvasii17DrawForm@Graphics@InvalidateRectStringSystem@Title$qqrp16
                                                  • String ID:
                                                  • API String ID: 3304473458-0
                                                  • Opcode ID: 84147a194aae434d35450a8a7cddc854d488b83068755b48e945d7828d1c2016
                                                  • Instruction ID: 0672b3ff3c131e1fe94f9545b4c692e1ddd9ae911a11891bb7f72e90aaf2c00e
                                                  • Opcode Fuzzy Hash: 84147a194aae434d35450a8a7cddc854d488b83068755b48e945d7828d1c2016
                                                  • Instruction Fuzzy Hash: 5F414574600105AFDB14EF64C889BEEB7B5FF89300F1581A5FD05AF296EA70AD05CB91
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,00000000,?), ref: 004693CC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ObjectSingleWait
                                                  • String ID:
                                                  • API String ID: 24740636-0
                                                  • Opcode ID: 8c01fa20a365fd91b481daf0583a1b2a24497d2bf24da0c2ad4f2a9da78a9d66
                                                  • Instruction ID: 78434a7f60e96069cfc691fa5bd1997dda18b28f6a496329f72d0a0037ff9266
                                                  • Opcode Fuzzy Hash: 8c01fa20a365fd91b481daf0583a1b2a24497d2bf24da0c2ad4f2a9da78a9d66
                                                  • Instruction Fuzzy Hash: C6419335508114ABCB20DE68C884B5A77A9AB45324F248357EC249B3D9EBB8DC46CB97
                                                  APIs
                                                    • Part of subcall function 00438814: MulDiv.KERNEL32(?,?), ref: 00438826
                                                    • Part of subcall function 00438814: MulDiv.KERNEL32(?,?), ref: 0043883B
                                                    • Part of subcall function 00438814: MulDiv.KERNEL32(?,?), ref: 00438850
                                                    • Part of subcall function 00438814: SelectObject.GDI32(?,00000000), ref: 00438883
                                                    • Part of subcall function 00438814: DeleteObject.GDI32(00000000), ref: 00438889
                                                    • Part of subcall function 00438814: CreateSolidBrush.GDI32(?), ref: 0043888F
                                                    • Part of subcall function 00438814: SelectObject.GDI32(?,00000000), ref: 0043889C
                                                  • PatBlt.GDI32(?,?,?,00000001,?,00F00021), ref: 00438B99
                                                  • PatBlt.GDI32(?,?,?,00000001,?,00F00021), ref: 00438BC2
                                                  • PatBlt.GDI32(?,?,?,?,00000001,00F00021), ref: 00438BE2
                                                  • PatBlt.GDI32(?,?,?,?,00000001,00F00021), ref: 00438C0D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Object$Select$BrushCreateDeleteSolid
                                                  • String ID:
                                                  • API String ID: 1979645813-0
                                                  • Opcode ID: b4f6753b063e79660941eda1cebf4592c861d626d5f15dde2abe8a4a13cad46c
                                                  • Instruction ID: 5f06f7094e0d098fc3f0e7bff7ede5fd97fdf4b3f929ac729d491fb85434104c
                                                  • Opcode Fuzzy Hash: b4f6753b063e79660941eda1cebf4592c861d626d5f15dde2abe8a4a13cad46c
                                                  • Instruction Fuzzy Hash: D741D572A00219AFCB40DF9CD985E9EBBF8FB5C314B108155F948E7354D630FA819BA4
                                                  APIs
                                                  • @TcmSocket@inet_aton$qqrpxcp6IPDATAi.Z39UARTASSIST ref: 0047D5D4
                                                  • @TcmSocket@inet_aton$qqrpxcp6IPDATAi.Z39UARTASSIST ref: 0047D62A
                                                  • @TcmSocket@inet_aton$qqrpxcp6IPDATAi.Z39UARTASSIST ref: 0047D67D
                                                  • @TcmSocket@inet_aton$qqrpxcp6IPDATAi.Z39UARTASSIST ref: 0047D6CB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Socket@inet_aton$qqrpxcp6
                                                  • String ID:
                                                  • API String ID: 2966448890-0
                                                  • Opcode ID: a5abaf0b0cee950d9d055c4f165267791cc08a49d3a7741e3b6ac501f36f41e0
                                                  • Instruction ID: 895bea4a984b9c0e0ca4affea8ba22975b9ef2354d361022ef65cd9af8ee5a63
                                                  • Opcode Fuzzy Hash: a5abaf0b0cee950d9d055c4f165267791cc08a49d3a7741e3b6ac501f36f41e0
                                                  • Instruction Fuzzy Hash: C4418E70A15605CBE724EA28C851BE333F6AF41304F15896FD08F5B2D1E778AC49CB29
                                                  APIs
                                                  • 73A1A570.USER32(00000000), ref: 004776CE
                                                  • SelectObject.GDI32(00000000,00000000), ref: 004776DF
                                                  • GetTextExtentPoint32A.GDI32(00000000,00585A24,00000000,?), ref: 00477737
                                                  • SelectObject.GDI32(00000000,00000000), ref: 0047775E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ObjectSelect$A570ExtentPoint32Text
                                                  • String ID:
                                                  • API String ID: 1121144139-0
                                                  • Opcode ID: c81d2e2574e5b9a7e0540c8272e71617294c8844f15392e99f029d5a960cb7e2
                                                  • Instruction ID: 2584d1eb8023c4080f67b35d5d8789e9e4d30c18873d0d753834cfe75b580a8e
                                                  • Opcode Fuzzy Hash: c81d2e2574e5b9a7e0540c8272e71617294c8844f15392e99f029d5a960cb7e2
                                                  • Instruction Fuzzy Hash: 1F416474A005059BCB04EF68C985ADEBBF9FF84301F508176F805A7356DB34AE05CB65
                                                  APIs
                                                  • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 004D7A4B
                                                  • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 004D7A67
                                                  • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 004D7ADE
                                                  • VariantClear.OLEAUT32(?), ref: 004D7B07
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ArraySafe$Bound$ClearIndexVariant
                                                  • String ID:
                                                  • API String ID: 920484758-0
                                                  • Opcode ID: 0ef4a6cc49254683737619236c9a8fa127eb48bc7ca9553b0f375beda7e1f9c5
                                                  • Instruction ID: 455ea3e4f15c1c20d204b917400f787c647d52bde383c5977b93e5374d231ff1
                                                  • Opcode Fuzzy Hash: 0ef4a6cc49254683737619236c9a8fa127eb48bc7ca9553b0f375beda7e1f9c5
                                                  • Instruction Fuzzy Hash: 24412075A042199FCB61DB59CCA1BD9B3BCAF48314F0041DBE649A7312EA34AF808F65
                                                  APIs
                                                  • @Cmbitmap@TcmBitmap@InitHeader$qqrv.Z39UARTASSIST ref: 004871E5
                                                  • 73A1A570.USER32(00000000,00000000,-000000D0,00000000,-00000050,00000000,00000000), ref: 00487225
                                                  • GetDIBits.GDI32(00000000,00000000), ref: 0048724E
                                                  • GetDIBColorTable.GDI32(00000000,00000000,00000100,-000000EC), ref: 00487286
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: A570Bitmap@BitsCmbitmap@ColorHeader$qqrvInitTable
                                                  • String ID:
                                                  • API String ID: 1027656077-0
                                                  • Opcode ID: 4f0e5ef4bdfbbbcc24abcfd566cd9294d80f4cd0fe2ae3c3eaa52fe0dbfbceb8
                                                  • Instruction ID: 7e4ec7604928feae8b7d896abc5f669fad96d92a66e801dd5c5927a89275cb1b
                                                  • Opcode Fuzzy Hash: 4f0e5ef4bdfbbbcc24abcfd566cd9294d80f4cd0fe2ae3c3eaa52fe0dbfbceb8
                                                  • Instruction Fuzzy Hash: 1F310975600205AFE360EF58C885F9ABBE8FF49310F2045A9F684DB391DA35ED40CB90
                                                  APIs
                                                  • @TPerformanceGraph@GetBandCount$qqrv.Z39UARTASSIST ref: 004B98E7
                                                  • @TPerformanceGraph@FirstY$qqrv.Z39UARTASSIST ref: 004B9930
                                                  • @TPerformanceGraph@NextY$qqri.Z39UARTASSIST ref: 004B9953
                                                  • @TPerformanceGraph@NextY$qqri.Z39UARTASSIST ref: 004B99B0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Graph@Performance$NextY$qqri$BandCount$qqrvFirstY$qqrv
                                                  • String ID:
                                                  • API String ID: 2038855866-0
                                                  • Opcode ID: 3e1b6862dff1a87592e9e61b619af7ebf0693d3cd9f9cfa16a3f289f63fee4af
                                                  • Instruction ID: 9acd35ab9a03528c51b6ec9c52fc36728ee07693eed582cd9f9c48915e063a4d
                                                  • Opcode Fuzzy Hash: 3e1b6862dff1a87592e9e61b619af7ebf0693d3cd9f9cfa16a3f289f63fee4af
                                                  • Instruction Fuzzy Hash: 6D41E8B5E0010ADFCB44CF98C5819EEB7B1FB88314F2482AAD915A7385D7306F41CBA4
                                                  APIs
                                                  • @Cmbitmap@CMGetColor$qqr15Graphics@TColor.Z39UARTASSIST(?), ref: 00487D52
                                                  • @Cmbitmap@CMIntToByte$qqri.Z39UARTASSIST ref: 00487DE1
                                                  • @Cmbitmap@CMIntToByte$qqri.Z39UARTASSIST ref: 00487DF5
                                                  • @Cmbitmap@CMIntToByte$qqri.Z39UARTASSIST ref: 00487E0A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Cmbitmap@$Byte$qqri$ColorColor$qqr15Graphics@
                                                  • String ID:
                                                  • API String ID: 3698210595-0
                                                  • Opcode ID: 5ebbab88b8abc909695151e112ffc69a8b8d0776b40a902ddab687e95baef062
                                                  • Instruction ID: 819eee2e428278f70b11a4b332e11f0ad66aa51a3df9249c54d066a71672e121
                                                  • Opcode Fuzzy Hash: 5ebbab88b8abc909695151e112ffc69a8b8d0776b40a902ddab687e95baef062
                                                  • Instruction Fuzzy Hash: B931AE31A0818A9FCB11EF68C4906AEFBB5FF06304F1985D6C498EB306D730D945CB94
                                                  APIs
                                                  • @Cmbitmap@TcmBitmap@InitHeader$qqrv.Z39UARTASSIST ref: 00487363
                                                  • 73A1A570.USER32(00000000), ref: 0048737F
                                                  • GetDIBits.GDI32(00000000,00000000,00000000,?,?,?,00000000), ref: 004873D1
                                                  • DeleteObject.GDI32(00000000), ref: 004873D7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: A570Bitmap@BitsCmbitmap@DeleteHeader$qqrvInitObject
                                                  • String ID:
                                                  • API String ID: 2007105792-0
                                                  • Opcode ID: 5f977f2e559d8382e34d9688c920ffa74d67ac3ccc33e7c15bc5098d3cc28603
                                                  • Instruction ID: 0b880162bc6552fb08556c7c3a20ccdcc8bf916f75a67c7c14d6b99105d9efcd
                                                  • Opcode Fuzzy Hash: 5f977f2e559d8382e34d9688c920ffa74d67ac3ccc33e7c15bc5098d3cc28603
                                                  • Instruction Fuzzy Hash: D3211A72244205AFEB50DE59CC85FAA7BACFB89710F140075FE08DF286DA70AD05CBA5
                                                  APIs
                                                  • @TcmSocket@TryLockMultiClient$qqrv.Z39UARTASSIST ref: 0047FB34
                                                    • Part of subcall function 0047DD14: WaitForSingleObject.KERNEL32(?,00000000,?,?,0047FB39), ref: 0047DD2F
                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 0047FB7E
                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 0047FBB8
                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 0047FBDA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ReleaseSemaphore$Client$qqrvLockMultiObjectSingleSocket@Wait
                                                  • String ID:
                                                  • API String ID: 1699416865-0
                                                  • Opcode ID: 8f51f7b249a68378b140972681d8870c17f2999b0ef021052630610fa4467f6c
                                                  • Instruction ID: 117ea8f182268f7ae7a567ae7d421d2f90b63cbaa166e46f6def218e7ebf39c3
                                                  • Opcode Fuzzy Hash: 8f51f7b249a68378b140972681d8870c17f2999b0ef021052630610fa4467f6c
                                                  • Instruction Fuzzy Hash: E921A431604341ABDB24EB24C8D5FE7B7A4BB84710F54C96BEA584B286D379BC48C395
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412E28
                                                  • ReleaseMutex.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,000000FF), ref: 00412E96
                                                  • SetEvent.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000000,000000FF), ref: 00412EA2
                                                  • ReleaseMutex.KERNEL32(00000000,?,00000000,000000FF), ref: 00412ECA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MutexRelease$EventObjectSingleWait
                                                  • String ID:
                                                  • API String ID: 2539647328-0
                                                  • Opcode ID: 73534fe0fc03958198ce0699a0963e0a6e9658e85d8675a3a8e4b646e42959d6
                                                  • Instruction ID: 531a4b84065381725b4e1dea9528c79ba1d442b04f158c45412781f22a297ea3
                                                  • Opcode Fuzzy Hash: 73534fe0fc03958198ce0699a0963e0a6e9658e85d8675a3a8e4b646e42959d6
                                                  • Instruction Fuzzy Hash: 401127B6601201ABC700EB68CC82D9F37ADFBD4700F04451AF908CB245E374ED5597A6
                                                  APIs
                                                  • IsRectEmpty.USER32(?), ref: 00500D3B
                                                  • IsWindowVisible.USER32(00000000), ref: 00500D66
                                                  • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000048,?,?,00000000,?,00500E47,00505D0C,?), ref: 00500D9E
                                                  • SetFocus.USER32(00000000,?,?,?,?,00000048,?,?,00000000,?,00500E47,00505D0C,?), ref: 00500DD3
                                                    • Part of subcall function 00500CC8: IsWindowVisible.USER32(00000000), ref: 00500CDF
                                                    • Part of subcall function 00500CC8: SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,0000008C,00000000,?,?,00505BB6,00505BBE,?,?,00501498,00503C97), ref: 00500D06
                                                    • Part of subcall function 00500CC8: SetFocus.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0000008C,00000000,?,?,00505BB6,00505BBE,?,?,00501498), ref: 00500D26
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$FocusVisible$EmptyRect
                                                  • String ID:
                                                  • API String ID: 698668684-0
                                                  • Opcode ID: 6e6853709f0d1d136c6a698cb16427812c866d5b701182885be40ef1df43dd77
                                                  • Instruction ID: 6855907dc4228b9e1c2b1962d896f93c33058052e39c9b46e591e695aef2a5ae
                                                  • Opcode Fuzzy Hash: 6e6853709f0d1d136c6a698cb16427812c866d5b701182885be40ef1df43dd77
                                                  • Instruction Fuzzy Hash: C911A3613406025BD210AAB98989B7EBF9DBFC5340F080524F558DB2C1DF25FC02A775
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,00000000), ref: 00465B64
                                                  • ReleaseMutex.KERNEL32(?,?,00000000), ref: 00465B81
                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000,?,?,00000000), ref: 00465B94
                                                  • Sleep.KERNEL32(000003E8), ref: 00465BAB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Release$MutexObjectSemaphoreSingleSleepWait
                                                  • String ID:
                                                  • API String ID: 2872105231-0
                                                  • Opcode ID: cb9ba737f06fa1b9e354bab285ee0c8b396e8a0e05996e9ae2087cd5ff4e1d72
                                                  • Instruction ID: 80642e786c0c0fc9d55eebbc86d43de0ccfba9863b03a258d1d42bdbd793af5a
                                                  • Opcode Fuzzy Hash: cb9ba737f06fa1b9e354bab285ee0c8b396e8a0e05996e9ae2087cd5ff4e1d72
                                                  • Instruction Fuzzy Hash: 5411A731A00608AFDB14DF99C885B8EBBB8FF84704F10419AED059B282E375F981CB95
                                                  APIs
                                                  • PostMessageA.USER32(00000000,00000010,00000000,00000000), ref: 004755A3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: 666e8d05a39d96fdf1f9aa5f95c9d443200fe58df7b189538a4c4d28f30c7c32
                                                  • Instruction ID: 55c9283b00f6af19c43679ae5a8b82181f78645c1662de4bf6b06f67432aee89
                                                  • Opcode Fuzzy Hash: 666e8d05a39d96fdf1f9aa5f95c9d443200fe58df7b189538a4c4d28f30c7c32
                                                  • Instruction Fuzzy Hash: D7017332341A002BE520B778AC86BC77356BB41311F148057F14CDF395C7F96C409788
                                                  APIs
                                                  • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000080,00000000,0059D490,00000000,-000000F6,00000000,?,005635BA,00000000,00000000,00000000), ref: 005633E8
                                                    • Part of subcall function 00563378: GetLocalTime.KERNEL32(?,00000000,-000000F6,00000000,?,005635BA,00000000,00000000,00000000,-000000F6,?,00563682,Abnormal program termination,00564323,?,?), ref: 0056337C
                                                    • Part of subcall function 00563378: wsprintfA.USER32 ref: 005633B5
                                                  • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,C0000000,00000000,00000000,00000002,00000080,00000000,0059D490,00000000,-000000F6,00000000), ref: 0056340A
                                                  • WriteFile.KERNEL32(00000000,0059B110,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,C0000000,00000000,00000000,00000002,00000080), ref: 0056341F
                                                  • CloseHandle.KERNEL32(00000000,00000000,0059B110,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,C0000000,00000000,00000000,00000002), ref: 00563425
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Write$CloseCreateHandleLocalTimewsprintf
                                                  • String ID:
                                                  • API String ID: 893966949-0
                                                  • Opcode ID: 6801949894958ee7e536c336b4d24299321911bb97a9fc9db6ec1e937ac9ab1f
                                                  • Instruction ID: cd7b298dfc52495c7f5c391c16989206a8525b212d70ea84e6cca4cfee9b8245
                                                  • Opcode Fuzzy Hash: 6801949894958ee7e536c336b4d24299321911bb97a9fc9db6ec1e937ac9ab1f
                                                  • Instruction Fuzzy Hash: 99F0307664030979F620A6A5DC8BFEF6B9CEBC2B61F504116B604AF0C2DDB4AD0083B4
                                                  APIs
                                                  • PurgeComm.KERNEL32(EC75FF18,00000008), ref: 00479D4F
                                                  • WaitForSingleObject.KERNEL32(0575C085,00000000,EC75FF18,00000008), ref: 00479D66
                                                  • ReleaseMutex.KERNEL32(0575C085,0575C085,00000000,EC75FF18,00000008), ref: 00479D87
                                                  • Sleep.KERNEL32(00000005,0575C085,00000000,EC75FF18,00000008), ref: 00479D90
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommMutexObjectPurgeReleaseSingleSleepWait
                                                  • String ID:
                                                  • API String ID: 1985745619-0
                                                  • Opcode ID: 79a69317882b310c17a051922e84c14e2218afbe66d03e0c4411e04e2849ce5c
                                                  • Instruction ID: a7778b1c3f02d21074a40c99afb8d49f489195731e087d2a8a2e329ea54812bc
                                                  • Opcode Fuzzy Hash: 79a69317882b310c17a051922e84c14e2218afbe66d03e0c4411e04e2849ce5c
                                                  • Instruction Fuzzy Hash: 2411A130D04149EFCB25DB94C906BDEBBB2FF40304F1081EAE4196B2A2CB794E41DB45
                                                  APIs
                                                  • PurgeComm.KERNEL32(?,00000004), ref: 00479DDB
                                                  • WaitForSingleObject.KERNEL32(?,00000000,?,00000004), ref: 00479DF2
                                                  • ReleaseMutex.KERNEL32(?,?,00000000,?,00000004), ref: 00479E13
                                                  • Sleep.KERNEL32(00000005,?,00000000,?,00000004), ref: 00479E1C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommMutexObjectPurgeReleaseSingleSleepWait
                                                  • String ID:
                                                  • API String ID: 1985745619-0
                                                  • Opcode ID: 633fb91e3e4b4e1f4303f2fbffb908d571f4e1c307d9d9e15f7dea95ea119afd
                                                  • Instruction ID: 12c3921eb63bffe7035219a5758e718ce274ce006a08b14765918ee2615d0531
                                                  • Opcode Fuzzy Hash: 633fb91e3e4b4e1f4303f2fbffb908d571f4e1c307d9d9e15f7dea95ea119afd
                                                  • Instruction Fuzzy Hash: 77118B30C04149EFCF15DB94C906BEEBBB2FF00304F1081AAE5196B2A2DB754E42EB45
                                                  APIs
                                                  • FindNextFileA.KERNEL32(?,?), ref: 004D0B48
                                                  • GetLastError.KERNEL32(?,?), ref: 004D0B51
                                                  • FileTimeToLocalFileTime.KERNEL32(?), ref: 004D0B65
                                                  • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 004D0B74
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileTime$DateErrorFindLastLocalNext
                                                  • String ID:
                                                  • API String ID: 2103556486-0
                                                  • Opcode ID: 70a68a76d8633bbb03718614686ea239fd8d12b82f0ac77e60ccc1aa24eb4bca
                                                  • Instruction ID: 5009ba00b6e9a76dc3110824b3581c4279176bb7841bec3705955eba3eba1123
                                                  • Opcode Fuzzy Hash: 70a68a76d8633bbb03718614686ea239fd8d12b82f0ac77e60ccc1aa24eb4bca
                                                  • Instruction Fuzzy Hash: 9EF03CB21042059FCF44EFA4C8CAD9777ECEB89324B1449A3AD05CF24AE634E954CBA5
                                                  APIs
                                                  • GetCurrentThreadId.KERNEL32 ref: 0051C220
                                                  • SetWindowsHookExA.USER32(00000003,0051C1C4,00000000,00000000), ref: 0051C230
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,0051EB91,?,?,023C2008,?,?,0051E54C,?), ref: 0051C24B
                                                  • CreateThread.KERNEL32(00000000,000003E8,0051C168,00000000,00000000), ref: 0051C26F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateThread$CurrentEventHookWindows
                                                  • String ID:
                                                  • API String ID: 1195359707-0
                                                  • Opcode ID: 01ebd38dab7c2cf233b4730a8816a2993d5e80bc01ad67496828fd7700bf0a46
                                                  • Instruction ID: c9b18a4d05630413c825f91ecbf46739156fa21318577b4f03c2a201c46bc5dc
                                                  • Opcode Fuzzy Hash: 01ebd38dab7c2cf233b4730a8816a2993d5e80bc01ad67496828fd7700bf0a46
                                                  • Instruction Fuzzy Hash: 87F030746C07C0BFF724AB649C8AF653E98B3A6B15F100026F1C26E1D1C3B114C49E59
                                                  APIs
                                                  • GetLastActivePopup.USER32(?), ref: 0051D474
                                                  • IsWindowVisible.USER32(?), ref: 0051D485
                                                  • IsWindowEnabled.USER32(?), ref: 0051D48F
                                                  • SetForegroundWindow.USER32(?), ref: 0051D499
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                  • String ID:
                                                  • API String ID: 2280970139-0
                                                  • Opcode ID: 164f103c9b32ad699d1e49241377763154bdf02c281de1b0a1fdd9c66967d568
                                                  • Instruction ID: 51c7977548c29913faaac560d1e6de5edc348b681d9c44fe0cccee958d95cde0
                                                  • Opcode Fuzzy Hash: 164f103c9b32ad699d1e49241377763154bdf02c281de1b0a1fdd9c66967d568
                                                  • Instruction Fuzzy Hash: 36E0121160372637AE7676768A899DF2AAD7D8A3907045071BC04F7502DBF5ECC086F2
                                                  APIs
                                                  • GetWindowLongA.USER32(00000000,000000F0), ref: 00457B74
                                                  • SetWindowLongA.USER32(00000000,000000F0,00000000), ref: 00457B87
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LongWindow
                                                  • String ID: t
                                                  • API String ID: 1378638983-2238339752
                                                  • Opcode ID: e2f64d73435eafd9f741ca494c42e5e5013c3caf97f5b04df83c37473c5f634a
                                                  • Instruction ID: ad738b6df2bb1c3550a092c8756e34cff0d317a37b9f9c949bb09105753da67f
                                                  • Opcode Fuzzy Hash: e2f64d73435eafd9f741ca494c42e5e5013c3caf97f5b04df83c37473c5f634a
                                                  • Instruction Fuzzy Hash: DD02933090420ACFDB10EFA4D099BEDBBB5FF84304F208566D8155B26ADB74A94ECB45
                                                  APIs
                                                  • @TcmSocket@ParseHostAddr$qqrpxcpit2o.Z39UARTASSIST(?), ref: 004829DB
                                                  • @TcmSocket@ip_aton$qqrpxcp6IPDATAo.Z39UARTASSIST ref: 00482A2B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Addr$qqrpxcpit2oHostParseSocket@Socket@ip_aton$qqrpxcp6
                                                  • String ID: D
                                                  • API String ID: 824452390-2746444292
                                                  • Opcode ID: bcafc4ec95b53f561bc7be1bb829820b0f42af64f8cc9124b41fd8c6014c7ffb
                                                  • Instruction ID: 8be1d9788de7c39009e4db8efeea20721d2b536cc4fa4464a942174d434ff13c
                                                  • Opcode Fuzzy Hash: bcafc4ec95b53f561bc7be1bb829820b0f42af64f8cc9124b41fd8c6014c7ffb
                                                  • Instruction Fuzzy Hash: 14A18F30A0015ACBCF15EFA4C9887EEBBB1FF44300F144666D805AB396DB785E4ADB65
                                                  APIs
                                                  • PostMessageA.USER32(00000000,0000040F,00000000,?), ref: 00443B94
                                                    • Part of subcall function 0043BFC4: SetEvent.KERNEL32(00000470), ref: 0043C00E
                                                    • Part of subcall function 0043BFC4: @cmSerialCommDriver32@TcmUart@Close$qqrv.Z39UARTASSIST ref: 0043C034
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Close$qqrvCommDriver32@EventMessagePostSerialUart@
                                                  • String ID: ,$4K
                                                  • API String ID: 403512938-2912318814
                                                  • Opcode ID: c7ebb8a10bd63baa0e07871acae4beeafc4fb0d0de4b01be78b90ef163604cf4
                                                  • Instruction ID: d81e5ab1fb3647ef2e7ec9d87d4f22a622070c10e00647001cdd89a956d687cb
                                                  • Opcode Fuzzy Hash: c7ebb8a10bd63baa0e07871acae4beeafc4fb0d0de4b01be78b90ef163604cf4
                                                  • Instruction Fuzzy Hash: B9912A70A005469FEB04DF64C8C5BEEBBB5FF45705F08416AE844AB392DB396E4ACB44
                                                  APIs
                                                  • ShellExecuteA.SHELL32(?,00000000,?,00000000,00000000,00000001), ref: 00416C40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID: 8$Opening browser...
                                                  • API String ID: 587946157-3155203500
                                                  • Opcode ID: fd8d63af695fda736fe326e536658ea4f4c7e630b226818070190776b4e086a6
                                                  • Instruction ID: 7b2170aaa06717d07ebd0accd9494ed7a9d3e2212c99d6be146db9612e3022c2
                                                  • Opcode Fuzzy Hash: fd8d63af695fda736fe326e536658ea4f4c7e630b226818070190776b4e086a6
                                                  • Instruction Fuzzy Hash: F3519030A00219CBCB00EF94D8857EEBBB5FF85344F10416AE801AB366DB359D46CBD9
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: htons
                                                  • String ID:
                                                  • API String ID: 4207154920-3916222277
                                                  • Opcode ID: 33cc579ea3f6c7ca3f4e7a3f9cb72cad32692afacc0fd1dc6e8cbcfca9c0eeec
                                                  • Instruction ID: 270345c3bba0791dd42a89c6666dfdf08d932866442e7a8d3785b381b671d604
                                                  • Opcode Fuzzy Hash: 33cc579ea3f6c7ca3f4e7a3f9cb72cad32692afacc0fd1dc6e8cbcfca9c0eeec
                                                  • Instruction Fuzzy Hash: B351A3B1D00208EBDF10EB94DC86BEEBBB8EF49304F158166F90167292E7745E05C7A6
                                                  APIs
                                                  • UnregisterHotKey.USER32(00000000,?,00000008,?,00000000), ref: 0049A45D
                                                  • RegisterHotKey.USER32(00000000,?,00000001,?,00000008,?,00000000), ref: 0049A4A2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: RegisterUnregister
                                                  • String ID:
                                                  • API String ID: 2330324139-3916222277
                                                  • Opcode ID: 225ee7f65a81ef6517f433a73b9efca0fbbee92969b2762fe12b0c50b27a1e10
                                                  • Instruction ID: 0c99e1a2c99ddc9b3312aa1b039ce34167ce73d180d43d1436db245e1ef52f58
                                                  • Opcode Fuzzy Hash: 225ee7f65a81ef6517f433a73b9efca0fbbee92969b2762fe12b0c50b27a1e10
                                                  • Instruction Fuzzy Hash: D8519130A0024A9BCF10DBA4C4597EEBFB5FF85310F18816AD85567392EB399D06CB96
                                                  APIs
                                                  • @Cdiroutl@TCDirectoryOutline@ForceCase$qqrrx17System@AnsiString.Z39UARTASSIST ref: 004B5530
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AnsiCase$qqrrx17Cdiroutl@DirectoryForceOutline@StringSystem@
                                                  • String ID: *.*$D
                                                  • API String ID: 2852121963-3091054508
                                                  • Opcode ID: cd7148e8489ac7d2ba3514313b4967ee4ee6d040a559a7006e9742bed0901bf9
                                                  • Instruction ID: c317a02379ecee12c49836d95d4ec88f6db09df1777421e472802da92b4cb7f4
                                                  • Opcode Fuzzy Hash: cd7148e8489ac7d2ba3514313b4967ee4ee6d040a559a7006e9742bed0901bf9
                                                  • Instruction Fuzzy Hash: BE711870A1122C8BCB60EB20CD55BEEB3B5BF46304F5482EAD44C67252DB359F8A8F55
                                                  APIs
                                                  • @cmSerialCommDriver32@TcmUart@SendData$qqrpvi.Z39UARTASSIST ref: 00443C2B
                                                    • Part of subcall function 0047986C: WaitForSingleObject.KERNEL32(?,000000FF), ref: 0047989B
                                                    • Part of subcall function 0047986C: ReleaseMutex.KERNEL32(?,?,?,000000FF), ref: 004798C7
                                                    • Part of subcall function 0047986C: SetEvent.KERNEL32(?,?,?,?,000000FF), ref: 004798DB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommData$qqrpviDriver32@EventMutexObjectReleaseSendSerialSingleUart@Wait
                                                  • String ID: COM%d$TX:
                                                  • API String ID: 1855903974-523180663
                                                  • Opcode ID: bf66a2d4b3346b2a39e80a558f3a5477fd4c7afb7bc707a8d52e3466352a0342
                                                  • Instruction ID: ec4832a753a3da83cc4d31f4991291eff63c17719e980bb9bfa5ea771a8202ef
                                                  • Opcode Fuzzy Hash: bf66a2d4b3346b2a39e80a558f3a5477fd4c7afb7bc707a8d52e3466352a0342
                                                  • Instruction Fuzzy Hash: 7451177460050B9BD704EF64D8966BEBBF9FF99304F108226D80483752EB34AA4BDB95
                                                  APIs
                                                  • @TCGauge@PaintBackground$qqrp16Graphics@TBitmap.Z39UARTASSIST ref: 004B7879
                                                  • @TCGauge@GetPercentDone$qqrv.Z39UARTASSIST ref: 004B7887
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Gauge@$Background$qqrp16BitmapDone$qqrvGraphics@PaintPercent
                                                  • String ID: 8
                                                  • API String ID: 2924455710-4194326291
                                                  • Opcode ID: df99c1901a1b3f980051179e6ea65805b4fdb42a20365212ac2756a89eb76191
                                                  • Instruction ID: 621c35e77a1b9a1dd2909a751a7c0b0a70f037d55ce2bf99fee571b93fdcc976
                                                  • Opcode Fuzzy Hash: df99c1901a1b3f980051179e6ea65805b4fdb42a20365212ac2756a89eb76191
                                                  • Instruction Fuzzy Hash: A3516331D0020DABCB04EBE4D8469DEBBB5FF95314F20456AE50067292DB359E4ACB68
                                                  APIs
                                                    • Part of subcall function 00508D90: RtlEnterCriticalSection.NTDLL(?), ref: 00508D94
                                                  • CreateFontIndirectA.GDI32(?), ref: 00509BD2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateCriticalEnterFontIndirectSection
                                                  • String ID: MS Sans Serif$Default
                                                  • API String ID: 2931345757-2137701257
                                                  • Opcode ID: 517e29099343e42f8cac4eeeac28c76b9e4842c7879d10031bd7b7533dad744f
                                                  • Instruction ID: c9b071e0c4435beb008f8b03085348473bab751bc99179df4f9dbf192692db7a
                                                  • Opcode Fuzzy Hash: 517e29099343e42f8cac4eeeac28c76b9e4842c7879d10031bd7b7533dad744f
                                                  • Instruction Fuzzy Hash: 3B515730A08248DFDB11CFA8D581B8DBFF6BF48314F6580AAE840A7296D2749E05CB65
                                                  APIs
                                                  • @TcmSocket@ParseHostAddr$qqrpxcpit2o.Z39UARTASSIST(?), ref: 00483612
                                                  • @TcmSocket@ParseHostPort$qqrpxc.Z39UARTASSIST ref: 0048369D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: HostParseSocket@$Addr$qqrpxcpit2oPort$qqrpxc
                                                  • String ID: 8
                                                  • API String ID: 948049566-4194326291
                                                  • Opcode ID: 73cf74fbd9c5c06d4df573db90d6ec238ca668fbd6cee31140d38900d13afa31
                                                  • Instruction ID: 083fb450995cb213f94351d5e1ab90964b2ffe8d4ab16171a742a5d67d0b079f
                                                  • Opcode Fuzzy Hash: 73cf74fbd9c5c06d4df573db90d6ec238ca668fbd6cee31140d38900d13afa31
                                                  • Instruction Fuzzy Hash: 79411970D0010A9BCF10EF94C4896EEBBB5FF44304F24856AD815B7392EB749E49DB65
                                                  APIs
                                                  • @TcmSocket@MapErrorCode$qqri.Z39UARTASSIST(?,socket() failed,00000000), ref: 00480D26
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Code$qqriErrorSocket@
                                                  • String ID: : $socket() failed
                                                  • API String ID: 921977879-3054834518
                                                  • Opcode ID: 945136e9ea59e301763f6c0092ec21da4b3331998b56f1fd0c874305ee2a3345
                                                  • Instruction ID: 984dc5065e481fc569b82914aedc19760eba03be7766fbe7e0b0c2f3ccc8e480
                                                  • Opcode Fuzzy Hash: 945136e9ea59e301763f6c0092ec21da4b3331998b56f1fd0c874305ee2a3345
                                                  • Instruction Fuzzy Hash: F5311C70E1010E9BCF40EB94C4856FEF7B9FF88304F148566D814A7256EB749A0ADB65
                                                  APIs
                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 0047B71F
                                                    • Part of subcall function 0050A964: Ellipse.GDI32(?,?,?,?,?), ref: 0050A992
                                                  • InflateRect.USER32(?,00000001,00000001), ref: 0047B73D
                                                    • Part of subcall function 0050A4E4: Arc.GDI32(?,?,?,?,00808080,?,L~G,?,?), ref: 0050A522
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InflateRect$Ellipse
                                                  • String ID: L~G
                                                  • API String ID: 3816802421-3754241533
                                                  • Opcode ID: 66e3732167b4ef40a3ea83d7efe376e7e79533a69b9938c39cadc66b7d55db7b
                                                  • Instruction ID: deaab114913d0e6bc3f96b59f904390759cde6ae98ae923a2fcd6bd0d3d15a22
                                                  • Opcode Fuzzy Hash: 66e3732167b4ef40a3ea83d7efe376e7e79533a69b9938c39cadc66b7d55db7b
                                                  • Instruction Fuzzy Hash: 3D310975304601ABCB14EF59C8C6D4AB7EABFC9710B148658B5498F3AACA31EC05CB61
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Invalid digital input$Prompt
                                                  • API String ID: 0-2664087997
                                                  • Opcode ID: b72d13f7b7bc8357dc3d8943cf05f3279714f9d9b8be84da41cd0fb1710e3548
                                                  • Instruction ID: ea918334435cc59351f968218afe9b7a0c4238df95b7114467cf263137c199a9
                                                  • Opcode Fuzzy Hash: b72d13f7b7bc8357dc3d8943cf05f3279714f9d9b8be84da41cd0fb1710e3548
                                                  • Instruction Fuzzy Hash: 7021D771A1054496DB25AB14888136E7FA9AB42706F2481BBE501EB3D2DB3CCE4687CE
                                                  APIs
                                                  • @TcmSocket@inet_aton$qqrpxcp6IPDATAi.Z39UARTASSIST ref: 0047EF06
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Socket@inet_aton$qqrpxcp6
                                                  • String ID: $0.0.0.0
                                                  • API String ID: 2966448890-1685620526
                                                  • Opcode ID: 30aed029a82861c2bd81fda916b8335eec46675413fb3b947a32292793fea214
                                                  • Instruction ID: 524d1ce086c73355e5798e2e2fa1afc4bbc144a2f8ed878b78a853ba77133de0
                                                  • Opcode Fuzzy Hash: 30aed029a82861c2bd81fda916b8335eec46675413fb3b947a32292793fea214
                                                  • Instruction Fuzzy Hash: 69317E3090024EDADF00EBA0C5857EDB7B5FF44304F2486B6D80D6B296EB749A09DB66
                                                  APIs
                                                  • ShellExecuteA.SHELL32(00000000,00000000,00577E3B,00000000,00000000,00000001), ref: 0044C889
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID: ,$autoreply/
                                                  • API String ID: 587946157-3921207096
                                                  • Opcode ID: 57c9537efbfb2cf4c2f24004a1cf7b441958aa5df330fe33e40efaa8f1e4ee50
                                                  • Instruction ID: d468ab2ee24fa56f8c99dd1e3e7458228084e4f96af298dd5801eca2273ceb50
                                                  • Opcode Fuzzy Hash: 57c9537efbfb2cf4c2f24004a1cf7b441958aa5df330fe33e40efaa8f1e4ee50
                                                  • Instruction Fuzzy Hash: D731217091110EDBDF00EBA0D98ABEEB7B9FF44304F2442A6E40567251EB746F05DB65
                                                  APIs
                                                  • ShellExecuteA.SHELL32(00000000,00000000,00571DB8,00000000,00000000,00000001), ref: 004430D5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID: ,$assistscript/
                                                  • API String ID: 587946157-3342015788
                                                  • Opcode ID: ec68da63c559110554559c51ac621a009ca5d08a15ee912efaa8290e6e78f1d8
                                                  • Instruction ID: 10db5d02a87ec4e67c714e8489b1167452b99405c0c81fe1c1842467931be103
                                                  • Opcode Fuzzy Hash: ec68da63c559110554559c51ac621a009ca5d08a15ee912efaa8290e6e78f1d8
                                                  • Instruction Fuzzy Hash: 84314C30A0010EDBDF10EBA0D986AEEB7B9FF44304F2042A6E40467296EB756F05DB55
                                                  APIs
                                                  • GetObjectA.GDI32(?,00000054), ref: 0050C0AC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Object
                                                  • String ID: ($jQ
                                                  • API String ID: 2936123098-597219741
                                                  • Opcode ID: 4a07a2922f07a6669af6ffe9c7ab9633b6b68b808dd474c7e18a5ee70a284c0a
                                                  • Instruction ID: de0c72b97e8f28825995aa46c0816c270f1ea71cb35c31f1ece7e0f9f87606bb
                                                  • Opcode Fuzzy Hash: 4a07a2922f07a6669af6ffe9c7ab9633b6b68b808dd474c7e18a5ee70a284c0a
                                                  • Instruction Fuzzy Hash: 4F217FB4614211CBDB18DF28C9D925EBEE1BF8A304F14866AE849CF29BD734C944C766
                                                  APIs
                                                  • GetCurrentDirectoryA.KERNEL32(00000100,00000000), ref: 004B60AD
                                                  • GetCurrentDirectoryA.KERNEL32(00000100,00000000), ref: 004B60E1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CurrentDirectory
                                                  • String ID:
                                                  • API String ID: 1611563598-3916222277
                                                  • Opcode ID: a3dbad2fa1df42465ebe98b3e43ad3efd8530a6974e992a54611978620bfc5ea
                                                  • Instruction ID: 844e0623ad13c8f960eeceaf8f95a1562d1f8d75e1c6b4a41db264ebe7771926
                                                  • Opcode Fuzzy Hash: a3dbad2fa1df42465ebe98b3e43ad3efd8530a6974e992a54611978620bfc5ea
                                                  • Instruction Fuzzy Hash: B1313C30C1121DEBCF01EF94E989AEEBFB5FF44315F20412AF50066261D7794A84DB95
                                                  Strings
                                                  • Prompt, xrefs: 0045836B
                                                  • Only hexadecimal characters can be entered in hexadecimal input mode., xrefs: 00458349
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: Only hexadecimal characters can be entered in hexadecimal input mode.$Prompt
                                                  • API String ID: 3850602802-1347421534
                                                  • Opcode ID: f9b533cd0b9973ffb2eeb3937d8ead8ac7daadb3f81878bdbf1742db6eaf46b1
                                                  • Instruction ID: cb4a9056c23d6f2b2cec3676669bbd9f560c9937ce3ae36c7b2866d6e8113637
                                                  • Opcode Fuzzy Hash: f9b533cd0b9973ffb2eeb3937d8ead8ac7daadb3f81878bdbf1742db6eaf46b1
                                                  • Instruction Fuzzy Hash: 782138302042449ADB219754D88276E7FE5AB43701F1441AFED45BB3A3CE799C0AD78A
                                                  APIs
                                                  • MessageBeep.USER32(00000010), ref: 0044D6BD
                                                    • Part of subcall function 004EFF34: SendMessageA.USER32(00000000,000000B1,00000000,000000FF), ref: 004EFF48
                                                  Strings
                                                  • Prompt, xrefs: 0044D705
                                                  • Only hexadecimal characters can be entered in hexadecimal input mode., xrefs: 0044D6E3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$BeepSend
                                                  • String ID: Only hexadecimal characters can be entered in hexadecimal input mode.$Prompt
                                                  • API String ID: 1008054038-1347421534
                                                  • Opcode ID: 333078a7b6482a8b938752047b5d3c8ec60e4a5c86b6e22f84918ee9e883a932
                                                  • Instruction ID: ae64fa1a00b0046014828c7f73e53ddd44b8d6846d8af6bb4b95c924701c1e07
                                                  • Opcode Fuzzy Hash: 333078a7b6482a8b938752047b5d3c8ec60e4a5c86b6e22f84918ee9e883a932
                                                  • Instruction Fuzzy Hash: A9213530B042405BEB119F54C8557BEBBE5FB81344F2481BBE8485F382CA785D06D799
                                                  APIs
                                                  • MessageBeep.USER32(00000010), ref: 0048E902
                                                    • Part of subcall function 004EFF34: SendMessageA.USER32(00000000,000000B1,00000000,000000FF), ref: 004EFF48
                                                  Strings
                                                  • Prompt, xrefs: 0048E94A
                                                  • Only hexadecimal characters can be entered in hexadecimal input mode., xrefs: 0048E928
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$BeepSend
                                                  • String ID: Only hexadecimal characters can be entered in hexadecimal input mode.$Prompt
                                                  • API String ID: 1008054038-1347421534
                                                  • Opcode ID: 359687d460dc996c6e633bcdada9c992d2a172d75a4a708964bdae1c283b31a6
                                                  • Instruction ID: 46eb5081f2de57a1c7b9a9cc1185ad0e9672d2da30238b5e898c693feb9997c2
                                                  • Opcode Fuzzy Hash: 359687d460dc996c6e633bcdada9c992d2a172d75a4a708964bdae1c283b31a6
                                                  • Instruction Fuzzy Hash: 9E216A70604204DBEB61B715C8957AF7BA5EB82310F1445A7E588AB392CBF89C06C35A
                                                  APIs
                                                  • LoadBitmapA.USER32(?,ICON_MESSAGE_GRAY), ref: 004A0143
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BitmapLoad
                                                  • String ID: ICON_MESSAGE$ICON_MESSAGE_GRAY
                                                  • API String ID: 3581186644-596663843
                                                  • Opcode ID: 24597471d8fce91286fee33c0be06ca69a5a0a53d21272aeee1605b06a9ab11a
                                                  • Instruction ID: ae6856cd078475d42e409db92e13b71554fb22a2ed78daf4fce9dd43130b7baa
                                                  • Opcode Fuzzy Hash: 24597471d8fce91286fee33c0be06ca69a5a0a53d21272aeee1605b06a9ab11a
                                                  • Instruction Fuzzy Hash: 1C2105307016129FC720DBB8E889BCEBBE5FF6A310F44452AE44A9B361D739AC04CB55
                                                  APIs
                                                  • MessageBeep.USER32(00000010), ref: 00462195
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BeepMessage
                                                  • String ID: Only the digital 0 or 1 can be entered$Prompt
                                                  • API String ID: 2359647504-327199117
                                                  • Opcode ID: 4a03f9a12548120cdd8a707f1c9e799698d376ce943d108cedbf987258f366e9
                                                  • Instruction ID: 3e1588a6c1df15e956f9eaeab278e10f4b506fa773c0da958a655f54a30cd37c
                                                  • Opcode Fuzzy Hash: 4a03f9a12548120cdd8a707f1c9e799698d376ce943d108cedbf987258f366e9
                                                  • Instruction Fuzzy Hash: B8112430A04619ABD7109754CC553FEBBB5FF82300F204063E6006B391EBB88D06979A
                                                  APIs
                                                    • Part of subcall function 00531300: GetClassInfoA.USER32(?,?,?), ref: 005313C4
                                                    • Part of subcall function 00531300: UnregisterClassA.USER32(?,?), ref: 005313EC
                                                    • Part of subcall function 00531300: RegisterClassA.USER32(?), ref: 00531402
                                                  • @Cdiroutl@TCDirectoryOutline@CurDir$qv.Z39UARTASSIST(00000000,00000000), ref: 004B5AAC
                                                    • Part of subcall function 004B6074: GetCurrentDirectoryA.KERNEL32(00000100,00000000), ref: 004B60AD
                                                    • Part of subcall function 004B6074: GetCurrentDirectoryA.KERNEL32(00000100,00000000), ref: 004B60E1
                                                  • @Cdiroutl@TCDirectoryOutline@ForceCase$qqrrx17System@AnsiString.Z39UARTASSIST ref: 004B5AB9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Directory$Class$Cdiroutl@CurrentOutline@$AnsiCase$qqrrx17Dir$qvForceInfoRegisterStringSystem@Unregister
                                                  • String ID:
                                                  • API String ID: 3712666593-3916222277
                                                  • Opcode ID: f6ff92214c847b0a858a868b4edab626387151f8872268a17b567301345fdf29
                                                  • Instruction ID: b8ce32d68eec2eccb3fdfebef0b2c4d62a637a9fefbabd1fa7c1af80944e621d
                                                  • Opcode Fuzzy Hash: f6ff92214c847b0a858a868b4edab626387151f8872268a17b567301345fdf29
                                                  • Instruction Fuzzy Hash: E3210E3491114E9BCF00EBA0D5456EEF7B9FF44305F1442AAE40477252EB789F0587AA
                                                  APIs
                                                  • MessageBeep.USER32(00000010), ref: 0045487D
                                                    • Part of subcall function 004EFF34: SendMessageA.USER32(00000000,000000B1,00000000,000000FF), ref: 004EFF48
                                                  Strings
                                                  • Prompt, xrefs: 004548C5
                                                  • Only hexadecimal characters can be entered in hexadecimal input mode., xrefs: 004548A3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$BeepSend
                                                  • String ID: Only hexadecimal characters can be entered in hexadecimal input mode.$Prompt
                                                  • API String ID: 1008054038-1347421534
                                                  • Opcode ID: 9f335c1724f40a1b10ca44b772b47208cd8a7ac1db8bd5c8746836e91e3b1d5e
                                                  • Instruction ID: df6b856f05d6bf8818e1893775c199eed62e39c9477d6d12f74c297900e6f3d2
                                                  • Opcode Fuzzy Hash: 9f335c1724f40a1b10ca44b772b47208cd8a7ac1db8bd5c8746836e91e3b1d5e
                                                  • Instruction Fuzzy Hash: 7A113634A042819BDB10BF44C4457AE7BA5FFC1309F1441B6E8486F383DA784D4DD75A
                                                  APIs
                                                  • LoadBitmapA.USER32(?,dlgDragHnd), ref: 00475938
                                                  • @TcmForm@update_workbitmap$qqrv.Z39UARTASSIST ref: 00475967
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BitmapForm@update_workbitmap$qqrvLoad
                                                  • String ID: dlgDragHnd
                                                  • API String ID: 2310468496-1624917145
                                                  • Opcode ID: 69e3bebc5b004b069111b80aa5f48b69a950b9aea48402af596530afe77b41c6
                                                  • Instruction ID: 07f45c6458a631cf69e9b16a68a47f8428dcf65879e334991e79f11a48f9856e
                                                  • Opcode Fuzzy Hash: 69e3bebc5b004b069111b80aa5f48b69a950b9aea48402af596530afe77b41c6
                                                  • Instruction Fuzzy Hash: 551101B0704A05CFD320EB38C845BDA7BE8BB48310F04846AE99DDB391DAB5AC05DB85
                                                  APIs
                                                  • SetScrollRange.USER32(00000000,>FP,00000000,0000007F,000000FF), ref: 00504414
                                                  • SetScrollRange.USER32(00000000,>FP,00000000,00000000,000000FF), ref: 00504431
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: RangeScroll
                                                  • String ID: >FP
                                                  • API String ID: 3104354439-486320383
                                                  • Opcode ID: 0b15bde65472c8e636cd33be9b29c5421dfed87fae47774dcd1c04839506571f
                                                  • Instruction ID: 3f2889ac84d0a29baa5062d4e030a84426feb0f077382b78d5b865b4247a32ce
                                                  • Opcode Fuzzy Hash: 0b15bde65472c8e636cd33be9b29c5421dfed87fae47774dcd1c04839506571f
                                                  • Instruction Fuzzy Hash: 2F0140B1644216AFDB10DF59EC85F5E7BE8FB55720F204611FA18DB2D1C630FC408A64
                                                  APIs
                                                  • @cmSerialCommDriver32@TcmUart@SetAutoWrap$qqro.Z39UARTASSIST ref: 00440630
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AutoCommDriver32@SerialUart@Wrap$qqro
                                                  • String ID: Data Log$Data Receive
                                                  • API String ID: 642324948-2375008308
                                                  • Opcode ID: c231eccc96cad7e2b1948cca5e8fc3f63eb361e26f11f06b0cf6c91d50065bcd
                                                  • Instruction ID: 8b5d2f013cc922d4a6515493b19fe240018adaca3bd3b27539d282932c722179
                                                  • Opcode Fuzzy Hash: c231eccc96cad7e2b1948cca5e8fc3f63eb361e26f11f06b0cf6c91d50065bcd
                                                  • Instruction Fuzzy Hash: CB117A30A046049FF720D724D4453AABBE4FB85300F1481A7D94A87751CB388D05EF8A
                                                  APIs
                                                  • MessageBeep.USER32(00000010), ref: 0048A6BC
                                                  Strings
                                                  • Only hexadecimal characters can be entered in hexadecimal input mode., xrefs: 0048A6E2
                                                  • Prompt, xrefs: 0048A704
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BeepMessage
                                                  • String ID: Only hexadecimal characters can be entered in hexadecimal input mode.$Prompt
                                                  • API String ID: 2359647504-1347421534
                                                  • Opcode ID: f45d15c715a0e4f9ae2d0bfa10e9553eadd3c5197975480c56d33db9af58bdbb
                                                  • Instruction ID: c56ffe1f5e3527b1e81873b442cdcbd874ac782a34982afda4c6bafa6e7eb075
                                                  • Opcode Fuzzy Hash: f45d15c715a0e4f9ae2d0bfa10e9553eadd3c5197975480c56d33db9af58bdbb
                                                  • Instruction Fuzzy Hash: BB1106306042449BEB10FB54D8467AD7BB5FB42304F2801A7E9847B382DBB85C05C79A
                                                  APIs
                                                  • MessageBeep.USER32(00000010), ref: 0045824E
                                                  Strings
                                                  • Only hexadecimal characters can be entered in hexadecimal input mode., xrefs: 00458274
                                                  • Prompt, xrefs: 00458296
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BeepMessage
                                                  • String ID: Only hexadecimal characters can be entered in hexadecimal input mode.$Prompt
                                                  • API String ID: 2359647504-1347421534
                                                  • Opcode ID: 5fb274821e4872ba42a05b225f8b610b1b3f6051965acd99110a16273a6f3d2a
                                                  • Instruction ID: 6cdd3670782f7d8f54bd18de56ee49d79964ba512148f36dcc5712a5d787ec6c
                                                  • Opcode Fuzzy Hash: 5fb274821e4872ba42a05b225f8b610b1b3f6051965acd99110a16273a6f3d2a
                                                  • Instruction Fuzzy Hash: 9E014530604644A7EB119798E8527AE7FA5FB41301F1041EEF948BB3D2CFB81E49D39A
                                                  APIs
                                                  • @TCCalendar@GetCellText$qqrii.Z39UARTASSIST(00000000), ref: 004B3E45
                                                  • @TCCalendar@SetDateElement$qqrii.Z39UARTASSIST(00000000), ref: 004B3E83
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Calendar@$CellDateElement$qqriiText$qqrii
                                                  • String ID:
                                                  • API String ID: 3454364302-3916222277
                                                  • Opcode ID: 3eca272e38f0d3deef974a01385c717eae67cee64def0abe06e7072f52a6f658
                                                  • Instruction ID: 785efef2eb4016ab602dade9614efe7ab7bf4ec6f4ba0ec34f0871e259e0e811
                                                  • Opcode Fuzzy Hash: 3eca272e38f0d3deef974a01385c717eae67cee64def0abe06e7072f52a6f658
                                                  • Instruction Fuzzy Hash: 2211CB3491011DEBCF00EB95D846AEEB7B9FF44305F104166E814A3352EB349A059B95
                                                  APIs
                                                  • WSAGetLastError.WS2_32(00000011,?,00000000,?,0047EA87,00000002), ref: 00480C57
                                                  • @TcmSocket@ShowError$qqrpci.Z39UARTASSIST(00000011,?,00000000,?,0047EA87,00000002), ref: 00480C93
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorError$qqrpciLastShowSocket@
                                                  • String ID: 3'
                                                  • API String ID: 3372320692-280543908
                                                  • Opcode ID: d5c03d546197111c017385ff0997047134ba75a9d179c77e8a66991fddbbf5e2
                                                  • Instruction ID: 32213d2778e8d0f40046f1d51f3ab1d4277c3dea3b56b050f84072087f3f1871
                                                  • Opcode Fuzzy Hash: d5c03d546197111c017385ff0997047134ba75a9d179c77e8a66991fddbbf5e2
                                                  • Instruction Fuzzy Hash: ECF082217002504BDB78BD7D4CC865A7A88ABC5331F180B7AED258B3D6EB788C4D9358
                                                  APIs
                                                  • LoadBitmapA.USER32(?,ICON_DIAMOND_GRAY), ref: 004A00CB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BitmapLoad
                                                  • String ID: ICON_DIAMOND$ICON_DIAMOND_GRAY
                                                  • API String ID: 3581186644-4170127655
                                                  • Opcode ID: 95b31525b47da9cd90d86f7c0555738dcc52312ee41f7fdbd37ecf76a4a7baf5
                                                  • Instruction ID: bdca4726231ae017d7e7951fd55aa78a35a97d23a80ed78be877e0d2a7497875
                                                  • Opcode Fuzzy Hash: 95b31525b47da9cd90d86f7c0555738dcc52312ee41f7fdbd37ecf76a4a7baf5
                                                  • Instruction Fuzzy Hash: 74F02720345240AFC620D334B4917A72BE8BBB7350F18042BE4C4CB312C2265C4CD359
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?,00000000,-000000F6,00000000,?,005635BA,00000000,00000000,00000000,-000000F6,?,00563682,Abnormal program termination,00564323,?,?), ref: 0056337C
                                                  • wsprintfA.USER32 ref: 005633B5
                                                  Strings
                                                  • %02d/%02d/%04d %02d:%02d:%02d.%03d , xrefs: 005633AB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2976743314.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2976727559.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.00000000005F5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000609000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2976743314.0000000000634000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2977124136.000000000063F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_z39UartAssist.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTimewsprintf
                                                  • String ID: %02d/%02d/%04d %02d:%02d:%02d.%03d
                                                  • API String ID: 1577811021-3388318165
                                                  • Opcode ID: eb3957204e758c7a8375dcf873a999eebb8db6e6f64385e3f3ef39027146551c
                                                  • Instruction ID: 019273b13007477afafbb448bc011b99e4a78b1975df8467d3b36c66a0161fe0
                                                  • Opcode Fuzzy Hash: eb3957204e758c7a8375dcf873a999eebb8db6e6f64385e3f3ef39027146551c
                                                  • Instruction Fuzzy Hash: ACE012A644C662658254DF4B5C0183FB5ECBACCF11F44490DB9D4812C1F27CC484E377