Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Setup.exe

Overview

General Information

Sample name:Setup.exe
Analysis ID:1416903
MD5:67890fcc5a391a8914e9ffaf209abecd
SHA1:d7f8448dee9b8f76a4b007bfe0da83f52eac674e
SHA256:27be6ed296617b8b4fe5cf1e9a4c0e4547c81d3cbf4bce524792d8e971fb290f
Tags:exeFAKEOFFICETROJANSCRIPTAGENT
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to detect sleep reduction / modifications
Sample or dropped binary is a compiled AutoHotkey binary
Uses Windows timers to delay execution
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May check if the current machine is a sandbox (GetTickCount - Sleep)
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • Setup.exe (PID: 4852 cmdline: "C:\Users\user\Desktop\Setup.exe" MD5: 67890FCC5A391A8914E9FFAF209ABECD)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Setup.exeVirustotal: Detection: 6%Perma Link
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400AD4A0 FindFirstFileW,FindClose,FindFirstFileW,FindClose,0_2_00000001400AD4A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014003C6B0 FindFirstFileW,FindNextFileW,FindClose,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,0_2_000000014003C6B0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140066C80 FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,_swprintf,FindNextFileW,FindClose,0_2_0000000140066C80
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140066FC0 FindFirstFileW,GetLastError,FindClose,FileTimeToLocalFileTime,FileTimeToSystemTime,_swprintf,malloc,0_2_0000000140066FC0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140081230 GetFullPathNameW,GetFullPathNameW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,GetLastError,wcsncpy,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,MoveFileW,DeleteFileW,MoveFileW,GetLastError,CopyFileW,GetLastError,0_2_0000000140081230
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400AD3A0 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00000001400AD3A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140067610 CreateFileW,GetFileSizeEx,CloseHandle,FindFirstFileW,GetLastError,FindClose,0_2_0000000140067610
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140081820 GetFileAttributesW,FindFirstFileW,FindClose,0_2_0000000140081820
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014007E060 _wcstoi64,InternetOpenW,InternetOpenUrlW,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetReadFile,GetTickCount,PeekMessageW,GetTickCount,InternetReadFile,InternetReadFileExA,GetTickCount,PeekMessageW,GetTickCount,InternetReadFileExA,InternetCloseHandle,InternetCloseHandle,fclose,DeleteFileW,0_2_000000014007E060
Source: Setup.exeString found in binary or memory: https://autohotkey.com
Source: Setup.exeString found in binary or memory: https://autohotkey.comCould
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140006640 GetTickCount,OpenClipboard,GetTickCount,OpenClipboard,0_2_0000000140006640
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400062A0 EmptyClipboard,GlobalUnlock,CloseClipboard,GlobalUnlock,GlobalFree,GlobalUnlock,CloseClipboard,SetClipboardData,GlobalUnlock,CloseClipboard,GlobalUnlock,CloseClipboard,GlobalUnlock,GlobalFree,0_2_00000001400062A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400B02B0 EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalUnlock,CloseClipboard,GlobalFree,GlobalUnlock,CloseClipboard,GlobalUnlock,CloseClipboard,0_2_00000001400B02B0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140006520 GetClipboardFormatNameW,GetClipboardData,0_2_0000000140006520
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140054C20 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetSystemMetrics,GetSystemMetrics,wcsncpy,GetDC,DestroyIcon,DeleteObject,GetIconInfo,CreateCompatibleDC,DeleteObject,DeleteObject,CreateCompatibleDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,CreateCompatibleDC,malloc,ReleaseDC,DeleteObject,SelectObject,DeleteDC,DeleteObject,malloc,0_2_0000000140054C20
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140016810 GetTickCount,PeekMessageW,GetTickCount,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,0_2_0000000140016810
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140001B0C GlobalUnlock,CloseClipboard,SetTimer,GetTickCount,GetTickCount,GetMessageW,GetTickCount,GetFocus,TranslateAcceleratorW,GetKeyState,GetWindowLongW,IsWindowEnabled,GetKeyState,GetKeyState,GetKeyState,SendMessageW,SendMessageW,PostMessageW,SendMessageW,SendMessageW,IsDialogMessageW,ShowWindow,GetForegroundWindow,GetWindowThreadProcessId,GetClassNameW,IsDialogMessageW,SetCurrentDirectoryW,KillTimer,0_2_0000000140001B0C

System Summary

barindex
Source: C:\Users\user\Desktop\Setup.exeWindow found: window name: AutoHotkeyJump to behavior
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014005F340: _swprintf,CreateFileW,DeviceIoControl,CloseHandle,0_2_000000014005F340
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400818A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00000001400818A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400202530_2_0000000140020253
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014001E8500_2_000000014001E850
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014001EFC00_2_000000014001EFC0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014000D3600_2_000000014000D360
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400053800_2_0000000140005380
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014001F7A00_2_000000014001F7A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140001B0C0_2_0000000140001B0C
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014001FDB90_2_000000014001FDB9
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140055E400_2_0000000140055E40
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400940400_2_0000000140094040
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014004604B0_2_000000014004604B
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014007E0600_2_000000014007E060
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400100700_2_0000000140010070
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014004E07B0_2_000000014004E07B
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400CE0900_2_00000001400CE090
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400D20A40_2_00000001400D20A4
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400B20D00_2_00000001400B20D0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014005A1300_2_000000014005A130
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400D614C0_2_00000001400D614C
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014004A1800_2_000000014004A180
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014004C1B00_2_000000014004C1B0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014004636B0_2_000000014004636B
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400803C00_2_00000001400803C0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014009641B0_2_000000014009641B
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400964290_2_0000000140096429
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014007E4300_2_000000014007E430
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400964340_2_0000000140096434
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014000A4600_2_000000014000A460
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400964F00_2_00000001400964F0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400285000_2_0000000140028500
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400965090_2_0000000140096509
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400965110_2_0000000140096511
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400965270_2_0000000140096527
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400705400_2_0000000140070540
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014005C5500_2_000000014005C550
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014007A5900_2_000000014007A590
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400585B00_2_00000001400585B0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400506250_2_0000000140050625
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014004C6500_2_000000014004C650
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014005E6600_2_000000014005E660
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014002A6A00_2_000000014002A6A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400986C00_2_00000001400986C0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400726D00_2_00000001400726D0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014009C7100_2_000000014009C710
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400987AB0_2_00000001400987AB
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400027BB0_2_00000001400027BB
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400407C00_2_00000001400407C0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014007C7EF0_2_000000014007C7EF
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014006E8600_2_000000014006E860
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014000A8800_2_000000014000A880
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400508940_2_0000000140050894
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400528A00_2_00000001400528A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400749000_2_0000000140074900
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400769400_2_0000000140076940
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014009694C0_2_000000014009694C
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400489500_2_0000000140048950
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400609C90_2_00000001400609C9
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400809F00_2_00000001400809F0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400D89F40_2_00000001400D89F4
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140020A4B0_2_0000000140020A4B
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140058A700_2_0000000140058A70
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140046AC00_2_0000000140046AC0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140098AEC0_2_0000000140098AEC
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140008B000_2_0000000140008B00
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400A8B700_2_00000001400A8B70
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140088BA00_2_0000000140088BA0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140054C200_2_0000000140054C20
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014004AC300_2_000000014004AC30
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140044C800_2_0000000140044C80
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140050CC00_2_0000000140050CC0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014007AD200_2_000000014007AD20
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140006D200_2_0000000140006D20
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140064D600_2_0000000140064D60
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140034DB50_2_0000000140034DB5
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140074DC00_2_0000000140074DC0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014006CDD00_2_000000014006CDD0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014008EDF00_2_000000014008EDF0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140062E700_2_0000000140062E70
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400BAEBB0_2_00000001400BAEBB
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014008CF030_2_000000014008CF03
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140018F300_2_0000000140018F30
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140098F310_2_0000000140098F31
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014003EF500_2_000000014003EF50
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400DCF7C0_2_00000001400DCF7C
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014005AF800_2_000000014005AF80
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140060F900_2_0000000140060F90
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140012FA00_2_0000000140012FA0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140096FB00_2_0000000140096FB0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400BCFF00_2_00000001400BCFF0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014007EFF00_2_000000014007EFF0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001401250000_2_0000000140125000
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014007B0900_2_000000014007B090
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014005D0A00_2_000000014005D0A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400150B00_2_00000001400150B0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400BB0E00_2_00000001400BB0E0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400570F00_2_00000001400570F0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400D11300_2_00000001400D1130
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014005F1400_2_000000014005F140
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400591800_2_0000000140059180
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400391820_2_0000000140039182
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400111A00_2_00000001400111A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014004F1C00_2_000000014004F1C0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400A31D00_2_00000001400A31D0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400932000_2_0000000140093200
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400712100_2_0000000140071210
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014009923D0_2_000000014009923D
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014008F2600_2_000000014008F260
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400172A00_2_00000001400172A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400032A40_2_00000001400032A4
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014004B2B00_2_000000014004B2B0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400632E00_2_00000001400632E0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400513800_2_0000000140051380
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014005F4100_2_000000014005F410
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400854300_2_0000000140085430
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014005B4C00_2_000000014005B4C0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014003F4C00_2_000000014003F4C0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014008D4D00_2_000000014008D4D0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014009D5000_2_000000014009D500
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400255240_2_0000000140025524
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400DD5600_2_00000001400DD560
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400435600_2_0000000140043560
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400655900_2_0000000140065590
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400D55980_2_00000001400D5598
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014009F5B00_2_000000014009F5B0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400715AC0_2_00000001400715AC
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014007D5F80_2_000000014007D5F8
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400CF6200_2_00000001400CF620
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400B16500_2_00000001400B1650
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400356860_2_0000000140035686
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400536A00_2_00000001400536A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014006F6B00_2_000000014006F6B0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014004D6F00_2_000000014004D6F0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400697300_2_0000000140069730
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400197400_2_0000000140019740
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400737900_2_0000000140073790
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400AF7B00_2_00000001400AF7B0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014008F7BD0_2_000000014008F7BD
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014008F7CC0_2_000000014008F7CC
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014008F7E80_2_000000014008F7E8
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014008F80A0_2_000000014008F80A
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014008F82B0_2_000000014008F82B
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014008F8370_2_000000014008F837
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014008F85D0_2_000000014008F85D
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014003F8600_2_000000014003F860
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400398600_2_0000000140039860
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014008F89E0_2_000000014008F89E
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400878D10_2_00000001400878D1
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400998D80_2_00000001400998D8
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014007B8FE0_2_000000014007B8FE
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014001B9200_2_000000014001B920
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014005D9300_2_000000014005D930
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400919480_2_0000000140091948
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014003196C0_2_000000014003196C
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400179700_2_0000000140017970
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400419800_2_0000000140041980
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400899C00_2_00000001400899C0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400579C00_2_00000001400579C0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014004BA400_2_000000014004BA40
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140005A500_2_0000000140005A50
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400B7A600_2_00000001400B7A60
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140063B600_2_0000000140063B60
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140097B900_2_0000000140097B90
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400C7BA00_2_00000001400C7BA0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140099BB50_2_0000000140099BB5
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014003DBD00_2_000000014003DBD0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014002BBE00_2_000000014002BBE0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400ABBF00_2_00000001400ABBF0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140051BF00_2_0000000140051BF0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014004FC050_2_000000014004FC05
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014006DC100_2_000000014006DC10
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014005FC120_2_000000014005FC12
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014006BC600_2_000000014006BC60
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014004DC700_2_000000014004DC70
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140085D700_2_0000000140085D70
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400ADDA00_2_00000001400ADDA0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140049DB00_2_0000000140049DB0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140061DF00_2_0000000140061DF0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014005BDF00_2_000000014005BDF0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014004BE100_2_000000014004BE10
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140039E550_2_0000000140039E55
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014000DE600_2_000000014000DE60
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014004FEBC0_2_000000014004FEBC
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140013F100_2_0000000140013F10
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014008BF300_2_000000014008BF30
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400D5F240_2_00000001400D5F24
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014002FF500_2_000000014002FF50
Source: C:\Users\user\Desktop\Setup.exeCode function: String function: 00000001400401A0 appears 56 times
Source: C:\Users\user\Desktop\Setup.exeCode function: String function: 00000001400404F0 appears 452 times
Source: C:\Users\user\Desktop\Setup.exeCode function: String function: 00000001400C986C appears 391 times
Source: C:\Users\user\Desktop\Setup.exeCode function: String function: 00000001400C9AC4 appears 59 times
Source: Setup.exe, 00000000.00000000.1612693837.0000000140132000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs Setup.exe
Source: Setup.exeBinary or memory string: OriginalFilename vs Setup.exe
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: propsys.dllJump to behavior
Source: classification engineClassification label: mal60.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140041980 _swprintf,CreateProcessW,CloseHandle,GetLastError,SetCurrentDirectoryW,GetFileAttributesW,SetCurrentDirectoryW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,CloseHandle,GetLastError,FormatMessageW,0_2_0000000140041980
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400818A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00000001400818A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400609C9 wcsncpy,GetDiskFreeSpaceW,GetLastError,malloc,0_2_00000001400609C9
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140081B30 CreateToolhelp32Snapshot,Process32FirstW,_wcstoi64,Process32NextW,Process32NextW,CloseHandle,CloseHandle,CloseHandle,0_2_0000000140081B30
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140082030 CLSIDFromProgID,CLSIDFromString,CLSIDFromString,CoCreateInstance,CoCreateInstance,0_2_0000000140082030
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400AE5E0 LoadLibraryExW,EnumResourceNamesW,FindResourceW,LoadResource,LockResource,GetSystemMetrics,FindResourceW,LoadResource,LockResource,SizeofResource,CreateIconFromResourceEx,FreeLibrary,ExtractIconW,0_2_00000001400AE5E0
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\Public\TorrentJump to behavior
Source: C:\Users\user\Desktop\Setup.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\Setup.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Setup.exeVirustotal: Detection: 6%
Source: C:\Users\user\Desktop\Setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32Jump to behavior
Source: Setup.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: Setup.exeStatic file information: File size 1371648 > 1048576
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014009E020 CreateDialogIndirectParamW,SetPropW,DestroyWindow,LoadLibraryW,GetProcAddress,FreeLibrary,SetWindowLongPtrW,GetWindowLongW,SetWindowLongW,0_2_000000014009E020
Source: Setup.exeStatic PE information: section name: text
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400D8190 push rbp; iretd 0_2_00000001400D8688
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001401284CB push rbp; iretd 0_2_00000001401284DE
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400BCC66 push 85000BCBh; retf 0_2_00000001400BCCF5
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140050566 IsZoomed,IsIconic,0_2_0000000140050566
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014007A590 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,CreateDCW,GetDC,GetPixel,DeleteDC,ReleaseDC,_swprintf,malloc,malloc,0_2_000000014007A590
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140058A70 GetCursorPos,GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,WindowFromPoint,EnumChildWindows,GetClassNameW,EnumChildWindows,malloc,0_2_0000000140058A70
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140054C20 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetSystemMetrics,GetSystemMetrics,wcsncpy,GetDC,DestroyIcon,DeleteObject,GetIconInfo,CreateCompatibleDC,DeleteObject,DeleteObject,CreateCompatibleDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,CreateCompatibleDC,malloc,ReleaseDC,DeleteObject,SelectObject,DeleteDC,DeleteObject,malloc,0_2_0000000140054C20
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140044C80 IsWindow,DestroyWindow,GetCursorPos,GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,MonitorFromPoint,GetMonitorInfoW,IsWindow,CreateWindowExW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetWindowRect,SendMessageW,SendMessageW,0_2_0000000140044C80
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140056DC0 SendMessageW,IsWindowVisible,ShowWindow,IsIconic,ShowWindow,GetForegroundWindow,SetForegroundWindow,SendMessageW,0_2_0000000140056DC0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140096FB0 SetWindowTextW,IsZoomed,IsIconic,ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowLongW,GetWindowRect,GetClientRect,SystemParametersInfoW,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,SetFocus,0_2_0000000140096FB0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140096FB0 SetWindowTextW,IsZoomed,IsIconic,ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowLongW,GetWindowRect,GetClientRect,SystemParametersInfoW,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,SetFocus,0_2_0000000140096FB0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014009109D GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_000000014009109D
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400910AD MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_00000001400910AD
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400910A5 GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_00000001400910A5
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400910BB MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_00000001400910BB
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400970DF ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_00000001400970DF
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400970D5 ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_00000001400970D5
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400910FF MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_00000001400910FF
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014009710A ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_000000014009710A
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014009713C ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_000000014009713C
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140091137 GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091137
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140091146 GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091146
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014009719A ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_000000014009719A
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140093200 GetWindowLongW,GetWindowLongW,SetWindowPos,EnableWindow,GetWindowRect,GetClientRect,MulDiv,MulDiv,GetWindowRect,GetClientRect,MulDiv,MulDiv,_wcstoi64,IsWindow,SetParent,SetWindowLongPtrW,SetParent,IsWindowVisible,IsIconic,SetWindowLongW,SetWindowLongW,SetWindowPos,InvalidateRect,0_2_0000000140093200
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400971F8 ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_00000001400971F8
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140097229 MulDiv,MulDiv,ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_0000000140097229
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014008F260 SendMessageW,MulDiv,MulDiv,COMRefPtr,MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetDC,SelectObject,GetTextMetricsW,GetSystemMetrics,GetDC,SelectObject,GetTextMetricsW,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,DrawTextW,DrawTextW,GetCharABCWidthsW,MulDiv,GetSystemMetrics,GetSystemMetrics,MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,SelectObject,ReleaseDC,SendMessageW,SendMessageW,GetClientRect,SetWindowLongW,SendMessageW,SetWindowLongW,MoveWindow,GetWindowRect,SendMessageW,GetWindowRect,MapWindowPoints,InvalidateRect,SetWindowPos,SetWindowPos,MapWindowPoints,0_2_000000014008F260
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400B1470 GetForegroundWindow,IsWindowVisible,IsIconic,ShowWindow,0_2_00000001400B1470
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400694D0 GetTickCount,GetForegroundWindow,GetTickCount,GetWindowThreadProcessId,GetGUIThreadInfo,ClientToScreen,GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,_itow,0_2_00000001400694D0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014009D500 SendMessageW,GetWindowLongW,IsWindowVisible,IsIconic,GetFocus,GetWindowRect,GetPropW,ShowWindow,GetUpdateRect,SendMessageW,GetWindowLongW,ShowWindow,EnableWindow,GetWindowRect,PtInRect,PtInRect,SetFocus,SendMessageW,ShowWindow,SetFocus,InvalidateRect,MapWindowPoints,InvalidateRect,0_2_000000014009D500
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400B1650 GetWindowThreadProcessId,GetForegroundWindow,IsIconic,ShowWindow,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,BringWindowToTop,0_2_00000001400B1650
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400536A0 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,CreateCompatibleDC,_swprintf,malloc,ReleaseDC,SelectObject,DeleteDC,DeleteObject,malloc,GetPixel,ReleaseDC,malloc,malloc,0_2_00000001400536A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400ADB60 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,0_2_00000001400ADB60
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400A1CD0 CheckMenuItem,CheckMenuItem,GetCursorPos,GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetForegroundWindow,GetWindowThreadProcessId,SetForegroundWindow,SetForegroundWindow,TrackPopupMenuEx,PostMessageW,GetForegroundWindow,SetForegroundWindow,0_2_00000001400A1CD0
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140018F300_2_0000000140018F30
Source: C:\Users\user\Desktop\Setup.exeUser Timer Set: Timeout: 100msJump to behavior
Source: C:\Users\user\Desktop\Setup.exeUser Timer Set: Timeout: 10msJump to behavior
Source: C:\Users\user\Desktop\Setup.exeUser Timer Set: Timeout: 10msJump to behavior
Source: C:\Users\user\Desktop\Setup.exeAPI coverage: 1.3 %
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140018F300_2_0000000140018F30
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014001A910 GetKeyboardLayout followed by cmp: cmp dl, 00000019h and CTI: ja 000000014001AA8Dh country: Russian (ru)0_2_000000014001A910
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140022A87 GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022CB9h country: Urdu (ur)0_2_0000000140022A87
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140022A87 GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022CB9h country: Inuktitut (iu)0_2_0000000140022A87
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140022A8F GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022CB9h country: Urdu (ur)0_2_0000000140022A8F
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140022A8F GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022CB9h country: Inuktitut (iu)0_2_0000000140022A8F
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140022A96 GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022CB9h country: Urdu (ur)0_2_0000000140022A96
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140022A96 GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022CB9h country: Inuktitut (iu)0_2_0000000140022A96
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140022ABD GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022CB9h country: Urdu (ur)0_2_0000000140022ABD
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140022ABD GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022CB9h country: Inuktitut (iu)0_2_0000000140022ABD
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140022AE1 GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022CB9h country: Urdu (ur)0_2_0000000140022AE1
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140022AE1 GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022CB9h country: Inuktitut (iu)0_2_0000000140022AE1
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140022B05 GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022CB9h country: Urdu (ur)0_2_0000000140022B05
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140022B05 GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022CB9h country: Inuktitut (iu)0_2_0000000140022B05
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400150B0 GetKeyboardLayout followed by cmp: cmp ecx, 0ah and CTI: jl 0000000140015412h country: Spanish (es)0_2_00000001400150B0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140059180 GetLocalTime followed by cmp: cmp word ptr [rbx], cx and CTI: je 00000001400594B3h0_2_0000000140059180
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140059180 GetLocalTime followed by cmp: cmp dx, ax and CTI: je 0000000140059373h0_2_0000000140059180
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400AD4A0 FindFirstFileW,FindClose,FindFirstFileW,FindClose,0_2_00000001400AD4A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014003C6B0 FindFirstFileW,FindNextFileW,FindClose,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,0_2_000000014003C6B0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140066C80 FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,_swprintf,FindNextFileW,FindClose,0_2_0000000140066C80
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140066FC0 FindFirstFileW,GetLastError,FindClose,FileTimeToLocalFileTime,FileTimeToSystemTime,_swprintf,malloc,0_2_0000000140066FC0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140081230 GetFullPathNameW,GetFullPathNameW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,GetLastError,wcsncpy,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,MoveFileW,DeleteFileW,MoveFileW,GetLastError,CopyFileW,GetLastError,0_2_0000000140081230
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400AD3A0 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00000001400AD3A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140067610 CreateFileW,GetFileSizeEx,CloseHandle,FindFirstFileW,GetLastError,FindClose,0_2_0000000140067610
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140081820 GetFileAttributesW,FindFirstFileW,FindClose,0_2_0000000140081820
Source: Setup.exe, 00000000.00000002.1684677071.00000000008C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}
Source: Setup.exe, 00000000.00000002.1684756472.0000000000904000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: Setup.exe, 00000000.00000002.1684677071.00000000008C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}\
Source: C:\Users\user\Desktop\Setup.exeAPI call chain: ExitProcess graph end nodegraph_0-224715
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140018050 BlockInput,BlockInput,0_2_0000000140018050
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400D1110 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00000001400D1110
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014009E020 CreateDialogIndirectParamW,SetPropW,DestroyWindow,LoadLibraryW,GetProcAddress,FreeLibrary,SetWindowLongPtrW,GetWindowLongW,SetWindowLongW,0_2_000000014009E020
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400D76DC GetProcessHeap,HeapAlloc,_errno,_errno,__doserrno,_errno,GetProcessHeap,HeapFree,SetEndOfFile,_errno,__doserrno,GetLastError,0_2_00000001400D76DC
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400D2BA4 SetUnhandledExceptionFilter,0_2_00000001400D2BA4
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400D1110 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00000001400D1110
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400CDD84 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00000001400CDD84
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140041980 _swprintf,CreateProcessW,CloseHandle,GetLastError,SetCurrentDirectoryW,GetFileAttributesW,SetCurrentDirectoryW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,CloseHandle,GetLastError,FormatMessageW,0_2_0000000140041980
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400172A0 GetCurrentThreadId,GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,BlockInput,GetForegroundWindow,GetAsyncKeyState,keybd_event,GetAsyncKeyState,keybd_event,GetAsyncKeyState,BlockInput,0_2_00000001400172A0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140018AB0 mouse_event,0_2_0000000140018AB0
Source: Setup.exeBinary or memory string: TextLEFTLRIGHTRMIDDLEMX1X2WUWDWLWR{Blind}{ClickLl{}^+!#{}RawTempASC U+ ,LWin RWin LShift RShift LCtrl RCtrl LAlt RAlt SYSTEM\CurrentControlSet\Control\Keyboard Layouts\Layout FileKbdLayerDescriptorsc%03Xvk%02XSCALTDOWNALTUPSHIFTDOWNSHIFTUPCTRLDOWNCONTROLDOWNCTRLUPCONTROLUPLWINDOWNLWINUPRWINDOWNRWINUPRtlGetVersionntdll.dll%u.%u.%uStdOutAllUnreachableClassOverwriteUseEnvLocalSameAsGlobalUseUnsetGlobalUseUnsetLocalYYYYYWeekYearYDayWorkingDirWinDirWinDelayWDayUserNameTitleMatchModeSpeedTitleMatchModeTimeSinceThisHotkeyTimeSincePriorHotkeyTimeIdlePhysicalTimeIdleMouseTimeIdleKeyboardTimeIdleTickCountThisMenuItemPosThisMenuItemThisMenuThisLabelThisHotkeyThisFuncStoreCapslockModeStartupCommonStartupStartMenuCommonStartMenuSecScriptNameScriptHwndScriptFullPathScriptDirScreenWidthScreenHeightScreenDPIRegViewPtrSizeProgramsCommonProgramsPriorKeyPriorHotkeyOSVersionOSTypeNumBatchLinesNowUTCNowMyDocumentsMSecMouseDelayPlayMouseDelayMonMMMMMMMMMMinMDayLoopRegTypeLoopRegTimeModifiedLoopRegSubKeyLoopRegNameLoopRegKeyLoopReadLineLoopFileTimeModifiedLoopFileTimeCreatedLoopFileTimeAccessedLoopFileSizeMBLoopFileSizeKBLoopFileSizeLoopFileShortPathLoopFileShortNameLoopFilePathLoopFileNameLoopFileLongPathLoopFileFullPathLoopFileExtLoopFileDirLoopFileAttribLoopFieldLineNumberLineFileLastErrorLanguageKeyDurationPlayKeyDurationKeyDelayPlayKeyDelayIsUnicodeIsSuspendedIsPausedIsCriticalIsCompiledIsAdminIs64bitOSIPAddress4IPAddress3IPAddress2IPAddress1IndexIconTipIconNumberIconHiddenIconFileHourGuiYGuiXGuiWidthGuiHeightGuiEventGuiControlEventFormatIntegerFormatFloatExitReasonEventInfoEndCharDesktopCommonDesktopDefaultTreeViewDefaultMouseSpeedDefaultListViewDefaultGuiDDDDDDDDDCursorCoordModeToolTipCoordModePixelCoordModeMouseCoordModeMenuCoordModeCaretControlDelayComputerNameCaretYCaretXBatchLinesAppDataCommonAppDataAhkVersionAhkPathTrueProgramFilesFalseComSpecClipboardAll...%s[%Iu of %Iu]: %-1.60s%sPropertyRegExMatch\:\:REG_SZREG_EXPAND_SZREG_MULTI_SZREG_DWORDREG_BINARYDefault3264LineRegExFASTSLOWAscChrDerefHTMLModPowExpSqrtLogLnRoundCeilFloorAbsSinCosTanASinACosATanBitAndBitOrBitXOrBitNotBitShiftLeftBitShiftRightAddDestroyNamePriorityInterruptNoTimersLabelTypeCountLocalePermitMouseSendAndMouseMouseMoveOffPlayEventThenEventThenPlayYESNOOKCANCELABORTIGNORERETRYCONTINUETRYAGAINMINMAXHIDEScreenRelativeWindowClientPixelCaretIntegerFloatNumberTimeDateDigitXdigitAlnumAlphaUpperLowerUTF-8UTF-8-RAWUTF-16UTF-16-RAWCPFuncRemoveClipboardFormatListeneruser32AddClipboardFormatListenerTrayNo tray memstatus AHK_PlayMe modeclose AHK_PlayMeRegClassAutoHotkey2Shell_TrayWndCreateWindoweditConsolasLucida Console*ErrorLevel <>=/|^,:*&~!()[]{}+-?."'\;`IFWHILEClass>AUTOHOTKEY SCRIPT<Could not extract script from EXE./*#CommentFlag*/and<>=/|^,:<>=/|^,:.+-*&!?~::?*- Continuation section too long.JoinLTrimRTrimMissing ")"Functions cannot contain functions.Missing "{"Not a valid method, class or property definition.GetSetNot a valid property getter/setter.Hotkeys/hotstrings are not allowed inside
Source: Setup.exeBinary or memory string: Program Manager
Source: Setup.exeBinary or memory string: Shell_TrayWnd
Source: Setup.exeBinary or memory string: Progman
Source: Setup.exeBinary or memory string: "%-1.300s"The maximum number of MsgBoxes has been reached.IsHungAppWindowDwmGetWindowAttributedwmapi.dllahk_idpidgroup%s%uProgram ManagerProgmanWorkerWError text not found (please report)Q\E{0,DEFINEUTF16)UCP)NO_START_OPT)CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument is compiled in 8 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140020253 SetCurrentDirectoryW,malloc,GetSystemTimeAsFileTime,0_2_0000000140020253
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400690F0 GetComputerNameW,GetUserNameW,0_2_00000001400690F0
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00000001400CE334 HeapCreate,GetVersion,HeapSetInformation,0_2_00000001400CE334
Source: Setup.exeBinary or memory string: WIN_XP
Source: Setup.exeBinary or memory string: ?*A Goto/Gosub must not jump into a block that doesn't enclose it.ddddddd%02d%dmsSlowLogoffSingle1.1.34.03\AutoHotkey.exeWIN32_NTWIN_8.1WIN_8WIN_7WIN_VISTAWIN_XPWIN_2003%04hX0x%Ix*pPIntStrPtrShortInt64DoubleAStrWStrgdi32comctl32kernel32W-3-4CDecl-2This DllCall requires a prior VarSetCapacity.Pos%sLen%sPos%dLen%dLenMarkpcre_calloutCompile error %d at offset %d: %hs-+0 #diouxXeEfgGaAcCpULlTt%0.*fFfSelectVisCenterUniDescLogicalNoSortAutoHdrFirstBoldExpandGDI+JoyJoyXJoyYJoyZJoyRJoyUJoyVJoyPOVJoyNameJoyButtonsJoyAxesJoyInfo0%
Source: Setup.exeBinary or memory string: WIN_VISTA
Source: Setup.exeBinary or memory string: WIN_7
Source: Setup.exeBinary or memory string: WIN_8
Source: Setup.exeBinary or memory string: WIN_8.1
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014001E850 PostThreadMessageW,Sleep,GetTickCount,GetExitCodeThread,GetTickCount,Sleep,CloseHandle,CreateMutexW,CloseHandle,CreateMutexW,CloseHandle,Shell_NotifyIconW,IsWindow,DestroyWindow,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DestroyIcon,IsWindow,DestroyWindow,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DestroyIcon,DestroyIcon,IsWindow,DestroyWindow,DeleteObject,RemoveClipboardFormatListener,ChangeClipboardChain,mciSendStringW,mciSendStringW,DeleteCriticalSection,OleUninitialize,0_2_000000014001E850
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_000000014001F440 AddClipboardFormatListener,PostMessageW,SetClipboardViewer,RemoveClipboardFormatListener,ChangeClipboardChain,0_2_000000014001F440
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0000000140073500 RemoveClipboardFormatListener,ChangeClipboardChain,0_2_0000000140073500
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Masquerading
21
Input Capture
11
System Time Discovery
Remote Services1
Screen Capture
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Access Token Manipulation
1
Virtualization/Sandbox Evasion
LSASS Memory131
Security Software Discovery
Remote Desktop Protocol21
Input Capture
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Process Injection
1
Disable or Modify Tools
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin Shares1
Archive Collected Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
Access Token Manipulation
NTDS2
Process Discovery
Distributed Component Object Model3
Clipboard Data
Protocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Process Injection
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Deobfuscate/Decode Files or Information
Cached Domain Credentials1
Account Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
Obfuscated Files or Information
DCSync1
System Owner/User Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc Filesystem2
File and Directory Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow14
System Information Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Setup.exe0%ReversingLabs
Setup.exe7%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://autohotkey.comCould0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://autohotkey.comSetup.exefalse
    high
    https://autohotkey.comCouldSetup.exefalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1416903
    Start date and time:2024-03-28 09:19:08 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 2m 29s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:1
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:Setup.exe
    Detection:MAL
    Classification:mal60.evad.winEXE@1/0@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 97%
    • Number of executed functions: 184
    • Number of non-executed functions: 48
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Stop behavior analysis, all processes terminated
    • Report size exceeded maximum capacity and may have missing disassembly code.
    TimeTypeDescription
    09:19:53API Interceptor1x Sleep call for process: Setup.exe modified
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):6.108651062106143
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:Setup.exe
    File size:1'371'648 bytes
    MD5:67890fcc5a391a8914e9ffaf209abecd
    SHA1:d7f8448dee9b8f76a4b007bfe0da83f52eac674e
    SHA256:27be6ed296617b8b4fe5cf1e9a4c0e4547c81d3cbf4bce524792d8e971fb290f
    SHA512:509d4c880d4bc37e35353279c8b9c594dee774cfe774b06b0daa07d3ef68dd187f971e3cc9e97db8eb8ed946bbf0e5b0cf2862c595e0065a9aa39f8f683d65b2
    SSDEEP:24576:5EqYy2vg041qFrGsZPUaEI7n3eWbn8/XXQGGH8BTLxeX1fiYM4Qe6fqwo:5EqFcg041qFrGsZPUaEI7n3eWbn8vAfZ
    TLSH:E3555A0633A1C0B8DA6690B2C625922ED7717414C72B8EDB64E05EDEFFD2A905F36731
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&.DXG..XG..XG..C...mG..C....G..Q? .^G..Q?$.YG..Q?0.EG..XG...F..C.=.OG..C...sG..C.9.YG..C.>.YG..RichXG..........PE..d...1..b...
    Icon Hash:1fa1b0b4b4b0701f
    Entrypoint:0x1400ccd80
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:
    Time Stamp:0x629C1731 [Sun Jun 5 02:38:41 2022 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:2
    File Version Major:5
    File Version Minor:2
    Subsystem Version Major:5
    Subsystem Version Minor:2
    Import Hash:b66b962f1654841b6655c9e59651771a
    Instruction
    dec eax
    sub esp, 28h
    call 00007F84F089F048h
    dec eax
    add esp, 28h
    jmp 00007F84F08989F7h
    int3
    int3
    dec eax
    mov dword ptr [esp+08h], ebx
    dec eax
    mov dword ptr [esp+10h], ebp
    dec eax
    mov dword ptr [esp+18h], esi
    push edi
    dec eax
    sub esp, 20h
    dec eax
    lea ebx, dword ptr [ecx+1Ch]
    dec eax
    mov ebp, ecx
    mov esi, 00000101h
    dec eax
    mov ecx, ebx
    inc esp
    mov eax, esi
    xor edx, edx
    call 00007F84F089BF14h
    inc ebp
    xor ebx, ebx
    dec eax
    lea edi, dword ptr [ebp+10h]
    inc ecx
    lea ecx, dword ptr [ebx+06h]
    inc ecx
    movzx eax, bx
    inc esp
    mov dword ptr [ebp+0Ch], ebx
    dec esp
    mov dword ptr [ebp+04h], ebx
    rep stosw
    dec eax
    lea edi, dword ptr [0004365Eh]
    dec eax
    sub edi, ebp
    mov al, byte ptr [edi+ebx]
    mov byte ptr [ebx], al
    dec eax
    inc ebx
    dec eax
    dec esi
    jne 00007F84F0898B95h
    dec eax
    lea ecx, dword ptr [ebp+0000011Dh]
    mov edx, 00000100h
    mov al, byte ptr [ecx+edi]
    mov byte ptr [ecx], al
    dec eax
    inc ecx
    dec eax
    dec edx
    jne 00007F84F0898B95h
    dec eax
    mov ebx, dword ptr [esp+30h]
    dec eax
    mov ebp, dword ptr [esp+38h]
    dec eax
    mov esi, dword ptr [esp+40h]
    dec eax
    add esp, 20h
    pop edi
    ret
    dec eax
    mov eax, esp
    dec eax
    mov dword ptr [eax+10h], ebx
    dec eax
    mov dword ptr [eax+18h], esi
    dec eax
    mov dword ptr [eax+20h], edi
    push ebp
    dec eax
    lea ebp, dword ptr [eax-00000488h]
    dec eax
    sub esp, 00000580h
    dec eax
    mov eax, dword ptr [0004446Bh]
    dec eax
    xor eax, esp
    Programming Language:
    • [C++] VS2010 SP1 build 40219
    • [ C ] VS2010 SP1 build 40219
    • [ C ] VS2008 SP1 build 30729
    • [IMP] VS2008 SP1 build 30729
    • [ASM] VS2010 SP1 build 40219
    • [RES] VS2010 SP1 build 40219
    • [LNK] VS2010 SP1 build 40219
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x10cfdc0x12c.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x12f0000x2a3c8.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x11d0000x7980.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0xdf0000xeb8.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000xdd4260xdd6004944ca6026936a8815b1ddae21c00292False0.5366936053077357data6.543735961579387IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0xdf0000x30f3e0x31000b8e4c6a15b9da25f8184df2d630e28d0False0.281070631377551data4.993934088064197IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x1100000xc3280x5000a92c5afeca34cd985c617c0442a7d56bFalse0.247412109375data3.2453306973952833IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x11d0000x79800x7a00a6daa653cc667f7e3b1d13baf7e4c484False0.4823258196721312data6.030017908203169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    text0x1250000x258d0x2600c0f57c57c0a2bd55a1fd49a6f01205e7False0.4654605263157895data5.774921348227209IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE
    data0x1280000x6ec00x70008f4275b626558a8640120f611553e570False0.47119140625data6.457359279664662IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x12f0000x2a3c80x2a4001c4554a73cff8b13421466a165763d23False0.07492372411242604data2.2278670956283784IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0x12f8180x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.23521505376344087
    RT_ICON0x12fb000x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.39864864864864863
    RT_ICON0x12fc280x2ca8Device independent bitmap graphic, 96 x 192 x 8, image size 9216, 256 important colorsEnglishUnited States0.048547935619314204
    RT_ICON0x1328d00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6941489361702128
    RT_ICON0x132d380x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6622340425531915
    RT_ICON0x1331a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6453900709219859
    RT_ICON0x1336080x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.6655405405405406
    RT_ICON0x1337300x1bc8Device independent bitmap graphic, 72 x 144 x 8, image size 5184, 256 important colorsEnglishUnited States0.06285151856017998
    RT_ICON0x1352f80x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4096, 256 important colorsEnglishUnited States0.06770098730606489
    RT_ICON0x1369200x1418Device independent bitmap graphic, 60 x 120 x 8, image size 3600, 256 important colorsEnglishUnited States0.07231726283048212
    RT_ICON0x137d380xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.08049040511727079
    RT_ICON0x138be00xba8Device independent bitmap graphic, 40 x 80 x 8, image size 1600, 256 important colorsEnglishUnited States0.09517426273458444
    RT_ICON0x1397880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.10063176895306859
    RT_ICON0x13a0300x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.11981566820276497
    RT_ICON0x13a6f80x608Device independent bitmap graphic, 20 x 40 x 8, image size 400, 256 important colorsEnglishUnited States0.15414507772020725
    RT_ICON0x13ad000x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.10476878612716763
    RT_ICON0x13b2680x86ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.840129749768304
    RT_ICON0x13bad80x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.025882909396678578
    RT_ICON0x144f800x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.029621072088724585
    RT_ICON0x14a4080x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.03288852149267832
    RT_ICON0x14e6300x3a48Device independent bitmap graphic, 60 x 120 x 32, image size 14880EnglishUnited States0.037265415549597856
    RT_ICON0x1520780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.04128630705394191
    RT_ICON0x1546200x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720EnglishUnited States0.052366863905325446
    RT_ICON0x1560880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.06074108818011257
    RT_ICON0x1571300x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.09631147540983606
    RT_ICON0x157ab80x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1680EnglishUnited States0.12151162790697674
    RT_ICON0x1581700x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.12854609929078015
    RT_MENU0x1585d80x2c8dataEnglishUnited States0.46207865168539325
    RT_DIALOG0x1588a00xe8dataEnglishUnited States0.6206896551724138
    RT_ACCELERATOR0x1589880x48dataEnglishUnited States0.8194444444444444
    RT_RCDATA0x1589d00x170ASCII textEnglishUnited States0.46467391304347827
    RT_GROUP_ICON0x158b400x148dataEnglishUnited States0.573170731707317
    RT_GROUP_ICON0x158c880x14dataEnglishUnited States1.25
    RT_GROUP_ICON0x158c9c0x14dataEnglishUnited States1.25
    RT_GROUP_ICON0x158cb00x14dataEnglishUnited States1.25
    RT_GROUP_ICON0x158cc40x14dataEnglishUnited States1.25
    RT_VERSION0x158cd80x1fcdataEnglishUnited States0.5059055118110236
    RT_MANIFEST0x158ed40x4f4ASCII text, with very long lines (1268), with no line terminatorsEnglishUnited States0.4755520504731861
    DLLImport
    WSOCK32.dllgethostbyname, inet_addr, WSACleanup, gethostname, WSAStartup
    WINMM.dllmixerGetLineInfoW, mixerGetDevCapsW, mixerOpen, mciSendStringW, joyGetPosEx, mixerGetLineControlsW, mixerGetControlDetailsW, mixerSetControlDetails, waveOutGetVolume, mixerClose, waveOutSetVolume, joyGetDevCapsW
    VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
    COMCTL32.dllImageList_Create, CreateStatusWindowW, ImageList_ReplaceIcon, ImageList_GetIconSize, ImageList_Destroy, ImageList_AddMasked
    PSAPI.DLLGetProcessImageFileNameW, GetModuleBaseNameW, GetModuleFileNameExW
    WININET.dllInternetOpenW, InternetOpenUrlW, InternetCloseHandle, InternetReadFileExA, InternetReadFile
    KERNEL32.dllGetModuleFileNameW, GetSystemTimeAsFileTime, FindResourceW, SizeofResource, LoadResource, LockResource, GetFullPathNameW, GetShortPathNameW, FindFirstFileW, FindNextFileW, FindClose, FileTimeToLocalFileTime, SetEnvironmentVariableW, Beep, MoveFileW, OutputDebugStringW, CreateProcessW, GetFileAttributesW, WideCharToMultiByte, MultiByteToWideChar, GetExitCodeProcess, WriteProcessMemory, ReadProcessMemory, GetCurrentProcessId, OpenProcess, TerminateProcess, SetPriorityClass, SetLastError, GetEnvironmentVariableW, GetLocalTime, GetDateFormatW, GetTimeFormatW, GetDiskFreeSpaceExW, SetVolumeLabelW, CreateFileW, DeviceIoControl, GetDriveTypeW, GetVolumeInformationW, GetDiskFreeSpaceW, GetCurrentDirectoryW, CreateDirectoryW, ReadFile, WriteFile, DeleteFileW, SetFileAttributesW, LocalFileTimeToFileTime, SetFileTime, DeleteCriticalSection, GetSystemTime, GetSystemDefaultUILanguage, GetComputerNameW, GetSystemWindowsDirectoryW, GetTempPathW, EnterCriticalSection, LeaveCriticalSection, VirtualProtect, QueryDosDeviceW, CompareStringW, RemoveDirectoryW, CopyFileW, GetCurrentProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, FormatMessageW, GetPrivateProfileStringW, GetPrivateProfileSectionW, GetPrivateProfileSectionNamesW, WritePrivateProfileStringW, WritePrivateProfileSectionW, SetEndOfFile, GetACP, GetFileType, GetStdHandle, SetFilePointerEx, SystemTimeToFileTime, FileTimeToSystemTime, GetFileSize, IsWow64Process, VirtualAllocEx, VirtualFreeEx, EnumResourceNamesW, LoadLibraryExW, GlobalSize, HeapReAlloc, EncodePointer, HeapFree, DecodePointer, ExitProcess, HeapAlloc, IsValidCodePage, FlsGetValue, FlsSetValue, FlsFree, FlsAlloc, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, GetCPInfo, GetVersionExW, GetModuleHandleW, FreeLibrary, GetProcAddress, LoadLibraryW, GetLastError, CreateMutexW, CloseHandle, GetExitCodeThread, SetThreadPriority, CreateThread, GetStringTypeExW, lstrcmpiW, GetCurrentThreadId, GlobalUnlock, GlobalFree, GlobalAlloc, GlobalLock, SetErrorMode, InitializeCriticalSection, SetCurrentDirectoryW, Sleep, GetTickCount, MulDiv, RtlCaptureContext, HeapSetInformation, GetVersion, HeapCreate, InitializeCriticalSectionAndSpinCount, HeapSize, HeapQueryInformation, GetCommandLineW, GetStartupInfoW, RtlUnwindEx, SetHandleCount, GetStringTypeW, RaiseException, RtlPcToFileHeader, LCMapStringW, GetConsoleCP, GetConsoleMode, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetOEMCP, FlushFileBuffers, SetFilePointer, WriteConsoleW, SetStdHandle, GetFileSizeEx, GetProcessHeap
    USER32.dllGetDlgItem, SetDlgItemTextW, MessageBeep, GetCursorInfo, GetLastInputInfo, GetSystemMenu, GetMenuItemCount, GetMenuItemID, GetSubMenu, GetMenuStringW, ExitWindowsEx, SetMenu, FlashWindow, GetPropW, SetPropW, RemovePropW, MapWindowPoints, RedrawWindow, SetWindowLongPtrW, SetParent, GetClassInfoExW, DefDlgProcW, GetAncestor, UpdateWindow, GetMessagePos, GetClassLongPtrW, CallWindowProcW, CheckRadioButton, IntersectRect, GetUpdateRect, PtInRect, CreateDialogIndirectParamW, GetWindowLongPtrW, CreateAcceleratorTableW, DestroyAcceleratorTable, InsertMenuItemW, SetMenuDefaultItem, RemoveMenu, SetMenuItemInfoW, IsMenu, GetMenuItemInfoW, CreateMenu, CreatePopupMenu, SetMenuInfo, AppendMenuW, DestroyMenu, TrackPopupMenuEx, CopyImage, CreateIconIndirect, CreateIconFromResourceEx, EnumClipboardFormats, GetWindow, BringWindowToTop, MessageBoxW, GetTopWindow, GetQueueStatus, SendDlgItemMessageW, LoadAcceleratorsW, EnableMenuItem, GetMenu, CreateWindowExW, RegisterClassExW, LoadCursorW, DestroyIcon, IsCharAlphaW, EnableWindow, VkKeyScanExW, MapVirtualKeyExW, GetKeyboardLayoutNameW, ActivateKeyboardLayout, GetGUIThreadInfo, GetWindowTextW, mouse_event, WindowFromPoint, GetSystemMetrics, keybd_event, SetKeyboardState, GetKeyboardState, GetCursorPos, GetAsyncKeyState, AttachThreadInput, SendInput, UnregisterHotKey, RegisterHotKey, PostQuitMessage, SendMessageTimeoutW, UnhookWindowsHookEx, SetWindowsHookExW, PostThreadMessageW, IsCharAlphaNumericW, IsCharUpperW, IsCharLowerW, ToUnicodeEx, GetKeyboardLayout, CallNextHookEx, CharLowerW, ReleaseDC, GetDC, OpenClipboard, GetClipboardData, GetClipboardFormatNameW, CloseClipboard, SetClipboardData, EmptyClipboard, PostMessageW, FindWindowW, EndDialog, IsWindow, DispatchMessageW, TranslateMessage, ShowWindow, CountClipboardFormats, SetWindowLongW, ScreenToClient, IsDialogMessageW, DialogBoxParamW, SetForegroundWindow, DefWindowProcW, FillRect, DrawIconEx, GetSysColorBrush, GetSysColor, RegisterWindowMessageW, EnumDisplayMonitors, IsIconic, IsZoomed, EnumWindows, SetClipboardViewer, GetWindowTextLengthW, SendMessageW, IsWindowEnabled, GetWindowLongW, GetKeyState, TranslateAcceleratorW, KillTimer, PeekMessageW, GetFocus, GetClassNameW, GetWindowThreadProcessId, GetForegroundWindow, InvalidateRect, SetLayeredWindowAttributes, SetWindowPos, SetWindowRgn, SetFocus, SetActiveWindow, ClientToScreen, EnumChildWindows, MoveWindow, GetWindowRect, GetMonitorInfoW, MonitorFromPoint, GetClientRect, SystemParametersInfoW, AdjustWindowRectEx, DrawTextW, SetRect, GetIconInfo, SetWindowTextW, IsWindowVisible, BlockInput, GetMessageW, SetTimer, GetParent, GetDlgCtrlID, CharUpperW, IsClipboardFormatAvailable, CheckMenuItem, LoadImageW, MapVirtualKeyW, ChangeClipboardChain, DestroyWindow
    GDI32.dllGetPixel, GetClipRgn, GetCharABCWidthsW, SetBkMode, CreatePatternBrush, SetBrushOrgEx, EnumFontFamiliesExW, CreateDIBSection, GdiFlush, SetBkColor, ExcludeClipRect, SetTextColor, GetClipBox, BitBlt, CreateCompatibleBitmap, GetSystemPaletteEntries, GetDIBits, CreateCompatibleDC, CreatePolygonRgn, CreateRectRgn, CreateRoundRectRgn, CreateEllipticRgn, DeleteDC, GetObjectW, GetTextMetricsW, GetTextFaceW, SelectObject, GetStockObject, CreateDCW, CreateSolidBrush, CreateFontW, FillRgn, GetDeviceCaps, DeleteObject
    COMDLG32.dllCommDlgExtendedError, GetSaveFileNameW, GetOpenFileNameW
    ADVAPI32.dllRegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, RegQueryValueExW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, GetUserNameW, RegEnumKeyExW, RegEnumValueW, RegQueryInfoKeyW, RegOpenKeyExW, RegCloseKey, RegConnectRegistryW, RegDeleteValueW
    SHELL32.dllDragQueryPoint, SHEmptyRecycleBinW, SHFileOperationW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetDesktopFolder, SHGetMalloc, SHGetFolderPathW, ShellExecuteExW, Shell_NotifyIconW, DragFinish, DragQueryFileW, ExtractIconW
    ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, CoInitialize, CoUninitialize, CLSIDFromString, CLSIDFromProgID, CoGetObject, StringFromGUID2, CreateStreamOnHGlobal
    OLEAUT32.dllSafeArrayGetLBound, GetActiveObject, SysStringLen, OleLoadPicture, SafeArrayUnaccessData, SafeArrayGetElemsize, SafeArrayAccessData, SafeArrayUnlock, SafeArrayPtrOfIndex, SafeArrayLock, SafeArrayGetDim, SafeArrayDestroy, SafeArrayGetUBound, VariantCopyInd, SafeArrayCopy, SysAllocString, VariantChangeType, VariantClear, SafeArrayCreate, SysFreeString
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    No network behavior found

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:09:19:53
    Start date:28/03/2024
    Path:C:\Users\user\Desktop\Setup.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\Setup.exe"
    Imagebase:0x140000000
    File size:1'371'648 bytes
    MD5 hash:67890FCC5A391A8914E9FFAF209ABECD
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:0.5%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:38.6%
      Total number of Nodes:883
      Total number of Limit Nodes:41
      execution_graph 224535 140033314 224536 140033327 224535->224536 224546 140033372 224535->224546 224537 14003334b 224536->224537 224587 1400af7b0 164 API calls 3 library calls 224536->224587 224542 14003336a 224537->224542 224588 1400ca390 132 API calls 2 library calls 224537->224588 224538 1400333f3 224541 1400322d0 240 API calls 224538->224541 224539 1400333b0 224547 1400333ea 224539->224547 224573 1400322d0 224539->224573 224541->224547 224589 1400ca388 132 API calls 2 library calls 224542->224589 224546->224538 224546->224539 224572 140038878 224546->224572 224548 14003345a 224547->224548 224549 14003348a 224547->224549 224567 140032377 224547->224567 224548->224567 224590 140040f50 132 API calls 2 library calls 224548->224590 224550 1400322d0 240 API calls 224549->224550 224549->224567 224551 1400334f5 224550->224551 224554 14003350d 224551->224554 224591 1400ca390 132 API calls 2 library calls 224551->224591 224553 1400323b1 GetTickCount 224557 1400323d0 PeekMessageW 224553->224557 224553->224567 224562 140038937 224554->224562 224554->224567 224555 14003238a GlobalUnlock 224556 14003239e CloseClipboard 224555->224556 224556->224553 224558 1400323f9 GetTickCount 224557->224558 224559 1400323ef 224557->224559 224558->224567 224559->224558 224561 140038961 224561->224572 224594 1400401a0 164 API calls _wcsupr_s_l 224561->224594 224562->224561 224563 140038959 224562->224563 224592 1400ca390 132 API calls 2 library calls 224562->224592 224593 1400ca388 132 API calls 2 library calls 224563->224593 224567->224553 224567->224555 224567->224556 224568 1400324b1 GetTickCount 224567->224568 224569 140032514 224567->224569 224571 1400322d0 240 API calls 224567->224571 224567->224572 224568->224567 224569->224567 224569->224572 224586 1400894d0 240 API calls 3 library calls 224569->224586 224571->224567 224580 14003234d 224573->224580 224585 140038878 224573->224585 224574 1400323b1 GetTickCount 224577 1400323d0 PeekMessageW 224574->224577 224574->224580 224575 14003238a GlobalUnlock 224576 14003239e CloseClipboard 224575->224576 224576->224574 224578 1400323f9 GetTickCount 224577->224578 224579 1400323ef 224577->224579 224578->224580 224579->224578 224580->224574 224580->224575 224580->224576 224581 1400324b1 GetTickCount 224580->224581 224582 140032514 224580->224582 224584 1400322d0 234 API calls 224580->224584 224580->224585 224581->224580 224582->224580 224582->224585 224595 1400894d0 240 API calls 3 library calls 224582->224595 224584->224580 224585->224539 224586->224569 224587->224537 224588->224542 224589->224546 224590->224567 224591->224554 224592->224563 224593->224561 224594->224572 224595->224582 224596 140020253 224597 140020228 224596->224597 224598 140020258 224596->224598 224635 140028500 173 API calls 2 library calls 224598->224635 224600 14002026d 224600->224597 224636 14002eda0 201 API calls 224600->224636 224602 140020316 224607 140020328 224602->224607 224637 14002c310 190 API calls _wcsupr_s_l 224602->224637 224603 140020355 SetCurrentDirectoryW 224639 140028500 173 API calls 2 library calls 224603->224639 224607->224603 224610 14002069f 224607->224610 224638 1400413f0 165 API calls 224607->224638 224608 14002037d 224608->224610 224640 140028500 173 API calls 2 library calls 224608->224640 224609 1400412f0 165 API calls 224611 140020288 224609->224611 224611->224597 224611->224602 224611->224609 224613 14002039a 224613->224610 224641 14002ef00 164 API calls 224613->224641 224615 1400203e3 224615->224610 224642 14002e0e0 170 API calls 224615->224642 224617 140020418 224617->224610 224618 140020438 224617->224618 224619 140020459 224617->224619 224643 1400b04d0 164 API calls 3 library calls 224618->224643 224622 140020490 224619->224622 224623 140020480 224619->224623 224621 14002068b GetSystemTimeAsFileTime 224621->224610 224625 1400204c3 224622->224625 224627 1400204d7 224622->224627 224633 140020454 _cftof_l 224622->224633 224644 140006120 21 API calls 2 library calls 224623->224644 224645 1400b0b80 132 API calls _freebuf 224625->224645 224628 140020531 224627->224628 224631 140020514 224627->224631 224627->224633 224646 1400a9650 224628->224646 224630 14002063c 224630->224633 224653 1400c98f4 224630->224653 224631->224630 224631->224633 224652 1400ca390 132 API calls 2 library calls 224631->224652 224633->224621 224635->224600 224636->224611 224637->224607 224638->224603 224639->224608 224640->224613 224641->224615 224642->224617 224643->224633 224644->224633 224645->224633 224647 1400a9665 224646->224647 224650 1400a9692 224646->224650 224649 1400a9674 224647->224649 224670 1400a96e0 224647->224670 224649->224650 224651 1400a96e0 143 API calls 224649->224651 224650->224633 224651->224650 224652->224630 224654 1400c9988 224653->224654 224660 1400c990c 224653->224660 224719 1400ce394 DecodePointer 224654->224719 224656 1400c9944 RtlAllocateHeap 224656->224660 224661 1400c997d 224656->224661 224657 1400c998d 224720 1400cdfdc 132 API calls _getptd 224657->224720 224660->224656 224662 1400c996d 224660->224662 224666 1400c9972 224660->224666 224669 1400c9924 224660->224669 224716 1400ce394 DecodePointer 224660->224716 224661->224633 224717 1400cdfdc 132 API calls _getptd 224662->224717 224718 1400cdfdc 132 API calls _getptd 224666->224718 224669->224656 224713 1400ce2f0 132 API calls 2 library calls 224669->224713 224714 1400ce090 132 API calls 6 library calls 224669->224714 224715 1400c9b98 GetModuleHandleW GetProcAddress ExitProcess malloc 224669->224715 224678 1400cafb0 224670->224678 224673 1400a9721 224673->224649 224674 1400c98f4 malloc 132 API calls 224675 1400a970a 224674->224675 224676 1400a9729 224675->224676 224690 1400ca388 132 API calls 2 library calls 224675->224690 224676->224649 224679 1400cafbb 224678->224679 224680 1400c98f4 malloc 132 API calls 224679->224680 224681 1400a96f0 224679->224681 224685 1400cafda 224679->224685 224691 1400ce394 DecodePointer 224679->224691 224680->224679 224681->224673 224681->224674 224683 1400cb02b 224695 1400d0850 132 API calls std::exception::operator= 224683->224695 224685->224683 224692 1400ca520 224685->224692 224686 1400cb03c 224696 1400d0924 RaiseException _cftof_l 224686->224696 224689 1400cb052 224690->224673 224691->224679 224697 1400ca414 224692->224697 224694 1400ca529 224694->224683 224695->224686 224696->224689 224712 1400c9bb0 224697->224712 224699 1400ca435 DecodePointer DecodePointer 224700 1400ca45f 224699->224700 224702 1400ca4fa _cinit 224699->224702 224701 1400ccaac _cinit 133 API calls 224700->224701 224700->224702 224703 1400ca47b 224701->224703 224702->224694 224704 1400ca4d8 EncodePointer EncodePointer 224703->224704 224705 1400ca497 224703->224705 224706 1400ca4a8 224703->224706 224704->224702 224707 1400ced68 _cinit 136 API calls 224705->224707 224706->224702 224708 1400ca49f 224706->224708 224707->224708 224708->224706 224709 1400ced68 _cinit 136 API calls 224708->224709 224710 1400ca4c0 EncodePointer 224708->224710 224711 1400ca4bb 224709->224711 224710->224704 224711->224702 224711->224710 224713->224669 224714->224669 224716->224660 224717->224666 224718->224661 224719->224657 224720->224661 224721 1400566f5 224722 140056707 224721->224722 224723 14005672b 224721->224723 224724 140056735 224722->224724 224726 14005670d 224722->224726 224723->224724 224725 14005657e DefWindowProcW 224723->224725 224728 14005673e PostMessageW 224724->224728 224729 14005675a 224724->224729 224730 140056590 224725->224730 224726->224725 224727 140056717 224726->224727 224735 1400a1cd0 159 API calls 224727->224735 224728->224730 224729->224730 224733 140056771 224729->224733 224732 140056724 224732->224730 224736 140056dc0 236 API calls _wcsupr_s_l 224733->224736 224735->224732 224736->224732 224737 140037613 224738 140037620 224737->224738 224739 140037645 224737->224739 224756 14002db10 224738->224756 224769 14003ef50 224739->224769 224744 1400323b1 GetTickCount 224745 140032377 224744->224745 224748 1400323d0 PeekMessageW 224744->224748 224745->224744 224746 14003238a GlobalUnlock 224745->224746 224747 14003239e CloseClipboard 224745->224747 224751 1400324b1 GetTickCount 224745->224751 224752 140032514 224745->224752 224754 1400322d0 240 API calls 224745->224754 224755 140038878 224745->224755 224746->224747 224747->224744 224749 1400323f9 GetTickCount 224748->224749 224750 1400323ef 224748->224750 224749->224745 224750->224749 224751->224745 224752->224745 224752->224755 224803 1400894d0 240 API calls 3 library calls 224752->224803 224754->224745 224757 14002db1f 224756->224757 224760 14002db26 224756->224760 224757->224739 224761 140081130 224757->224761 224759 14002dbe1 224804 140014950 135 API calls 224760->224804 224762 14008113b RemoveDirectoryW 224761->224762 224763 14008114e GetFullPathNameW 224761->224763 224762->224739 224764 14008119b GetFileAttributesW 224763->224764 224765 14008118e 224763->224765 224766 14008120b 224764->224766 224767 1400811ab 224764->224767 224765->224764 224766->224739 224767->224766 224768 1400811af SHFileOperationW 224767->224768 224768->224766 224770 14003f233 224769->224770 224771 14003ef70 224769->224771 224776 14003f256 224770->224776 224777 14003f279 224770->224777 224796 14003f315 _cftof_l 224770->224796 224772 14003efa2 224771->224772 224773 14003ef7f 224771->224773 224779 14003efdf 224772->224779 224780 14003efcd 224772->224780 224805 1400b04d0 164 API calls 3 library calls 224773->224805 224809 1400b04d0 164 API calls 3 library calls 224776->224809 224781 14003f2a3 224777->224781 224782 14003f2b5 224777->224782 224784 14003f018 224779->224784 224787 14003f02e 224779->224787 224798 14003ef9b _cftof_l 224779->224798 224806 140006120 21 API calls 2 library calls 224780->224806 224810 140006120 21 API calls 2 library calls 224781->224810 224782->224784 224788 14003f2d5 224782->224788 224782->224798 224807 1400b0b80 132 API calls _freebuf 224784->224807 224789 14003f087 224787->224789 224787->224798 224799 14003f06a 224787->224799 224790 14003f32e 224788->224790 224795 14003f311 224788->224795 224788->224796 224791 1400a9650 143 API calls 224789->224791 224793 1400a9650 143 API calls 224790->224793 224791->224798 224792 14003f19a 224792->224798 224801 1400c98f4 malloc 132 API calls 224792->224801 224793->224796 224794 14003f43a 224794->224798 224802 1400c98f4 malloc 132 API calls 224794->224802 224795->224794 224795->224796 224811 1400ca390 132 API calls 2 library calls 224795->224811 224796->224798 224812 14003ee80 205 API calls _RunAllParam 224796->224812 224798->224745 224799->224792 224799->224798 224808 1400ca390 132 API calls 2 library calls 224799->224808 224801->224798 224802->224796 224803->224752 224804->224759 224805->224798 224806->224798 224807->224798 224808->224792 224809->224798 224810->224798 224811->224794 224812->224798 224813 140035eb7 224827 1400b1470 224813->224827 224815 1400323b1 GetTickCount 224816 140032377 224815->224816 224819 1400323d0 PeekMessageW 224815->224819 224816->224815 224817 14003238a GlobalUnlock 224816->224817 224818 14003239e CloseClipboard 224816->224818 224822 1400324b1 GetTickCount 224816->224822 224823 140032514 224816->224823 224825 140038878 224816->224825 224826 1400322d0 240 API calls 224816->224826 224817->224818 224818->224815 224820 1400323f9 GetTickCount 224819->224820 224821 1400323ef 224819->224821 224820->224816 224821->224820 224822->224816 224823->224816 224823->224825 224847 1400894d0 240 API calls 3 library calls 224823->224847 224826->224816 224828 1400b14a5 224827->224828 224829 1400b1518 224828->224829 224832 1400b14c8 GetForegroundWindow 224828->224832 224830 1400b1550 224829->224830 224836 1400b1541 224829->224836 224850 1400b1c50 223 API calls _wcsupr_s_l 224830->224850 224832->224829 224834 1400b14d6 224832->224834 224833 1400b1587 224835 1400b154e 224833->224835 224851 1400b1650 180 API calls 224833->224851 224837 1400b14df IsWindowVisible 224834->224837 224838 1400b14f8 IsIconic 224834->224838 224835->224816 224849 1400b1e80 IsWindow IsWindowVisible GetWindowLongW LoadLibraryW GetProcAddress 224836->224849 224837->224829 224841 1400b14ec 224837->224841 224842 1400b1513 224838->224842 224843 1400b1505 ShowWindow 224838->224843 224848 1400b3320 LoadLibraryW GetProcAddress 224841->224848 224842->224835 224843->224842 224844 1400b1549 224844->224833 224844->224835 224846 1400b14f4 224846->224829 224846->224838 224847->224823 224848->224846 224849->224844 224850->224833 224851->224835 224852 14001fdb9 224873 140001820 224852->224873 224854 14001fdeb wcsncpy _cftof_l 224884 14001f680 224854->224884 224857 14001fe79 SetCurrentDirectoryW 224858 14001fe7f 224857->224858 224861 14001feae 224858->224861 224917 140001930 240 API calls 224858->224917 224860 14001ff3d 224919 140004b40 166 API calls 4 library calls 224860->224919 224865 14001ff13 224861->224865 224918 1400a6ea0 190 API calls _cftof_l 224861->224918 224864 14001ff47 224865->224860 224872 14001ff66 224865->224872 224866 14001ff82 224867 140020136 IsWindow 224868 14002014c DestroyWindow 224867->224868 224869 140020160 224867->224869 224868->224869 224890 14000d360 PostQuitMessage 224869->224890 224871 140020168 224872->224866 224872->224867 224874 14000183d 224873->224874 224875 140001885 224874->224875 224880 14000185b 224874->224880 224877 140001899 IsClipboardFormatAvailable 224875->224877 224883 1400018e6 224875->224883 224876 140001871 224876->224854 224878 1400018d8 224877->224878 224879 1400018a8 IsClipboardFormatAvailable 224877->224879 224921 140005f00 151 API calls 224878->224921 224879->224854 224880->224876 224920 140041100 165 API calls 224880->224920 224883->224854 224885 14001f697 224884->224885 224889 14001f778 224884->224889 224886 14001f75b Shell_NotifyIconW 224885->224886 224887 14001f731 LoadImageW 224885->224887 224888 14001f728 224885->224888 224885->224889 224886->224889 224887->224886 224888->224886 224889->224857 224889->224858 224891 14000d396 224890->224891 224892 14000d4f6 224891->224892 224893 14000d3ab 224891->224893 224895 14000d502 UnhookWindowsHookEx 224892->224895 224911 14000d508 224892->224911 224894 14000d3b3 PostThreadMessageW 224893->224894 224896 14000d3de GetTickCount 224894->224896 224897 14000d3ce Sleep 224894->224897 224895->224911 224898 14000d3f0 GetExitCodeThread 224896->224898 224897->224894 224897->224896 224900 14000d425 CloseHandle 224898->224900 224901 14000d40c GetTickCount 224898->224901 224899 14000d5ab 224922 14000c190 132 API calls _freebuf 224900->224922 224903 14000d41b Sleep 224901->224903 224904 14000d43e 224901->224904 224902 14000d546 UnregisterHotKey 224902->224911 224903->224898 224906 14000d466 224904->224906 224907 14000d447 224904->224907 224909 14000d47f 224906->224909 224910 14000d46b CloseHandle 224906->224910 224908 14000d44c CreateMutexW 224907->224908 224907->224909 224908->224909 224912 14000d4a8 224909->224912 224913 14000d488 224909->224913 224910->224909 224911->224899 224911->224902 224914 14000d4c2 224912->224914 224916 14000d4ae CloseHandle 224912->224916 224913->224914 224915 14000d48e CreateMutexW 224913->224915 224914->224892 224915->224914 224916->224914 224917->224861 224918->224865 224919->224864 224920->224876 224921->224883 224922->224904 224923 140001b0c 224924 140001b17 224923->224924 224925 140001b36 GlobalUnlock 224924->224925 224926 140001b4a CloseClipboard 224924->224926 224927 140001b5d 224924->224927 224925->224926 224926->224927 224928 140001ba8 224927->224928 224981 140004590 joyGetPosEx PostMessageW 224927->224981 224929 140001bb8 224928->224929 224930 140001bcc 224928->224930 224982 140004240 227 API calls 2 library calls 224929->224982 224934 140001be8 SetTimer 224930->224934 224969 140001c0c 224930->224969 224933 140001bbd 224933->224930 224934->224969 224935 140001ccd GetTickCount 224935->224969 224936 140001d55 GetMessageW 224936->224935 224937 140001d7a GetTickCount 224936->224937 224937->224969 224938 140001d28 GetTickCount 224938->224969 224974 140001d43 wcsncpy 224938->224974 224940 140002190 GetFocus 224940->224969 224941 140002a33 GetForegroundWindow 224943 140002a45 GetWindowThreadProcessId 224941->224943 224945 140002a5c GetClassNameW 224943->224945 224944 140002563 IsDialogMessageW 224944->224969 224948 140002a8e IsDialogMessageW 224945->224948 224947 1400026da ShowWindow 224947->224969 224948->224969 224949 140002ade SetCurrentDirectoryW 224949->224969 224950 1400021db TranslateAcceleratorW 224950->224969 224954 1400024e6 SendMessageW 224954->224969 224955 140001a40 GetDlgCtrlID GetParent GetDlgCtrlID 224955->224969 224956 1400023d8 GetKeyState 224959 1400023ef GetKeyState 224956->224959 224956->224969 224957 140002502 SendMessageW 224957->224969 224958 1400040a8 224960 14000411d 224958->224960 224966 1400040f9 KillTimer 224958->224966 224959->224969 224961 1400024a4 PostMessageW 224961->224974 224962 1400022bf GetKeyState 224962->224969 224963 140002441 SendMessageW 224963->224969 224964 140002467 SendMessageW 224964->224969 224965 14009db70 261 API calls 224965->224974 224966->224960 224967 1400022e9 GetWindowLongW 224967->224969 224968 14000235a IsWindowEnabled 224968->224969 224969->224935 224969->224936 224969->224938 224969->224940 224969->224941 224969->224944 224969->224947 224969->224949 224969->224950 224969->224954 224969->224955 224969->224956 224969->224957 224969->224961 224969->224962 224969->224963 224969->224964 224969->224967 224969->224968 224970 1400030ee DragFinish 224969->224970 224971 140002378 GetKeyState 224969->224971 224969->224974 224984 1400b3210 GetWindowLongW GetParent GetWindowLongW 224969->224984 224985 14008b2a0 GetWindowLongW GetParent 224969->224985 224986 140004590 joyGetPosEx PostMessageW 224969->224986 224970->224969 224971->224974 224972 140001820 186 API calls 224972->224974 224973 1400031b8 GetTickCount 224973->224974 224974->224958 224974->224965 224974->224969 224974->224972 224974->224973 224983 140004730 232 API calls 3 library calls 224974->224983 224987 140004240 227 API calls 2 library calls 224974->224987 224988 1400041c0 GetTickCount 224974->224988 224989 1400049f0 SetCurrentDirectoryW GetTickCount LoadImageW Shell_NotifyIconW _cftof_l 224974->224989 224976 14000325e GetTickCount 224977 140003289 224976->224977 224977->224935 224990 14000dcc0 193 API calls _wcsupr_s_l 224977->224990 224991 140004b40 166 API calls 4 library calls 224977->224991 224992 1400041c0 GetTickCount 224977->224992 224981->224928 224982->224933 224983->224974 224984->224969 224985->224969 224986->224969 224987->224974 224988->224974 224989->224976 224990->224977 224991->224977 224992->224977 224993 140037509 224994 14002db10 135 API calls 224993->224994 224995 140037516 224994->224995 224996 14003753e 224995->224996 225011 140080e60 224995->225011 224998 14003ef50 222 API calls 224996->224998 225000 140032377 224998->225000 224999 1400323b1 GetTickCount 224999->225000 225003 1400323d0 PeekMessageW 224999->225003 225000->224999 225001 14003238a GlobalUnlock 225000->225001 225002 14003239e CloseClipboard 225000->225002 225006 1400324b1 GetTickCount 225000->225006 225007 140032514 225000->225007 225009 140038878 225000->225009 225010 1400322d0 240 API calls 225000->225010 225001->225002 225002->224999 225004 1400323f9 GetTickCount 225003->225004 225005 1400323ef 225003->225005 225004->225000 225005->225004 225006->225000 225007->225000 225007->225009 225032 1400894d0 240 API calls 3 library calls 225007->225032 225010->225000 225012 140080e9b GetFullPathNameW 225011->225012 225013 140080e8e 225011->225013 225015 140080ef3 GetFullPathNameW 225012->225015 225016 140080ee6 225012->225016 225013->224996 225017 140080f29 225015->225017 225016->225015 225018 140080fff GetFileAttributesW 225017->225018 225019 140080f44 GetFileAttributesW 225017->225019 225020 140081103 225018->225020 225025 140081015 225018->225025 225021 1400810f0 225019->225021 225023 140080f58 225019->225023 225020->225025 225033 140064c20 225020->225033 225021->224996 225023->225021 225026 140080faf 225023->225026 225027 140080ff8 225023->225027 225024 1400810e0 SHFileOperationW 225024->225021 225025->225021 225025->225024 225026->225021 225028 140080e60 8 API calls 225026->225028 225027->225018 225029 140080fd4 225028->225029 225029->225021 225030 140081130 4 API calls 225029->225030 225031 140080ff3 225030->225031 225031->225021 225032->225007 225034 140064c44 225033->225034 225035 140064d3e SetLastError 225033->225035 225034->225035 225036 140064c4e GetFileAttributesW 225034->225036 225037 140064d4b 225035->225037 225038 140064c5b SetLastError 225036->225038 225040 140064c7b _wcsupr_s_l wcsncpy 225036->225040 225037->225025 225038->225025 225039 140064d23 CreateDirectoryW 225039->225025 225040->225037 225040->225039 225041 140038b80 225042 140038b8d 225041->225042 225044 140038bb3 225041->225044 225043 14002db10 135 API calls 225042->225043 225042->225044 225043->225044 225045 140020810 FindResourceW 225046 140020864 SizeofResource 225045->225046 225048 1400208fd 225045->225048 225047 14002087b LoadResource 225046->225047 225046->225048 225047->225048 225049 14002088f LockResource 225047->225049 225049->225048 225050 1400208a2 225049->225050 225051 1400cafb0 143 API calls 225050->225051 225052 1400208ac 225051->225052 225054 1400208b9 225052->225054 225063 14001e4b0 GetCPInfo 225052->225063 225054->225048 225056 1400a9dc0 225054->225056 225057 1400a9deb GetCPInfo 225056->225057 225059 1400a9e00 225056->225059 225057->225059 225058 1400a9eb5 225058->225048 225059->225058 225061 1400a9e37 225059->225061 225064 1400a9b10 225059->225064 225061->225058 225062 1400a9ea7 GetCPInfo 225061->225062 225062->225058 225063->225054 225065 1400a9b29 225064->225065 225067 1400a9b30 225064->225067 225066 1400c98f4 malloc 132 API calls 225065->225066 225066->225067 225067->225061 225068 140056829 225073 140004f00 GetTickCount 225068->225073 225070 14005682e 225071 140056836 PostMessageW 225070->225071 225072 140056590 225070->225072 225073->225070 225074 1400ccbe4 GetStartupInfoW 225075 1400ccc13 225074->225075 225114 1400ce334 HeapCreate 225075->225114 225078 1400ccc7a 225119 1400cdc20 225078->225119 225079 1400ccc66 225235 1400ce090 132 API calls 6 library calls 225079->225235 225080 1400ccc61 225234 1400ce2f0 132 API calls 2 library calls 225080->225234 225085 1400ccc70 225236 1400c9b98 GetModuleHandleW GetProcAddress ExitProcess malloc 225085->225236 225086 1400ccca5 _RTC_Initialize 225135 1400cefe8 GetStartupInfoW 225086->225135 225088 1400ccc8c 225237 1400ce2f0 132 API calls 2 library calls 225088->225237 225089 1400ccc91 225238 1400ce090 132 API calls 6 library calls 225089->225238 225092 1400ccc9b 225239 1400c9b98 GetModuleHandleW GetProcAddress ExitProcess malloc 225092->225239 225095 1400cccbe GetCommandLineW 225148 1400d31a4 GetEnvironmentStringsW 225095->225148 225102 1400cccea 225161 1400d2de4 225102->225161 225103 1400c9ef4 _amsg_exit 132 API calls 225103->225102 225105 1400cccfd 225175 1400c9c7c 225105->225175 225107 1400c9ef4 _amsg_exit 132 API calls 225107->225105 225109 1400ccd07 225110 1400c9ef4 _amsg_exit 132 API calls 225109->225110 225111 1400ccd12 _wwincmdln 225109->225111 225110->225111 225183 140005380 InitializeCriticalSection SetErrorMode 225111->225183 225113 1400ccd38 225115 1400ce35c GetVersion 225114->225115 225116 1400ccc54 225114->225116 225117 1400ce380 225115->225117 225118 1400ce366 HeapSetInformation 225115->225118 225116->225078 225116->225079 225116->225080 225117->225116 225118->225117 225247 1400c9bc8 225119->225247 225121 1400cdc2b 225251 1400ce3c8 225121->225251 225124 1400cdc94 225261 1400cd964 135 API calls _freebuf 225124->225261 225125 1400cdc34 FlsAlloc 225125->225124 225126 1400cdc4c 225125->225126 225255 1400cece4 225126->225255 225130 1400ccc7f 225130->225086 225130->225088 225130->225089 225131 1400cdc63 FlsSetValue 225131->225124 225132 1400cdc76 225131->225132 225260 1400cd98c 132 API calls 3 library calls 225132->225260 225134 1400cdc80 GetCurrentThreadId 225134->225130 225136 1400cece4 __onexitinit 132 API calls 225135->225136 225138 1400cf01e 225136->225138 225137 1400cccb0 225137->225095 225240 1400c9ef4 225137->225240 225138->225137 225138->225138 225140 1400cf1d0 225138->225140 225142 1400cece4 __onexitinit 132 API calls 225138->225142 225147 1400cf145 225138->225147 225139 1400cf1f5 GetStdHandle 225139->225140 225140->225139 225141 1400cf225 GetFileType 225140->225141 225143 1400cf28e SetHandleCount 225140->225143 225144 1400cf24f InitializeCriticalSectionAndSpinCount 225140->225144 225141->225140 225142->225138 225143->225137 225144->225137 225144->225140 225145 1400cf17e InitializeCriticalSectionAndSpinCount 225145->225137 225145->225147 225146 1400cf170 GetFileType 225146->225145 225146->225147 225147->225140 225147->225145 225147->225146 225149 1400d31c8 225148->225149 225150 1400cccd0 225148->225150 225273 1400cec64 132 API calls malloc 225149->225273 225155 1400d30b4 GetModuleFileNameW 225150->225155 225153 1400d31ef _cftof_l 225154 1400d3208 FreeEnvironmentStringsW 225153->225154 225154->225150 225156 1400d30f4 __wsetargv 225155->225156 225157 1400cccdc 225156->225157 225158 1400d314f 225156->225158 225157->225102 225157->225103 225274 1400cec64 132 API calls malloc 225158->225274 225160 1400d3154 __wsetargv 225160->225157 225163 1400d2e17 _amsg_exit 225161->225163 225166 1400cccef 225161->225166 225162 1400cece4 __onexitinit 132 API calls 225164 1400d2e44 _amsg_exit 225162->225164 225163->225162 225164->225166 225167 1400cece4 __onexitinit 132 API calls 225164->225167 225168 1400d2eac 225164->225168 225169 1400d2f01 225164->225169 225172 1400d2eec 225164->225172 225275 1400d05d0 132 API calls 2 library calls 225164->225275 225166->225105 225166->225107 225167->225164 225276 1400ca390 132 API calls 2 library calls 225168->225276 225278 1400ca390 132 API calls 2 library calls 225169->225278 225277 1400cded0 16 API calls _fltout2 225172->225277 225177 1400c9c92 _cinit 225175->225177 225279 1400ce968 225177->225279 225178 1400c9caf _initterm_e 225179 1400ca520 _cinit 142 API calls 225178->225179 225181 1400c9cf5 _cinit 225178->225181 225180 1400c9cd2 225179->225180 225180->225181 225282 1400de260 225180->225282 225181->225109 225300 140063b10 225183->225300 225188 1400c986c 132 API calls 225190 1400053eb 225188->225190 225189 1400054e7 wcsncpy 225195 1400055c3 225189->225195 225196 140005573 225189->225196 225218 1400054eb 225189->225218 225438 1400c986c 132 API calls 2 library calls 225189->225438 225190->225188 225200 1400054c9 225190->225200 225436 1400c9ac4 134 API calls 2 library calls 225190->225436 225437 14001e050 137 API calls 225190->225437 225193 1400055f3 225193->225218 225327 1400a4110 225193->225327 225195->225193 225440 14002e460 170 API calls 4 library calls 225195->225440 225196->225195 225439 1400c986c 132 API calls 2 library calls 225196->225439 225311 140005a50 225200->225311 225202 14000563c 225337 14001ed50 225202->225337 225205 140005782 225207 14000578b FindWindowW 225205->225207 225208 14000582c SystemParametersInfoW 225205->225208 225206 140005711 225206->225208 225210 14000571e FindWindowW 225206->225210 225207->225208 225220 14000573e 225207->225220 225211 140005865 225208->225211 225212 140005847 225208->225212 225209 140005651 _cftof_l 225209->225205 225209->225206 225209->225207 225209->225218 225210->225208 225210->225220 225356 14001efc0 225211->225356 225212->225211 225214 14000584f SystemParametersInfoW 225212->225214 225213 1400057b0 PostMessageW Sleep IsWindow 225216 140005821 Sleep 225213->225216 225222 1400057dd 225213->225222 225214->225211 225216->225208 225217 140005774 225217->225218 225218->225113 225219 140005807 Sleep IsWindow 225219->225216 225219->225222 225220->225213 225220->225217 225221 140005871 _swprintf 225221->225218 225385 1400c9f1c 225221->225385 225222->225218 225222->225219 225225 1400058b5 _swprintf 225404 14000cdf0 225225->225404 225226 1400c98f4 malloc 132 API calls 225226->225225 225231 140005943 225433 140005980 225231->225433 225234->225079 225235->225085 225237->225089 225238->225092 225602 1400ce2f0 132 API calls 2 library calls 225240->225602 225242 1400c9f01 225623 1400ce090 132 API calls 6 library calls 225242->225623 225244 1400c9f08 225603 1400c9d2c 225244->225603 225262 1400cd958 EncodePointer 225247->225262 225249 1400c9bd3 _initp_misc_winsig 225250 1400ce664 EncodePointer 225249->225250 225250->225121 225252 1400ce3eb 225251->225252 225253 1400ce3f1 InitializeCriticalSectionAndSpinCount 225252->225253 225254 1400cdc30 225252->225254 225253->225252 225253->225254 225254->225124 225254->225125 225257 1400ced09 225255->225257 225258 1400cdc5b 225257->225258 225259 1400ced27 Sleep 225257->225259 225263 1400d3e04 225257->225263 225258->225124 225258->225131 225259->225257 225259->225258 225260->225134 225261->225130 225264 1400d3e19 225263->225264 225270 1400d3e36 225263->225270 225265 1400d3e27 225264->225265 225264->225270 225271 1400cdfdc 132 API calls _getptd 225265->225271 225267 1400d3e4e HeapAlloc 225268 1400d3e2c 225267->225268 225267->225270 225268->225257 225270->225267 225270->225268 225272 1400ce394 DecodePointer 225270->225272 225271->225268 225272->225270 225273->225153 225274->225160 225275->225164 225276->225166 225278->225166 225280 1400ce97e EncodePointer 225279->225280 225280->225280 225281 1400ce993 225280->225281 225281->225178 225285 14001e5a0 225282->225285 225284 1400de269 225286 14001e7dd _swprintf 225285->225286 225290 1400a07f0 225286->225290 225288 14001e825 OleInitializeWOW 225288->225284 225289 14001e7f3 225289->225288 225291 1400a0809 225290->225291 225297 1400a0883 225290->225297 225292 1400c98f4 malloc 132 API calls 225291->225292 225291->225297 225293 1400a0841 225292->225293 225294 1400a08fe 225293->225294 225295 1400cafb0 143 API calls 225293->225295 225294->225289 225296 1400a087b 225295->225296 225296->225297 225299 1400ca390 132 API calls 2 library calls 225296->225299 225297->225289 225299->225294 225442 1400d1ba0 225300->225442 225303 140063b36 225304 1400053b5 225303->225304 225444 140079440 143 API calls 2 library calls 225303->225444 225306 1400a9590 225304->225306 225307 1400a95a9 225306->225307 225308 1400a9635 225306->225308 225307->225308 225309 1400a9650 143 API calls 225307->225309 225308->225190 225310 1400a95e2 _cftof_l 225309->225310 225310->225190 225312 140005e54 225311->225312 225324 140005a90 _cftof_l 225311->225324 225313 14002e160 132 API calls 225312->225313 225315 140005e87 225313->225315 225318 140005e4d 225315->225318 225451 14002e460 170 API calls 4 library calls 225315->225451 225317 14002e160 132 API calls 225317->225324 225318->225189 225323 1400a9650 143 API calls 225323->225324 225324->225312 225324->225317 225324->225318 225324->225323 225326 1400c98f4 malloc 132 API calls 225324->225326 225445 1400ca240 159 API calls 3 library calls 225324->225445 225446 14002e460 170 API calls 4 library calls 225324->225446 225447 1400b04d0 164 API calls 3 library calls 225324->225447 225448 140006120 21 API calls 2 library calls 225324->225448 225449 1400b0b80 132 API calls _freebuf 225324->225449 225450 1400ca390 132 API calls 2 library calls 225324->225450 225326->225324 225328 1400a414d _wcsupr_s_l 225327->225328 225329 1400cafb0 143 API calls 225328->225329 225331 1400a41c9 225329->225331 225330 140005628 225330->225218 225333 1400b0850 225330->225333 225331->225330 225452 1400a45d0 189 API calls 2 library calls 225331->225452 225334 1400b0866 225333->225334 225336 1400b08dd 225334->225336 225453 1400ca390 132 API calls 2 library calls 225334->225453 225336->225202 225338 1400d1ba0 _wcsupr_s_l 225337->225338 225339 14001ed5c GetModuleFileNameW 225338->225339 225342 14001ed89 225339->225342 225349 14001eddf 225339->225349 225341 14001ed92 225341->225209 225342->225341 225344 1400a9590 143 API calls 225342->225344 225343 14001ee2f 225345 1400a9650 143 API calls 225343->225345 225346 14001ee63 _cftof_l 225343->225346 225347 14001eda7 225344->225347 225345->225346 225350 1400a9590 143 API calls 225346->225350 225351 14001eee9 225346->225351 225355 14001ef18 _cftof_l 225346->225355 225347->225341 225348 1400a9590 143 API calls 225347->225348 225347->225349 225348->225349 225349->225341 225454 1400ad6b0 225349->225454 225350->225351 225352 1400a9590 143 API calls 225351->225352 225351->225355 225353 14001ef0c 225352->225353 225354 1400a9650 143 API calls 225353->225354 225353->225355 225354->225355 225355->225209 225357 14001f433 225356->225357 225358 14001efde _swprintf 225356->225358 225357->225221 225358->225357 225466 1400ae5e0 225358->225466 225361 1400ae5e0 13 API calls 225362 14001f075 LoadCursorW RegisterClassExW 225361->225362 225363 14001f0d0 RegisterClassExW 225362->225363 225368 14001f0f7 225362->225368 225364 14001f11b GetForegroundWindow 225363->225364 225363->225368 225365 14001f12e GetClassNameW 225364->225365 225373 14001f15d CreateWindowExW 225364->225373 225367 14001f149 225365->225367 225365->225373 225490 1400c986c 132 API calls 2 library calls 225367->225490 225368->225221 225369 14001f1db 225371 14001f221 CreateWindowExW 225369->225371 225372 14001f1e4 GetMenu EnableMenuItem 225369->225372 225371->225368 225376 14001f2b8 9 API calls 225371->225376 225374 14001f21a 225372->225374 225375 14001f20d 225372->225375 225373->225368 225373->225369 225374->225371 225491 14001f530 EnableMenuItem EnableMenuItem EnableMenuItem EnableMenuItem 225375->225491 225378 14001f3e3 LoadAcceleratorsW 225376->225378 225379 14001f3bd ShowWindow SetWindowLongW 225376->225379 225380 14001f405 225378->225380 225381 14001f40e 225378->225381 225379->225378 225380->225368 225383 14001f41f 225380->225383 225486 14001f590 225381->225486 225492 14001f440 PostMessageW SetClipboardViewer ChangeClipboardChain 225383->225492 225386 1400c9f4e 225385->225386 225388 1400c9f66 225385->225388 225493 1400cdfdc 132 API calls _getptd 225386->225493 225388->225386 225391 1400c9f8e 225388->225391 225389 1400c9f53 225494 1400cdf74 17 API calls _invalid_parameter_noinfo 225389->225494 225495 1400ca13c 133 API calls _lock 225391->225495 225393 140005897 225393->225225 225393->225226 225394 1400c9f97 225496 1400cee28 152 API calls 2 library calls 225394->225496 225396 1400c9fa0 225497 1400cedf0 132 API calls _freebuf 225396->225497 225398 1400c9fa8 225399 1400c9fd3 225398->225399 225400 1400c9fb8 225398->225400 225498 1400cec64 132 API calls malloc 225399->225498 225499 1400ca1d4 LeaveCriticalSection 225400->225499 225402 1400c9fdb 225402->225400 225411 14000ce33 _swprintf _wcsupr_s_l 225404->225411 225406 14000d2a4 225500 14000a880 225406->225500 225408 14000cee7 UnregisterHotKey 225408->225411 225409 14000d244 UnregisterHotKey 225415 14000cf6e 225409->225415 225410 14000d2f6 225412 1400058d3 225410->225412 225413 14000d308 SetTimer 225410->225413 225411->225408 225411->225415 225555 140006830 132 API calls 225411->225555 225417 14002e160 225412->225417 225413->225412 225414 14000d210 RegisterHotKey 225414->225415 225415->225406 225415->225409 225415->225414 225556 1400c986c 132 API calls 2 library calls 225415->225556 225419 14002e195 wcsncpy 225417->225419 225432 140005911 225417->225432 225422 14002e269 225419->225422 225419->225432 225561 1400c986c 132 API calls 2 library calls 225419->225561 225421 14002e2e4 225423 14002e334 225421->225423 225424 14002e370 225421->225424 225421->225432 225422->225421 225422->225432 225562 1400c986c 132 API calls 2 library calls 225422->225562 225425 14002e160 132 API calls 225423->225425 225427 14002e38e 225424->225427 225431 14002e3b9 225424->225431 225425->225432 225426 14002e3ee 225430 14002e160 132 API calls 225426->225430 225426->225432 225428 14002e160 132 API calls 225427->225428 225428->225432 225430->225432 225431->225426 225431->225432 225563 1400c986c 132 API calls 2 library calls 225431->225563 225432->225231 225441 14002e460 170 API calls 4 library calls 225432->225441 225564 14001f7a0 225433->225564 225435 14000598c 225435->225218 225436->225190 225437->225190 225438->225189 225439->225196 225440->225193 225441->225231 225443 140063b1c GetCurrentDirectoryW 225442->225443 225443->225303 225444->225304 225445->225324 225446->225324 225447->225324 225448->225324 225449->225324 225450->225324 225451->225318 225452->225330 225453->225336 225455 1400ad6c0 _wcsupr_s_l 225454->225455 225457 1400ad6dc _cftof_l 225455->225457 225458 1400ad4a0 225455->225458 225457->225343 225460 1400ad4c3 _cftof_l 225458->225460 225459 1400ad61b 225461 1400ad621 FindFirstFileW 225459->225461 225465 1400ad51a _cftof_l 225459->225465 225460->225459 225462 1400ad5a0 FindFirstFileW 225460->225462 225460->225465 225463 1400ad639 FindClose 225461->225463 225461->225465 225464 1400ad5be FindClose 225462->225464 225462->225465 225463->225465 225464->225460 225464->225465 225465->225457 225467 1400ae60d LoadLibraryExW 225466->225467 225468 1400ae61e 225466->225468 225467->225468 225469 1400ae7d1 225468->225469 225470 1400ae64e EnumResourceNamesW 225468->225470 225471 1400ae642 225468->225471 225472 1400ae802 ExtractIconW 225469->225472 225473 14001f04c GetSystemMetrics 225469->225473 225470->225471 225474 1400ae68f FindResourceW 225471->225474 225475 1400ae7b7 225471->225475 225472->225473 225473->225361 225474->225475 225476 1400ae6a7 LoadResource 225474->225476 225475->225469 225478 1400ae7db FreeLibrary 225475->225478 225476->225475 225477 1400ae6bc LockResource 225476->225477 225477->225475 225479 1400ae6d1 225477->225479 225478->225469 225480 1400ae6dc GetSystemMetrics 225479->225480 225481 1400ae6e7 225479->225481 225480->225481 225481->225475 225482 1400ae749 FindResourceW 225481->225482 225482->225475 225483 1400ae763 LoadResource 225482->225483 225483->225475 225484 1400ae774 LockResource 225483->225484 225484->225475 225485 1400ae785 SizeofResource CreateIconFromResourceEx 225484->225485 225485->225475 225487 14001f5bb _swprintf wcsncpy 225486->225487 225488 14001f646 Shell_NotifyIconW 225487->225488 225489 14001f662 225488->225489 225489->225380 225490->225373 225492->225368 225493->225389 225494->225393 225495->225394 225496->225396 225497->225398 225498->225402 225501 14000a8b7 225500->225501 225522 14000aa48 225500->225522 225502 14000a8e3 225501->225502 225503 14000bb10 225501->225503 225504 14000a8f0 PostThreadMessageW 225502->225504 225503->225410 225505 14000a91b GetTickCount 225504->225505 225506 14000a90b Sleep 225504->225506 225507 14000a930 GetExitCodeThread 225505->225507 225506->225504 225506->225505 225508 14000a952 GetTickCount 225507->225508 225509 14000a96b CloseHandle 225507->225509 225510 14000a961 Sleep 225508->225510 225511 14000a984 225508->225511 225557 14000c190 132 API calls _freebuf 225509->225557 225510->225507 225513 14000a9ac 225511->225513 225514 14000a98d 225511->225514 225516 14000a9c5 225513->225516 225517 14000a9b1 CloseHandle 225513->225517 225515 14000a992 CreateMutexW 225514->225515 225514->225516 225515->225516 225518 14000a9ee 225516->225518 225519 14000a9ce 225516->225519 225517->225516 225521 14000a9f4 CloseHandle 225518->225521 225524 14000aa08 225518->225524 225520 14000a9d4 CreateMutexW 225519->225520 225519->225524 225520->225524 225521->225524 225523 1400c98f4 malloc 132 API calls 225522->225523 225539 14000aad2 _swprintf 225522->225539 225523->225539 225524->225410 225524->225503 225526 14000b82e 225527 14000b836 CreateThread 225526->225527 225528 14000b87c 225526->225528 225529 14000b86e SetThreadPriority 225527->225529 225538 14000b90d 225527->225538 225530 14000b883 PostThreadMessageW 225528->225530 225529->225528 225531 14000b8ae GetTickCount 225530->225531 225532 14000b89e Sleep 225530->225532 225542 14000b8c0 225531->225542 225532->225530 225532->225531 225533 14000b8c9 PeekMessageW 225536 14000b9b0 GetTickCount 225533->225536 225533->225542 225534 14000b98e GetExitCodeThread 225535 14000b9d0 CloseHandle 225534->225535 225534->225536 225551 14000b9f0 225535->225551 225540 14000b9c3 Sleep 225536->225540 225541 14000ba55 225536->225541 225537 14000b03b 225537->225503 225537->225526 225538->225503 225559 1400ca390 132 API calls 2 library calls 225538->225559 225539->225537 225558 140006830 132 API calls 225539->225558 225540->225542 225544 14000ba85 225541->225544 225545 14000ba66 225541->225545 225542->225533 225542->225534 225542->225541 225547 14000ba9e 225544->225547 225548 14000ba8a CloseHandle 225544->225548 225546 14000ba6b CreateMutexW 225545->225546 225545->225547 225546->225547 225549 14000bac8 225547->225549 225550 14000baa8 225547->225550 225548->225547 225549->225524 225553 14000bace CloseHandle 225549->225553 225550->225524 225552 14000baae CreateMutexW 225550->225552 225551->225541 225560 1400ca390 132 API calls 2 library calls 225551->225560 225552->225524 225553->225524 225555->225411 225556->225415 225557->225511 225558->225539 225559->225524 225560->225541 225561->225419 225562->225422 225563->225431 225565 1400c98f4 malloc 132 API calls 225564->225565 225566 14001f7be _cftof_l 225565->225566 225567 14001f7cd 225566->225567 225568 14001f7f7 SetTimer 225566->225568 225567->225435 225569 14001f837 GetTickCount 225568->225569 225577 14001f829 225568->225577 225570 14001f892 GetTickCount 225569->225570 225571 14001f86b SetTimer 225569->225571 225573 1400322d0 240 API calls 225570->225573 225571->225570 225572 14001f950 _cftof_l 225580 14001fa2c 225572->225580 225581 14001fa0b 225572->225581 225574 14001f8cc 225573->225574 225575 14001f8de KillTimer 225574->225575 225574->225577 225575->225577 225576 14001f944 225597 1400ca388 132 API calls 2 library calls 225576->225597 225577->225572 225577->225576 225596 1400ca390 132 API calls 2 library calls 225577->225596 225583 14001fa6c 225580->225583 225584 14001fa5c 225580->225584 225598 1400b04d0 164 API calls 3 library calls 225581->225598 225586 14001faa3 225583->225586 225588 14001fab7 225583->225588 225594 14001fa27 _cftof_l 225583->225594 225599 140006120 21 API calls 2 library calls 225584->225599 225600 1400b0b80 132 API calls _freebuf 225586->225600 225589 14001fb16 225588->225589 225591 14001faf9 225588->225591 225588->225594 225592 1400a9650 143 API calls 225589->225592 225590 14001fc21 225590->225594 225595 1400c98f4 malloc 132 API calls 225590->225595 225591->225590 225591->225594 225601 1400ca390 132 API calls 2 library calls 225591->225601 225592->225594 225594->225435 225595->225594 225596->225576 225597->225572 225598->225594 225599->225594 225600->225594 225601->225590 225602->225242 225624 1400ce5d4 225603->225624 225605 1400c9e42 _amsg_exit 225608 1400c9e78 225605->225608 225611 1400ce4d4 _freefls LeaveCriticalSection 225605->225611 225606 1400c9d5a 225606->225605 225607 1400c9d81 DecodePointer 225606->225607 225607->225605 225610 1400c9d9f DecodePointer 225607->225610 225609 1400ce4d4 _freefls LeaveCriticalSection 225608->225609 225614 1400c9ea3 225608->225614 225612 1400c9e91 225609->225612 225613 1400c9dc4 225610->225613 225611->225608 225615 1400c9b5c malloc GetModuleHandleW GetProcAddress 225612->225615 225613->225605 225617 1400cd958 _amsg_exit EncodePointer 225613->225617 225618 1400c9de3 DecodePointer 225613->225618 225616 1400c9e99 ExitProcess 225615->225616 225617->225613 225619 1400cd958 _amsg_exit EncodePointer 225618->225619 225620 1400c9df4 225619->225620 225622 14001e850 126 API calls 225620->225622 225621 1400c9df9 DecodePointer DecodePointer 225621->225613 225622->225621 225623->225244 225625 1400ce5f2 225624->225625 225626 1400ce603 EnterCriticalSection 225624->225626 225630 1400ce4ec 132 API calls 7 library calls 225625->225630 225628 1400ce5f7 225628->225626 225629 1400c9ef4 _amsg_exit 131 API calls 225628->225629 225629->225626 225630->225628

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 14001e850-14001e89d 1 14001e8a3-14001e8ab 0->1 2 14001e89f 0->2 3 14001e8b1 1->3 4 14001e9f7-14001e9fe 1->4 2->1 5 14001e8b3-14001e8cc PostThreadMessageW 3->5 6 14001ea12-14001ea1c 4->6 7 14001ea00-14001ea0c Shell_NotifyIconW 4->7 8 14001e8ce-14001e8db Sleep 5->8 9 14001e8dd-14001e8e8 GetTickCount 5->9 10 14001ea20-14001ea26 6->10 7->6 8->5 8->9 13 14001e8f0-14001e910 GetExitCodeThread 9->13 11 14001ea28-14001ea30 IsWindow 10->11 12 14001ea3b-14001ea42 10->12 11->12 14 14001ea32-14001ea35 DestroyWindow 11->14 15 14001ea44 DeleteObject 12->15 16 14001ea4a-14001ea51 12->16 17 14001e912-14001e91f GetTickCount 13->17 18 14001e92b-14001e93f CloseHandle call 14000c190 13->18 14->12 15->16 19 14001ea53 DeleteObject 16->19 20 14001ea59-14001ea60 16->20 21 14001e921-14001e929 Sleep 17->21 22 14001e944-14001e94b 17->22 18->22 19->20 24 14001ea62 DeleteObject 20->24 25 14001ea68-14001ea6f 20->25 21->13 26 14001e96c-14001e96f 22->26 27 14001e94d-14001e950 22->27 24->25 25->10 31 14001ea71 25->31 29 14001e985-14001e98c 26->29 30 14001e971-14001e97e CloseHandle 26->30 28 14001e952-14001e96a CreateMutexW 27->28 27->29 28->29 32 14001e9ae-14001e9b2 29->32 33 14001e98e-14001e992 29->33 30->29 34 14001ea78-14001ea7e 31->34 36 14001e9c8-14001e9cb 32->36 37 14001e9b4-14001e9c1 CloseHandle 32->37 35 14001e994-14001e9ac CreateMutexW 33->35 33->36 38 14001ea93-14001ea9a 34->38 39 14001ea80-14001ea83 34->39 35->36 36->4 40 14001e9cd-14001e9f0 call 1400b2f10 36->40 37->36 43 14001ea9c-14001eaa4 IsWindow 38->43 44 14001eab0-14001eab7 38->44 41 14001ea85-14001ea8b DeleteObject 39->41 42 14001ea8d DestroyIcon 39->42 40->4 41->38 42->38 43->44 45 14001eaa6-14001eaaa DestroyWindow 43->45 46 14001eab9 DeleteObject 44->46 47 14001eabf-14001eac6 44->47 45->44 46->47 49 14001eac8 DeleteObject 47->49 50 14001eace-14001ead5 47->50 49->50 52 14001ead7 DeleteObject 50->52 53 14001eadd-14001eae4 50->53 52->53 53->34 54 14001eae6-14001eaee 53->54 55 14001eb0d-14001eb15 54->55 56 14001eaf0-14001eb0b call 14008e7e0 54->56 58 14001eb17-14001eb1a 55->58 59 14001eb4d-14001eb57 55->59 56->55 63 14001eb20-14001eb32 58->63 60 14001eb59-14001eb66 DestroyIcon * 2 59->60 61 14001eb6c-14001eb76 59->61 60->61 64 14001eb94-14001eb9b 61->64 65 14001eb78 61->65 66 14001eb34-14001eb3a DeleteObject 63->66 67 14001eb40-14001eb4b 63->67 69 14001eba0-14001eba6 64->69 68 14001eb80-14001eb92 call 1400a0920 65->68 66->67 67->59 67->63 68->64 71 14001eba8-14001ebb0 IsWindow 69->71 72 14001ebbb-14001ebc2 69->72 71->72 74 14001ebb2-14001ebb5 DestroyWindow 71->74 72->69 75 14001ebc4-14001ebce 72->75 74->72 76 14001ebd6-14001ebde 75->76 77 14001ebd0 DeleteObject 75->77 78 14001ebe9-14001ebf0 76->78 79 14001ebe0-14001ebe7 76->79 77->76 80 14001ec2e-14001ec35 78->80 81 14001ebf2-14001ebfc 78->81 79->78 79->80 84 14001ec37-14001ec58 mciSendStringW 80->84 85 14001ec6f-14001ec9b DeleteCriticalSection OleUninitialize 80->85 82 14001ec13-14001ec21 ChangeClipboardChain 81->82 83 14001ebfe-14001ec06 81->83 87 14001ec27 82->87 83->82 86 14001ec08-14001ec11 83->86 84->85 88 14001ec5a-14001ec69 mciSendStringW 84->88 89 14001ecbe-14001eccf 85->89 90 14001ec9d-14001eca5 85->90 86->87 87->80 88->85 91 14001ecf2-14001ed03 89->91 92 14001ecd1-14001ecd9 89->92 90->89 93 14001eca7-14001ecae 90->93 96 14001ed25-14001ed40 91->96 97 14001ed05-14001ed0d 91->97 92->91 95 14001ecdb-14001ece2 92->95 98 14001ecb5-14001ecbd call 1400ca388 93->98 99 14001ecb0 call 1400ca390 93->99 102 14001ece4 call 1400ca390 95->102 103 14001ece9-14001ecf1 call 1400ca388 95->103 97->96 104 14001ed0f-14001ed16 97->104 98->89 99->98 102->103 103->91 108 14001ed18 call 1400ca390 104->108 109 14001ed1d-14001ed20 call 1400ca388 104->109 108->109 109->96
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Delete$Object$DestroyWindow$Icon$CloseHandle$CountCreateMutexSendSleepStringThreadTick$ChainChangeClipboardCodeCriticalExitMessageNotifyPostSectionShell_Uninitialize
      • String ID: 2$AHK Keybd$AHK Mouse$Warning: The keyboard and/or mouse hook could not be activated; some parts of the script will not function.$close AHK_PlayMe$status AHK_PlayMe mode
      • API String ID: 2336381626-2823248856
      • Opcode ID: bbeb3754e851e32e3d7230555740757d0eb2e19385b80c8ce8fadd64d2fc7919
      • Instruction ID: ae6d289a8e4092d19f78b740bdc86684a3bd6d3c5eeb3f2221ec3056315eb0d5
      • Opcode Fuzzy Hash: bbeb3754e851e32e3d7230555740757d0eb2e19385b80c8ce8fadd64d2fc7919
      • Instruction Fuzzy Hash: C6E10835201A8086FB6B9F63E8547ED23A1BB8CFD4F488525EB1A4B6B4CF39C446C351
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 113 140055e40-140055e6b 114 140055e6d-140055e83 RegisterWindowMessageW 113->114 115 140055e89-140055e9a 113->115 114->115 116 140055eec-140055ef7 115->116 117 140055e9c-140055ea3 115->117 120 140055eff-140055f16 116->120 121 140055ef9-140055efc 116->121 118 140055ea5-140055eac 117->118 119 140055eae-140055eb5 117->119 118->116 118->119 119->116 122 140055eb7-140055ed9 call 140004610 119->122 123 14005607a-140056081 120->123 124 140055f1c 120->124 121->120 142 140055ee5 122->142 143 140055edb-140055ee0 122->143 126 140056087 123->126 127 14005660e-140056615 123->127 128 140055f22-140055f2a 124->128 129 14005605d-14005606d call 140056a50 124->129 132 1400565c3-1400565cd 126->132 133 14005608d-140056094 126->133 134 1400566c9-1400566d4 127->134 135 14005661b 127->135 136 140056535-14005653c 128->136 137 140055f30-140055f46 128->137 148 14005657e-14005658a DefWindowProcW 129->148 152 140056073-140056075 129->152 140 1400565cf-1400565d8 132->140 141 1400565da-1400565dd 132->141 144 14005609a 133->144 145 14005651b-140056522 133->145 134->136 139 1400566da-1400566f0 134->139 146 140056658-14005665f 135->146 147 14005661d-140056624 135->147 136->148 149 14005653e-140056545 136->149 137->129 158 140056590-140056598 140->158 159 140056651-140056653 141->159 160 1400565df-14005660c SendMessageTimeoutW 141->160 142->116 161 1400565a0-1400565b9 143->161 153 1400560a0-1400560a8 144->153 154 1400564da-14005650d GetMenu CheckMenuItem 144->154 155 140056528-14005652f 145->155 156 1400565ba-1400565c1 145->156 150 140056661-140056668 146->150 151 14005666a-140056687 PostMessageW 146->151 147->136 162 14005662a-140056642 PostMessageW call 140004f00 147->162 148->158 149->148 157 140056547-140056558 Shell_NotifyIconW 149->157 150->151 163 14005668d-140056697 150->163 151->163 152->158 164 1400564a5-1400564ac 153->164 165 1400560ae-1400560b0 153->165 154->148 166 14005650f-140056519 154->166 155->136 155->146 156->148 157->148 167 14005655a-140056577 Shell_NotifyIconW 157->167 158->161 159->158 160->158 162->159 178 140056644-140056649 162->178 163->159 169 140056699-1400566c4 SendMessageTimeoutW 163->169 170 1400564ae-1400564b5 164->170 171 1400564bb-1400564c5 164->171 172 1400560b6-1400560b9 165->172 173 14005648a-14005648d 165->173 166->148 167->148 169->158 170->148 170->171 171->148 176 1400564cb 171->176 172->136 177 1400560bf-1400560c3 172->177 173->148 175 140056493-14005649a 173->175 175->159 179 1400564a0 175->179 180 1400564cd-1400564d5 ShowWindow 176->180 181 140056126-14005612d 177->181 182 1400560c5-1400560cf 177->182 178->159 183 14005664c call 140001ac0 178->183 179->178 180->158 181->148 186 140056133-14005613a 181->186 184 1400560d1-1400560d7 182->184 185 14005610e-140056115 182->185 183->159 184->180 187 1400560dd-140056109 MoveWindow 184->187 185->148 188 14005611b-14005611f 185->188 186->148 189 140056140-14005614a 186->189 187->158 188->189 190 140056121 188->190 191 140056151-140056154 189->191 190->148 192 140056156-14005615f 191->192 193 140056161-140056169 191->193 192->191 192->193 194 1400561a2 193->194 195 14005616b-14005617c 193->195 197 1400561a9-1400561b7 194->197 196 140056180-140056183 195->196 198 140056185-14005618e 196->198 199 140056190-140056193 196->199 200 1400561bd-1400561c1 197->200 201 14005639c-1400563a8 197->201 198->196 198->199 199->148 206 140056199-1400561a0 199->206 202 140056235-14005623c 200->202 203 1400561c3-1400561ca 200->203 204 1400563b3-1400563d5 GetClientRect 201->204 205 1400563aa-1400563ad 201->205 208 140056368-14005636c 202->208 209 140056242-140056247 202->209 203->148 207 1400561d0-1400561d7 203->207 210 1400563d7-1400563dd 204->210 211 1400563df 204->211 205->159 205->204 206->197 212 1400561d9-1400561e0 207->212 213 1400561eb-1400561ee 207->213 208->148 216 140056372-140056397 GetClipBox FillRect 208->216 214 140056251 209->214 215 140056249-14005624f 209->215 217 1400563e2-1400563fe 210->217 211->217 212->148 218 1400561e6-1400561e9 212->218 219 1400561fb-14005620f SetBkColor 213->219 220 140056254-140056262 214->220 215->220 216->158 221 140056444-140056485 MoveWindow InvalidateRect 217->221 222 140056400-140056407 217->222 218->213 223 1400561f0-1400561f5 GetSysColor 218->223 224 140056211-140056214 SetTextColor 219->224 225 14005621a-140056221 219->225 226 1400562c5-1400562eb DrawIconEx 220->226 227 140056264-1400562c3 CreateCompatibleDC SelectObject BitBlt SelectObject DeleteDC 220->227 221->158 228 14005641e-140056425 222->228 229 140056409-140056418 MoveWindow 222->229 223->219 224->225 225->158 230 140056227-140056230 GetSysColorBrush 225->230 231 1400562f1-14005633b ExcludeClipRect CreateRectRgn GetClipRgn 226->231 227->231 232 140056427-14005643c MoveWindow 228->232 233 140056442 228->233 229->228 230->158 234 140056346-140056363 FillRgn DeleteObject 231->234 235 14005633d-140056340 GetSysColorBrush 231->235 232->233 233->221 234->158 235->234
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: MessageRegisterWindow
      • String ID: $TaskbarCreated
      • API String ID: 1814269913-2756569325
      • Opcode ID: d34deb9f11511e3579c3ba2b46536db34589608847754f20ec7e2ea4100bb72b
      • Instruction ID: 74c41e2f6980512f5fecd5883ed90d90f71f0abb0ccde258fd024e1a2d041a81
      • Opcode Fuzzy Hash: d34deb9f11511e3579c3ba2b46536db34589608847754f20ec7e2ea4100bb72b
      • Instruction Fuzzy Hash: 33228D75204A408BEB6ACF27E4547EA77A1F74CBC4F444125EB8A47BB8EB39D545CB00
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Resource$Window$Load$Create$ClassShow$FindLockMenuMessageMetricsRegisterSendSystem$AcceleratorsCapsCursorDeviceEnableEnumFontForegroundFromIconItemLibraryLongNameNamesReleaseSizeof
      • String ID: AutoHotkey$AutoHotkey2$Consolas$CreateWindow$Lucida Console$P$RegClass$Shell_TrayWnd$edit
      • API String ID: 221421807-2636979444
      • Opcode ID: 55dd66b0750d7da4e52f0770929b0fbf3d6793008537eaaff2a4b621cb77d824
      • Instruction ID: 9b0e2f6c69485fb8ec57ce70399adead094d9dac222e6f592f54d16756aeffa0
      • Opcode Fuzzy Hash: 55dd66b0750d7da4e52f0770929b0fbf3d6793008537eaaff2a4b621cb77d824
      • Instruction Fuzzy Hash: 9BC15935208B8082E7668B22F854BEA73A5FB8DBD0F544119EB894BBB4DF3DC555DB00
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessageTimerUnlock
      • String ID: #32770
      • API String ID: 1115112458-463685578
      • Opcode ID: 142b92b5ad2cfdf1b46add384a66016d64d4d1895153f3acb373f4d837314675
      • Instruction ID: d979086e244771f1058c6eeda0f323f2161955c8e31e2b1f95c64bbc6df12670
      • Opcode Fuzzy Hash: 142b92b5ad2cfdf1b46add384a66016d64d4d1895153f3acb373f4d837314675
      • Instruction Fuzzy Hash: C1526EB260568486FB67CB27B8547E937A1F78DBD8F184016EB8A077B5DB38C981C710
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 557 140005380-1400053c6 InitializeCriticalSection SetErrorMode call 140063b10 560 1400053d2-140005406 call 1400a9590 557->560 561 1400053c8-1400053ce 557->561 564 1400054d1-1400054e9 call 140005a50 560->564 565 14000540c 560->565 561->560 571 1400054f5-140005532 call 1400cca64 564->571 572 1400054eb-1400054f0 564->572 566 140005411-14000542d call 1400c986c 565->566 573 140005433-140005444 call 1400c986c 566->573 574 1400054b0 566->574 580 140005573-140005585 571->580 581 140005534 571->581 575 14000595d-14000597b 572->575 573->574 585 140005446-140005457 call 1400c986c 573->585 579 1400054b3-1400054c3 574->579 579->566 583 1400054c9 579->583 586 1400055c3 580->586 587 140005587-14000558b 580->587 584 140005540-14000555f call 1400c986c 581->584 583->564 596 140005561-140005564 584->596 597 140005566 584->597 599 1400054a7-1400054ae 585->599 600 140005459-14000546a call 1400c986c 585->600 589 1400055c5-1400055f3 call 14002e460 586->589 587->586 591 14000558d 587->591 605 1400055f6-140005609 589->605 595 140005590-1400055af call 1400c986c 591->595 611 1400055b1-1400055b4 595->611 612 1400055b6 595->612 602 14000556f-140005571 596->602 603 140005691-140005698 597->603 604 14000556c 597->604 599->579 600->599 616 14000546c-140005483 call 1400c9ac4 600->616 602->580 602->584 603->605 609 14000569e-1400056ad 603->609 604->602 605->572 608 14000560f-14000562b call 1400a4110 605->608 608->572 619 140005631-140005654 call 1400b0850 call 1400051f0 call 14001ed50 608->619 609->589 613 1400055bf-1400055c1 611->613 612->603 614 1400055bc 612->614 613->586 613->595 614->613 621 140005485-14000548e 616->621 622 1400054cb 616->622 619->572 633 14000565a-140005682 call 1400ca550 call 140020170 619->633 624 140005493-1400054a5 call 14001e050 621->624 625 140005490 621->625 622->564 624->579 625->624 633->572 638 140005688-14000568a 633->638 639 1400056b2-1400056c6 638->639 640 14000568c 638->640 641 140005707-14000570a 639->641 642 1400056c8-1400056d2 639->642 640->575 643 140005782-140005785 641->643 644 14000570c-14000570f 641->644 645 1400056d4-1400056da 642->645 646 1400056fb-140005705 642->646 648 14000578b-1400057a5 FindWindowW 643->648 649 14000582c-140005845 SystemParametersInfoW 643->649 647 140005711-140005718 644->647 644->648 645->646 650 1400056dc-1400056e3 645->650 646->644 647->649 651 14000571e-140005738 FindWindowW 647->651 648->649 654 1400057ab 648->654 652 140005865-140005874 call 14001efc0 649->652 653 140005847-14000584d 649->653 650->646 655 1400056e5-1400056ec 650->655 651->649 658 14000573e-140005747 651->658 670 140005876-14000587b 652->670 671 140005880-1400058a1 call 1400ca02c call 1400c9f1c 652->671 653->652 659 14000584f-14000585f SystemParametersInfoW 653->659 656 1400057b0-1400057db PostMessageW Sleep IsWindow 654->656 655->646 657 1400056ee-1400056f5 655->657 661 140005821-140005826 Sleep 656->661 662 1400057dd 656->662 657->643 657->646 663 140005774-140005776 658->663 664 140005749-14000574c 658->664 659->652 661->649 666 1400057e0-1400057e3 662->666 669 140005955 663->669 667 14000577b-140005780 664->667 668 14000574e-140005772 call 1400b2f10 664->668 673 1400057e5-140005803 call 1400b2f10 666->673 674 140005807-14000581f Sleep IsWindow 666->674 667->656 668->663 668->667 669->575 670->669 683 1400058a3-1400058bf call 1400c98f4 671->683 684 1400058ce-140005914 call 14000cdf0 call 14002e160 671->684 673->670 682 140005805 673->682 674->661 674->666 682->674 683->684 689 1400058c1-1400058c9 call 1400d0130 683->689 693 140005916-140005946 call 14002e460 684->693 694 140005948-14000594b call 140005340 684->694 689->684 693->694 698 140005950 call 140005980 693->698 694->698 698->669
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Window_errno$Sleep$FindInfoParametersSystem_invalid_parameter_noinfo$AllocateCriticalCurrentDirectoryErrorHeapInitializeMessageModePostSection_callnewhmallocwcsncpy
      • String ID: /ErrorStdOut$/force$/restart$=$A_Args$An older instance of this script is already running. Replace it with this instance?Note: To avoid this message, see #SingleInsta$AutoHotkey$Clipboard$Could not close the previous instance of this script. Keep waiting?$d
      • API String ID: 1954826656-1873627173
      • Opcode ID: ae650afcf663256c217d6f629cef85cc4f32e63f2197e6f8d92b92c3da241540
      • Instruction ID: dd8eededd0c10b5e13e05dc8cc649975117e2db60f24090232c11ca2ab3db3f7
      • Opcode Fuzzy Hash: ae650afcf663256c217d6f629cef85cc4f32e63f2197e6f8d92b92c3da241540
      • Instruction Fuzzy Hash: BEF1AD71204A4185FA67EB27F8587EA23A1FB4EBC6F484125FB094B2B5EF39C845C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Windowwcsncpy$Message$ClassCurrentDialogDirectoryDragFinishForegroundNameProcessShowThread
      • String ID: #32770
      • API String ID: 1745663375-463685578
      • Opcode ID: f5949c54027de412605dc906a45027951cb8263133aa0641fc060d3ba85630f2
      • Instruction ID: 9adcb7608e3b5912f6cae034f1bf1df785d91989489aa1dfc37f7aeb7c979a48
      • Opcode Fuzzy Hash: f5949c54027de412605dc906a45027951cb8263133aa0641fc060d3ba85630f2
      • Instruction Fuzzy Hash: 85229FB2604A908AFB67CF27A8543E937A5F74DBD8F144111EB9A47BB8DB34C881C710
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1003 14000d360-14000d394 PostQuitMessage 1004 14000d396 1003->1004 1005 14000d39a-14000d3a5 1003->1005 1004->1005 1006 14000d4f6-14000d500 1005->1006 1007 14000d3ab-14000d3b0 1005->1007 1009 14000d502 UnhookWindowsHookEx 1006->1009 1010 14000d508-14000d516 1006->1010 1008 14000d3b3-14000d3cc PostThreadMessageW 1007->1008 1011 14000d3de-14000d3e9 GetTickCount 1008->1011 1012 14000d3ce-14000d3dc Sleep 1008->1012 1009->1010 1013 14000d5ab-14000d5ad call 1400c9ebc 1010->1013 1014 14000d51c-14000d52d 1010->1014 1017 14000d3f0-14000d40a GetExitCodeThread 1011->1017 1012->1008 1012->1011 1020 14000d5b2-14000d5b7 1013->1020 1015 14000d530-14000d53e 1014->1015 1018 14000d59d-14000d5a9 1015->1018 1019 14000d540-14000d544 1015->1019 1021 14000d425-14000d439 CloseHandle call 14000c190 1017->1021 1022 14000d40c-14000d419 GetTickCount 1017->1022 1018->1013 1018->1015 1023 14000d574-14000d577 1019->1023 1024 14000d546-14000d571 UnregisterHotKey 1019->1024 1026 14000d43e-14000d445 1021->1026 1025 14000d41b-14000d423 Sleep 1022->1025 1022->1026 1023->1018 1028 14000d579-14000d57c 1023->1028 1024->1023 1025->1017 1029 14000d466-14000d469 1026->1029 1030 14000d447-14000d44a 1026->1030 1028->1018 1034 14000d57e-14000d599 1028->1034 1032 14000d47f-14000d486 1029->1032 1033 14000d46b-14000d478 CloseHandle 1029->1033 1031 14000d44c-14000d464 CreateMutexW 1030->1031 1030->1032 1031->1032 1035 14000d4a8-14000d4ac 1032->1035 1036 14000d488-14000d48c 1032->1036 1033->1032 1034->1018 1037 14000d4c2-14000d4ca 1035->1037 1039 14000d4ae-14000d4bb CloseHandle 1035->1039 1036->1037 1038 14000d48e-14000d4a6 CreateMutexW 1036->1038 1037->1006 1040 14000d4cc-14000d4f0 call 1400b2f10 1037->1040 1038->1037 1039->1037 1040->1006
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CloseHandle$CountCreateMessageMutexPostSleepThreadTick$CodeExitHookQuitUnhookUnregisterWindows
      • String ID: AHK Keybd$AHK Mouse$Warning: The keyboard and/or mouse hook could not be activated; some parts of the script will not function.
      • API String ID: 880717225-3816831916
      • Opcode ID: 691ffeff69625a426eb0d226c6c55468b2f968fd44beca9c6dc36bbd7b36932a
      • Instruction ID: ee0c93e1d367b6bb37e8967a00d4704616e743b3a7cb3ba9a70038f16dc6b00d
      • Opcode Fuzzy Hash: 691ffeff69625a426eb0d226c6c55468b2f968fd44beca9c6dc36bbd7b36932a
      • Instruction Fuzzy Hash: 8F6115B5201A4486FB5ADF23B8543E973A1FB4CBD5F448126EF4A4B674DF78C845C260
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1043 1400ae5e0-1400ae60b 1044 1400ae60d-1400ae61c LoadLibraryExW 1043->1044 1045 1400ae61e 1043->1045 1046 1400ae625-1400ae628 1044->1046 1045->1046 1047 1400ae7ee-1400ae7f1 1046->1047 1048 1400ae62e-1400ae640 1046->1048 1051 1400ae7fa-1400ae7fe 1047->1051 1052 1400ae7f3-1400ae7f8 1047->1052 1049 1400ae64e-1400ae681 EnumResourceNamesW 1048->1049 1050 1400ae642-1400ae64c 1048->1050 1054 1400ae686-1400ae689 1049->1054 1050->1054 1053 1400ae802-1400ae80a ExtractIconW 1051->1053 1052->1053 1055 1400ae810-1400ae829 1053->1055 1056 1400ae68f-1400ae6a1 FindResourceW 1054->1056 1057 1400ae7b7-1400ae7ca 1054->1057 1056->1057 1058 1400ae6a7-1400ae6b6 LoadResource 1056->1058 1059 1400ae7cc-1400ae7cf 1057->1059 1060 1400ae7d6-1400ae7d9 1057->1060 1058->1057 1061 1400ae6bc-1400ae6cb LockResource 1058->1061 1059->1060 1062 1400ae7d1-1400ae7d4 1059->1062 1063 1400ae7db-1400ae7de FreeLibrary 1060->1063 1064 1400ae7e4-1400ae7e7 1060->1064 1061->1057 1065 1400ae6d1-1400ae6da 1061->1065 1062->1064 1063->1064 1064->1047 1066 1400ae7e9-1400ae7ec 1064->1066 1067 1400ae6dc-1400ae6e5 GetSystemMetrics 1065->1067 1068 1400ae6e7-1400ae6f7 1065->1068 1066->1055 1067->1068 1068->1057 1069 1400ae6fd-1400ae708 1068->1069 1070 1400ae710-1400ae71e 1069->1070 1071 1400ae720-1400ae726 1070->1071 1072 1400ae728-1400ae72a 1070->1072 1073 1400ae72d-1400ae72f 1071->1073 1072->1073 1074 1400ae731-1400ae734 1073->1074 1075 1400ae737-1400ae742 1073->1075 1074->1075 1075->1070 1076 1400ae744-1400ae747 1075->1076 1076->1057 1077 1400ae749-1400ae761 FindResourceW 1076->1077 1077->1057 1078 1400ae763-1400ae772 LoadResource 1077->1078 1078->1057 1079 1400ae774-1400ae783 LockResource 1078->1079 1079->1057 1080 1400ae785-1400ae7b4 SizeofResource CreateIconFromResourceEx 1079->1080 1080->1057
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Resource$Load$FindIconLock$CreateEnumExtractFromLibraryMetricsNamesSizeofSystem
      • String ID:
      • API String ID: 1568753105-0
      • Opcode ID: bf5cf0eac0535dc4ee3ac285ce4af58add8c4ebb572dc0f4135059d6b1350614
      • Instruction ID: 5e67394c059790e078517ede2989fa006ef941fa1bf1ec2f2b7a670e7c686c54
      • Opcode Fuzzy Hash: bf5cf0eac0535dc4ee3ac285ce4af58add8c4ebb572dc0f4135059d6b1350614
      • Instruction Fuzzy Hash: A251B3353057D085EE668F13A9107FD6291BB6CBC4F488625EF4A47BA4DB3CC885DB00
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlockmalloc
      • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
      • API String ID: 425479435-457448710
      • Opcode ID: aea9631d8875eb1297522c51cbffe508ec115f1d45f45f1caf55fec94328e578
      • Instruction ID: 21452bfbd48cd9c2e257e9017a324c035cd6772a590aa016b7780e37c048e2bf
      • Opcode Fuzzy Hash: aea9631d8875eb1297522c51cbffe508ec115f1d45f45f1caf55fec94328e578
      • Instruction Fuzzy Hash: 8522A972604A4086FB67AB27E4503EA67A2F74DBE4F544216FB5A477F9DB38C881C340
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1892 14001f7a0-14001f7cb call 1400c98f4 1895 14001f7d3-14001f827 call 1400ca550 SetTimer 1892->1895 1896 14001f7cd-14001f7d2 1892->1896 1899 14001f837-14001f869 GetTickCount 1895->1899 1900 14001f829-14001f832 1895->1900 1902 14001f892-14001f8c7 GetTickCount call 1400322d0 1899->1902 1903 14001f86b-14001f88b SetTimer 1899->1903 1901 14001f909-14001f917 1900->1901 1904 14001f919-14001f924 1901->1904 1905 14001f95e-14001fa09 call 1400ca550 1901->1905 1910 14001f8cc-14001f8dc 1902->1910 1903->1902 1907 14001f926-14001f929 1904->1907 1908 14001f92f-14001f93d 1904->1908 1918 14001fa2c-14001fa41 1905->1918 1919 14001fa0b-14001fa27 call 1400b04d0 1905->1919 1907->1908 1913 14001f944-14001f957 call 1400ca388 1908->1913 1914 14001f93f call 1400ca390 1908->1914 1911 14001f902 1910->1911 1912 14001f8de-14001f8fc KillTimer 1910->1912 1911->1901 1912->1911 1913->1905 1914->1913 1921 14001fa43-14001fa4a 1918->1921 1922 14001fa4c 1918->1922 1926 14001fc87-14001fc9c 1919->1926 1925 14001fa4f-14001fa5a 1921->1925 1922->1925 1927 14001fa6c-14001fa76 1925->1927 1928 14001fa5c-14001fa67 call 140006120 1925->1928 1929 14001fc9e-14001fca5 1926->1929 1930 14001fcdf-14001fcf1 1926->1930 1932 14001fa78-14001fa7c 1927->1932 1933 14001fa9d-14001faa1 1927->1933 1943 14001fc7d-14001fc82 1928->1943 1929->1930 1934 14001fca7-14001fcaf 1929->1934 1932->1933 1936 14001fa7e-14001fa98 call 1400404f0 1932->1936 1937 14001faa3-14001fab2 call 1400b0b80 1933->1937 1938 14001fab7-14001fabd 1933->1938 1934->1930 1942 14001fcb1-14001fcb9 1934->1942 1936->1943 1937->1943 1940 14001fad4-14001fae4 1938->1940 1941 14001fabf-14001facd 1938->1941 1946 14001faea-14001faf7 1940->1946 1947 14001fc50-14001fc57 1940->1947 1941->1940 1942->1930 1948 14001fcbb-14001fcc2 1942->1948 1943->1926 1951 14001faf9-14001fafb 1946->1951 1952 14001fb0c-14001fb14 1946->1952 1954 14001fc66-14001fc74 1947->1954 1955 14001fc59-14001fc61 call 1400ca550 1947->1955 1948->1930 1953 14001fcc4-14001fcda call 14001fd90 1948->1953 1957 14001fb49-14001fb4d 1951->1957 1958 14001fafd-14001fb07 1951->1958 1952->1957 1960 14001fb16-14001fb1a 1952->1960 1953->1930 1956 14001fc78 1954->1956 1955->1954 1956->1943 1962 14001fb59-14001fb61 1957->1962 1963 14001fb4f-14001fb54 1957->1963 1964 14001fc44-14001fc4c 1958->1964 1965 14001fb23-14001fb2b 1960->1965 1966 14001fb1c-14001fb21 1960->1966 1967 14001fc03-14001fc0e 1962->1967 1968 14001fb67-14001fb6e 1962->1968 1963->1967 1964->1947 1969 14001fb2f-14001fb3a call 1400a9650 1965->1969 1966->1969 1970 14001fc23 1967->1970 1971 14001fc10-14001fc13 1967->1971 1972 14001fb70-14001fb7c 1968->1972 1973 14001fbbf-14001fbc6 1968->1973 1969->1956 1982 14001fb40-14001fb44 1969->1982 1977 14001fc26-14001fc29 1970->1977 1971->1970 1976 14001fc15-14001fc21 call 1400ca390 1971->1976 1978 14001fb86-14001fb9c 1972->1978 1979 14001fb7e 1972->1979 1980 14001fbd1-14001fbd8 1973->1980 1981 14001fbc8-14001fbcf 1973->1981 1976->1977 1984 14001fcf2-14001fcf5 1977->1984 1985 14001fc2f-14001fc3a call 1400c98f4 1977->1985 1986 14001fbb5-14001fbbd 1978->1986 1987 14001fb9e-14001fba6 1978->1987 1979->1978 1988 14001fbda-14001fbfa 1980->1988 1989 14001fbfc 1980->1989 1981->1967 1982->1964 1993 14001fd08-14001fd0c 1984->1993 1994 14001fcf7-14001fd06 1984->1994 1985->1984 1997 14001fc40 1985->1997 1986->1967 1987->1986 1992 14001fba8-14001fbb2 1987->1992 1988->1967 1989->1967 1992->1986 1996 14001fd10-14001fd2e call 1400404f0 1993->1996 1994->1996 1996->1956 1997->1964
      APIs
      • malloc.LIBCMT ref: 000000014001F7B9
        • Part of subcall function 00000001400C98F4: _FF_MSGBANNER.LIBCMT ref: 00000001400C9924
        • Part of subcall function 00000001400C98F4: RtlAllocateHeap.NTDLL(?,?,00000000,00000001400CEC94,?,?,00000000,00000001400CE54D,?,?,?,00000001400CE5F7,?,?,00000000,00000001400CD9E5), ref: 00000001400C9949
        • Part of subcall function 00000001400C98F4: _callnewh.LIBCMT ref: 00000001400C9962
        • Part of subcall function 00000001400C98F4: _errno.LIBCMT ref: 00000001400C996D
        • Part of subcall function 00000001400C98F4: _errno.LIBCMT ref: 00000001400C9978
      • SetTimer.USER32 ref: 000000014001F817
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: _errno$AllocateHeapTimer_callnewhmalloc
      • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
      • API String ID: 2580226803-457448710
      • Opcode ID: 23dd054dbe13adb0c7d3c6965963c2ce4508e8a666d11ec448247c2af12b2528
      • Instruction ID: a6c0af6bf7abe16d19778c52d8ab339b6fa0f49596385cac15635f7498bfd594
      • Opcode Fuzzy Hash: 23dd054dbe13adb0c7d3c6965963c2ce4508e8a666d11ec448247c2af12b2528
      • Instruction Fuzzy Hash: A5F19A72204B8486FB169F22E8543E933A1F74CBD8F544526EF9A0B7B9CB79C491E350
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Time$CurrentDirectoryFileSystem
      • String ID: ErrorLevel$Memory limit reached (see #MaxMem in the help file).$Out of memory.
      • API String ID: 2903961910-844184505
      • Opcode ID: 1497026fdaebaf35ad0501f899bf59664ccf56e71a0cdb74f9d9bb5819410455
      • Instruction ID: 5b0fb18adc7919b898192cef282c453b7b9ea4d0c0abf455b8ad9558cf9b6451
      • Opcode Fuzzy Hash: 1497026fdaebaf35ad0501f899bf59664ccf56e71a0cdb74f9d9bb5819410455
      • Instruction Fuzzy Hash: 9FD1CD72200B5082EB669F26E5543D963A1F78CBD8F44512AEF4E1B7BADF78C895C340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 945eb79057d4bc2af58e1f6f5208b6994f0e394522c1b83182543644be4699bb
      • Instruction ID: ab54de9211088e778ad962a925a2fe739a93cee7b7946e82926188be5526a882
      • Opcode Fuzzy Hash: 945eb79057d4bc2af58e1f6f5208b6994f0e394522c1b83182543644be4699bb
      • Instruction Fuzzy Hash: 46F1B032A006408AFBA79B67E4503EA63A1E78DBD4F584126FF554B7F9DB38D881C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Window$CurrentDestroyDirectoryIconNotifyShell_wcsncpy
      • String ID:
      • API String ID: 1905601840-0
      • Opcode ID: fc5c955b8cdfa3f8c3e97cd3fde9d0cb61e84d074daed185165f6c89b0e72734
      • Instruction ID: 859c4164af140e330fc3076a76c3de1e66f5393e354247a26859c03bf53cfab9
      • Opcode Fuzzy Hash: fc5c955b8cdfa3f8c3e97cd3fde9d0cb61e84d074daed185165f6c89b0e72734
      • Instruction Fuzzy Hash: 1DB19F36604B8486F72ADF26E8843DA77A1F78DF88F184119EB89077B6CB79C455C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Find$CloseFileFirst
      • String ID:
      • API String ID: 2295610775-0
      • Opcode ID: 732dd61e4d12536c05b6821fd2e6ff8c085cea335e567630bae68878e505d733
      • Instruction ID: 37cec6dd55ecfbab7f353d1eceec7038f952c6793465e49ef8df7e121af6198f
      • Opcode Fuzzy Hash: 732dd61e4d12536c05b6821fd2e6ff8c085cea335e567630bae68878e505d733
      • Instruction Fuzzy Hash: F851E032704B4091EA16CB2695043EE73A5FB59BE8F958316EB2E077E4EF78C44AC700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Heap$CreateInformationVersion
      • String ID:
      • API String ID: 3563531100-0
      • Opcode ID: 0816b556edb65991565eee222bea11b75c11fb24656a1b6e71d81aba35be9268
      • Instruction ID: 0044b7d238adde3a21c409b2c787aa6d60fd6ad8af2109c50f8f69663e0185d4
      • Opcode Fuzzy Hash: 0816b556edb65991565eee222bea11b75c11fb24656a1b6e71d81aba35be9268
      • Instruction Fuzzy Hash: 54E09274211780C2FB8A6B12A849BE92252BB8C780F908415FB0A03BB4DF3CC1468710
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1081 140036c9e-140036ca5 1082 140036d4b-140036d6c call 1400ac280 1081->1082 1083 140036cab-140036cca call 140025210 1081->1083 1089 140036de3-140036df6 1082->1089 1090 140036d6e-140036d7e call 14000c6b0 1082->1090 1083->1082 1088 140036ccc-140036cd7 1083->1088 1091 140036ce5-140036cef 1088->1091 1092 140036cd9-140036ce0 1088->1092 1093 140036e04 1089->1093 1094 140036df8-140036dfd 1089->1094 1102 140036d80-140036d95 call 1400c986c 1090->1102 1103 140036dbe 1090->1103 1097 140036cf1-140036cfd 1091->1097 1098 140036d15-140036d1f 1091->1098 1096 140038806 1092->1096 1100 140036e06-140036e0a 1093->1100 1094->1093 1099 140036dff-140036e02 1094->1099 1105 14003880b 1096->1105 1097->1098 1104 140036cff-140036d10 1097->1104 1098->1082 1106 140036d21-140036d2b 1098->1106 1099->1100 1107 140036e0e-140036e1d call 140024da0 1100->1107 1120 140036d97-140036da6 call 140025080 1102->1120 1121 140036dab-140036db9 1102->1121 1103->1089 1110 140036dc0-140036dc3 1103->1110 1104->1105 1111 140038813-14003881f 1105->1111 1112 14003880e call 1400401a0 1105->1112 1113 140036d35-140036d46 1106->1113 1114 140036d2d-140036d33 1106->1114 1107->1096 1119 140038837-140038839 1107->1119 1110->1089 1118 140036dc5-140036de1 1110->1118 1122 140038825-14003882a 1111->1122 1123 140038c0b-140038c38 1111->1123 1112->1111 1113->1105 1114->1082 1114->1113 1118->1107 1125 14003883d-140038844 1119->1125 1120->1119 1121->1096 1122->1125 1125->1123 1127 14003884a-140038858 1125->1127 1128 140038864 1127->1128 1129 140038868-14003886b 1128->1129 1130 140038871-140038873 1129->1130 1131 140038c09 1129->1131 1133 1400323b1-1400323ce GetTickCount 1130->1133 1134 140032380-140032388 1130->1134 1131->1123 1137 140032407-14003240e 1133->1137 1138 1400323d0-1400323ed PeekMessageW 1133->1138 1135 14003238a-140032397 GlobalUnlock 1134->1135 1136 14003239e-1400323aa CloseClipboard 1134->1136 1135->1136 1136->1133 1141 14003243a-140032448 1137->1141 1142 140032410-140032417 1137->1142 1139 1400323f9-140032401 GetTickCount 1138->1139 1140 1400323ef-1400323f4 call 140001ac0 1138->1140 1139->1137 1140->1139 1143 14003244a-14003244d 1141->1143 1144 14003244f-140032455 1141->1144 1142->1141 1146 140032419-140032422 1142->1146 1143->1144 1147 140032461-14003246d call 140001ac0 1143->1147 1148 140032474-14003247b 1144->1148 1149 140032457-14003245f 1144->1149 1146->1141 1150 140032424-140032429 1146->1150 1147->1148 1152 14003249c-1400324af 1148->1152 1153 14003247d 1148->1153 1149->1147 1149->1148 1154 140032434-140032437 1150->1154 1155 14003242b-140032432 1150->1155 1158 1400324b1-1400324f8 GetTickCount 1152->1158 1159 1400324fd-140032503 1152->1159 1157 140032480-140032493 call 140001ac0 1153->1157 1154->1141 1155->1141 1169 140032495 1157->1169 1158->1159 1160 140032541 1159->1160 1161 140032505-140032507 1159->1161 1164 140032548-140032554 1160->1164 1161->1160 1163 140032509-140032512 1161->1163 1163->1164 1166 140032514-14003252d call 1400894d0 1163->1166 1167 14003255a-14003255e 1164->1167 1168 14003270e-140032721 1164->1168 1166->1123 1179 140032533-14003253f 1166->1179 1167->1168 1173 140032564-14003257e call 140039100 1167->1173 1170 140033a11-140033a3e 1168->1170 1171 140032727-14003273a 1168->1171 1169->1152 1175 140033a44-140033a4e 1170->1175 1176 140038bfe-140038c00 1170->1176 1178 1400339a0-1400339a4 1171->1178 1182 140032584-14003258b 1173->1182 1183 140032646-140032653 1173->1183 1181 14003885a 1175->1181 1176->1123 1178->1181 1179->1164 1186 14003885f 1181->1186 1187 1400325bf-1400325dd call 1400322d0 1182->1187 1188 14003258d 1182->1188 1184 1400326fc-140032703 1183->1184 1185 140032659-140032660 1183->1185 1184->1131 1189 140032709 1184->1189 1190 140032662 1185->1190 1191 14003269f-1400326bd call 1400322d0 1185->1191 1186->1128 1200 1400325e2-1400325e5 1187->1200 1193 140032590-1400325bb call 1400322d0 1188->1193 1189->1128 1194 140032670-14003269b call 1400322d0 1190->1194 1205 1400326c2-1400326c9 1191->1205 1202 1400325bd 1193->1202 1208 14003269d 1194->1208 1200->1128 1203 1400325eb-1400325f2 1200->1203 1202->1200 1206 140038884-14003888d 1203->1206 1207 1400325f8-1400325fb 1203->1207 1209 140038878-14003887f 1205->1209 1210 1400326cf-1400326d2 1205->1210 1206->1123 1207->1206 1211 140032601-140032604 1207->1211 1208->1205 1209->1131 1210->1209 1212 1400326d8-1400326db 1210->1212 1213 140032621-140032632 1211->1213 1214 140032606-14003260e 1211->1214 1212->1178 1215 1400326e1-1400326e9 1212->1215 1213->1129 1219 140032638-140032641 1213->1219 1214->1209 1216 140032614-14003261c 1214->1216 1217 140038892-14003889e 1215->1217 1218 1400326ef-1400326f7 1215->1218 1216->1128 1217->1123 1218->1186 1219->1129
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID: Delete$Parameter #1 invalid.$Parameter #1 must not be blank in this case.$Parameter #2 invalid.$Target label does not exist.
      • API String ID: 1623861271-14243736
      • Opcode ID: 15040459d1c44710db68912ad4c2c039ddf161c32c4336535dad528f6a1d86fd
      • Instruction ID: 6aea9627b842c6d263896ed2a19b8cdf88f5ad23a9aa8e1476c8e6746f22eac1
      • Opcode Fuzzy Hash: 15040459d1c44710db68912ad4c2c039ddf161c32c4336535dad528f6a1d86fd
      • Instruction Fuzzy Hash: FBD1AC71600A4085FB6BCB2BE8447EA27A1F74DBD4F948116FB59876F9DB38C881C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Window$ClassCurrentDialogDirectoryDragFinishForegroundMessageNameProcessThread
      • String ID: #32770
      • API String ID: 3456408793-463685578
      • Opcode ID: b5672df83f177aaf4d94880354b03927eb7155668d4e00c68f2fb1ead74e363d
      • Instruction ID: 1686ce99f4c2e6cee467174094901f2ef30cab2696115316d21a9a40ebbe9c09
      • Opcode Fuzzy Hash: b5672df83f177aaf4d94880354b03927eb7155668d4e00c68f2fb1ead74e363d
      • Instruction Fuzzy Hash: D1C13872205B8186EB67CF27A8543E937A5F74DBD4F144126EB5A4BBB4DB38C881C710
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: _amsg_exit$CommandInfoInitializeLineStartup__wsetargv_cinit_wwincmdln
      • String ID:
      • API String ID: 697445056-0
      • Opcode ID: 70a88b387871dd31a161cfc8adbb81b69329148ee2148796033b70159f3a641d
      • Instruction ID: 5994fa0aa8a60b7263b3bec36d07affc534686b16c36f07f67a9b5f99dc989f2
      • Opcode Fuzzy Hash: 70a88b387871dd31a161cfc8adbb81b69329148ee2148796033b70159f3a641d
      • Instruction Fuzzy Hash: 9A41803061838186FB6FABA7E5957ED2191AB9C7C4F044039F70A872F3EF78C8858611
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1544 140037fec-140038007 call 1400c9ac4 1547 1400380d9-1400380f4 call 1400c9ac4 1544->1547 1548 14003800d-140038025 call 14002da40 1544->1548 1555 140038832 1547->1555 1556 1400380fa-140038107 1547->1556 1553 140038837-140038844 1548->1553 1554 14003802b-14003804f call 14002db10 call 1400ca884 1548->1554 1563 140038c0b-140038c38 1553->1563 1564 14003884a-140038858 1553->1564 1571 140038051-14003805c call 14001bfc0 1554->1571 1572 14003805e-140038060 1554->1572 1555->1553 1557 14003812a-140038131 1556->1557 1558 140038109-14003810c 1556->1558 1557->1555 1561 14003811c-140038125 1558->1561 1562 14003810e-140038111 1558->1562 1561->1555 1562->1557 1567 140038113-140038116 1562->1567 1568 140038864 1564->1568 1567->1555 1567->1561 1570 140038868-14003886b 1568->1570 1573 140038871-140038873 1570->1573 1574 140038c09 1570->1574 1576 140038062-140038072 1571->1576 1572->1576 1578 1400323b1-1400323ce GetTickCount 1573->1578 1579 140032380-140032388 1573->1579 1574->1563 1576->1553 1581 140038078-1400380d4 call 1400ac280 call 1400ca240 1576->1581 1584 140032407-14003240e 1578->1584 1585 1400323d0-1400323ed PeekMessageW 1578->1585 1582 14003238a-140032397 GlobalUnlock 1579->1582 1583 14003239e-1400323aa CloseClipboard 1579->1583 1581->1553 1582->1583 1583->1578 1590 14003243a-140032448 1584->1590 1591 140032410-140032417 1584->1591 1587 1400323f9-140032401 GetTickCount 1585->1587 1588 1400323ef-1400323f4 call 140001ac0 1585->1588 1587->1584 1588->1587 1592 14003244a-14003244d 1590->1592 1593 14003244f-140032455 1590->1593 1591->1590 1596 140032419-140032422 1591->1596 1592->1593 1597 140032461-14003246d call 140001ac0 1592->1597 1598 140032474-14003247b 1593->1598 1599 140032457-14003245f 1593->1599 1596->1590 1601 140032424-140032429 1596->1601 1597->1598 1603 14003249c-1400324af 1598->1603 1604 14003247d 1598->1604 1599->1597 1599->1598 1605 140032434-140032437 1601->1605 1606 14003242b-140032432 1601->1606 1609 1400324b1-1400324f8 GetTickCount 1603->1609 1610 1400324fd-140032503 1603->1610 1608 140032480-140032493 call 140001ac0 1604->1608 1605->1590 1606->1590 1620 140032495 1608->1620 1609->1610 1611 140032541 1610->1611 1612 140032505-140032507 1610->1612 1615 140032548-140032554 1611->1615 1612->1611 1614 140032509-140032512 1612->1614 1614->1615 1617 140032514-14003252d call 1400894d0 1614->1617 1618 14003255a-14003255e 1615->1618 1619 14003270e-140032721 1615->1619 1617->1563 1630 140032533-14003253f 1617->1630 1618->1619 1624 140032564-14003257e call 140039100 1618->1624 1621 140033a11-140033a3e 1619->1621 1622 140032727-14003273a 1619->1622 1620->1603 1626 140033a44-140033a4e 1621->1626 1627 140038bfe-140038c00 1621->1627 1629 1400339a0-1400339a4 1622->1629 1633 140032584-14003258b 1624->1633 1634 140032646-140032653 1624->1634 1632 14003885a 1626->1632 1627->1563 1629->1632 1630->1615 1637 14003885f 1632->1637 1638 1400325bf-1400325dd call 1400322d0 1633->1638 1639 14003258d 1633->1639 1635 1400326fc-140032703 1634->1635 1636 140032659-140032660 1634->1636 1635->1574 1640 140032709 1635->1640 1641 140032662 1636->1641 1642 14003269f-1400326bd call 1400322d0 1636->1642 1637->1568 1651 1400325e2-1400325e5 1638->1651 1644 140032590-1400325bb call 1400322d0 1639->1644 1640->1568 1645 140032670-14003269b call 1400322d0 1641->1645 1656 1400326c2-1400326c9 1642->1656 1653 1400325bd 1644->1653 1659 14003269d 1645->1659 1651->1568 1654 1400325eb-1400325f2 1651->1654 1653->1651 1657 140038884-14003888d 1654->1657 1658 1400325f8-1400325fb 1654->1658 1660 140038878-14003887f 1656->1660 1661 1400326cf-1400326d2 1656->1661 1657->1563 1658->1657 1662 140032601-140032604 1658->1662 1659->1656 1660->1574 1661->1660 1663 1400326d8-1400326db 1661->1663 1664 140032621-140032632 1662->1664 1665 140032606-14003260e 1662->1665 1663->1629 1666 1400326e1-1400326e9 1663->1666 1664->1570 1670 140032638-140032641 1664->1670 1665->1660 1667 140032614-14003261c 1665->1667 1668 140038892-14003889e 1666->1668 1669 1400326ef-1400326f7 1666->1669 1667->1568 1668->1563 1669->1637 1670->1570
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo_swprintf
      • String ID: %%%s%s%s$Float$Integer
      • API String ID: 1431326264-2931010843
      • Opcode ID: b8684ffbea4a2bcb1a2132e051705b0d803992dafd313e705eee443d3c59072a
      • Instruction ID: 061f56755a61f1eae64034c3dec6e44dcfc4cd3d8810dc016e1101b95d6c11e4
      • Opcode Fuzzy Hash: b8684ffbea4a2bcb1a2132e051705b0d803992dafd313e705eee443d3c59072a
      • Instruction Fuzzy Hash: 38B18C71204B4085EB6B8B2BE8547EA77A1B74DBD4F904126FB6A877F5DB38C981C700
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2000 1400379a1-1400379b6 call 14008b3b0 2003 1400379b8-1400379c7 2000->2003 2004 1400379c9 2000->2004 2005 1400379cc-1400379d7 2003->2005 2004->2005 2006 1400379d9-1400379ed 2005->2006 2007 1400379ef-1400379f1 2005->2007 2008 140037a39-140037a47 call 1400b2f10 2006->2008 2009 1400379f3-140037a07 2007->2009 2010 140037a09-140037a32 call 14002dc10 call 14002db10 2007->2010 2016 140037a6c-140037a77 2008->2016 2017 140037a49-140037a54 GetLastError 2008->2017 2009->2008 2010->2008 2020 14003880b 2016->2020 2021 140038819-14003881f 2016->2021 2017->2016 2019 140037a56-140037a67 2017->2019 2019->2020 2022 140038813-140038817 2020->2022 2023 14003880e call 1400401a0 2020->2023 2024 140038825-140038844 2021->2024 2025 140038c0b-140038c38 2021->2025 2022->2021 2023->2022 2024->2025 2027 14003884a-140038858 2024->2027 2028 140038864 2027->2028 2029 140038868-14003886b 2028->2029 2030 140038871-140038873 2029->2030 2031 140038c09 2029->2031 2033 1400323b1-1400323ce GetTickCount 2030->2033 2034 140032380-140032388 2030->2034 2031->2025 2037 140032407-14003240e 2033->2037 2038 1400323d0-1400323ed PeekMessageW 2033->2038 2035 14003238a-140032397 GlobalUnlock 2034->2035 2036 14003239e-1400323aa CloseClipboard 2034->2036 2035->2036 2036->2033 2041 14003243a-140032448 2037->2041 2042 140032410-140032417 2037->2042 2039 1400323f9-140032401 GetTickCount 2038->2039 2040 1400323ef-1400323f4 call 140001ac0 2038->2040 2039->2037 2040->2039 2043 14003244a-14003244d 2041->2043 2044 14003244f-140032455 2041->2044 2042->2041 2046 140032419-140032422 2042->2046 2043->2044 2047 140032461-14003246d call 140001ac0 2043->2047 2048 140032474-14003247b 2044->2048 2049 140032457-14003245f 2044->2049 2046->2041 2050 140032424-140032429 2046->2050 2047->2048 2052 14003249c-1400324af 2048->2052 2053 14003247d 2048->2053 2049->2047 2049->2048 2054 140032434-140032437 2050->2054 2055 14003242b-140032432 2050->2055 2058 1400324b1-1400324f8 GetTickCount 2052->2058 2059 1400324fd-140032503 2052->2059 2057 140032480-140032493 call 140001ac0 2053->2057 2054->2041 2055->2041 2069 140032495 2057->2069 2058->2059 2060 140032541 2059->2060 2061 140032505-140032507 2059->2061 2064 140032548-140032554 2060->2064 2061->2060 2063 140032509-140032512 2061->2063 2063->2064 2066 140032514-14003252d call 1400894d0 2063->2066 2067 14003255a-14003255e 2064->2067 2068 14003270e-140032721 2064->2068 2066->2025 2079 140032533-14003253f 2066->2079 2067->2068 2073 140032564-14003257e call 140039100 2067->2073 2070 140033a11-140033a3e 2068->2070 2071 140032727-14003273a 2068->2071 2069->2052 2075 140033a44-140033a4e 2070->2075 2076 140038bfe-140038c00 2070->2076 2078 1400339a0-1400339a4 2071->2078 2082 140032584-14003258b 2073->2082 2083 140032646-140032653 2073->2083 2081 14003885a 2075->2081 2076->2025 2078->2081 2079->2064 2086 14003885f 2081->2086 2087 1400325bf-1400325dd call 1400322d0 2082->2087 2088 14003258d 2082->2088 2084 1400326fc-140032703 2083->2084 2085 140032659-140032660 2083->2085 2084->2031 2089 140032709 2084->2089 2090 140032662 2085->2090 2091 14003269f-1400326bd call 1400322d0 2085->2091 2086->2028 2100 1400325e2-1400325e5 2087->2100 2093 140032590-1400325bb call 1400322d0 2088->2093 2089->2028 2094 140032670-14003269b call 1400322d0 2090->2094 2105 1400326c2-1400326c9 2091->2105 2102 1400325bd 2093->2102 2108 14003269d 2094->2108 2100->2028 2103 1400325eb-1400325f2 2100->2103 2102->2100 2106 140038884-14003888d 2103->2106 2107 1400325f8-1400325fb 2103->2107 2109 140038878-14003887f 2105->2109 2110 1400326cf-1400326d2 2105->2110 2106->2025 2107->2106 2111 140032601-140032604 2107->2111 2108->2105 2109->2031 2110->2109 2112 1400326d8-1400326db 2110->2112 2113 140032621-140032632 2111->2113 2114 140032606-14003260e 2111->2114 2112->2078 2115 1400326e1-1400326e9 2112->2115 2113->2029 2119 140032638-140032641 2113->2119 2114->2109 2116 140032614-14003261c 2114->2116 2117 140038892-14003889e 2115->2117 2118 1400326ef-1400326f7 2115->2118 2116->2028 2117->2025 2118->2086 2119->2029
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseErrorGlobalLastMessagePeekUnlock
      • String ID: Parameter #1 invalid.$Press OK to continue.
      • API String ID: 2934963523-108709617
      • Opcode ID: bca13ae7be15446951fca518aaf92d5ba8dcbb04a36106a853bb4108aff51f72
      • Instruction ID: cb63a26e0b780496296e5b5f43265a320e6c5d0305ebe14b8a5e0f269d51381c
      • Opcode Fuzzy Hash: bca13ae7be15446951fca518aaf92d5ba8dcbb04a36106a853bb4108aff51f72
      • Instruction Fuzzy Hash: CCB17E72604B4086FB678B27E8507EA67A1E78DBD4F544216FB6A476F9CB38C981C700
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2120 140038682-140038689 2121 140038702-140038726 call 14001cf30 2120->2121 2122 14003868b-140038692 2120->2122 2132 140038728-14003873a 2121->2132 2133 14003873c 2121->2133 2124 140038694-14003869d 2122->2124 2125 1400386de-1400386e2 2122->2125 2128 1400386d0 2124->2128 2129 14003869f-1400386ce call 1400ac450 2124->2129 2126 1400386e9-1400386fd call 1400a9420 2125->2126 2138 140038813-140038817 2126->2138 2130 1400386d7-1400386dc 2128->2130 2129->2130 2130->2126 2137 140038743-140038747 2132->2137 2133->2137 2139 140038749-14003874e 2137->2139 2140 140038750-140038768 call 1400c986c 2137->2140 2141 140038819-14003881f 2138->2141 2142 14003876c-140038787 call 1400a9420 2139->2142 2140->2142 2146 140038825-140038844 2141->2146 2147 140038c0b-140038c38 2141->2147 2142->2141 2150 14003878d-140038790 2142->2150 2146->2147 2151 14003884a-140038858 2146->2151 2150->2141 2152 140038796 2150->2152 2153 140038864 2151->2153 2152->2138 2154 140038868-14003886b 2153->2154 2155 140038871-140038873 2154->2155 2156 140038c09 2154->2156 2158 1400323b1-1400323ce GetTickCount 2155->2158 2159 140032380-140032388 2155->2159 2156->2147 2162 140032407-14003240e 2158->2162 2163 1400323d0-1400323ed PeekMessageW 2158->2163 2160 14003238a-140032397 GlobalUnlock 2159->2160 2161 14003239e-1400323aa CloseClipboard 2159->2161 2160->2161 2161->2158 2166 14003243a-140032448 2162->2166 2167 140032410-140032417 2162->2167 2164 1400323f9-140032401 GetTickCount 2163->2164 2165 1400323ef-1400323f4 call 140001ac0 2163->2165 2164->2162 2165->2164 2168 14003244a-14003244d 2166->2168 2169 14003244f-140032455 2166->2169 2167->2166 2171 140032419-140032422 2167->2171 2168->2169 2172 140032461-14003246d call 140001ac0 2168->2172 2173 140032474-14003247b 2169->2173 2174 140032457-14003245f 2169->2174 2171->2166 2175 140032424-140032429 2171->2175 2172->2173 2177 14003249c-1400324af 2173->2177 2178 14003247d 2173->2178 2174->2172 2174->2173 2179 140032434-140032437 2175->2179 2180 14003242b-140032432 2175->2180 2183 1400324b1-1400324f8 GetTickCount 2177->2183 2184 1400324fd-140032503 2177->2184 2182 140032480-140032493 call 140001ac0 2178->2182 2179->2166 2180->2166 2194 140032495 2182->2194 2183->2184 2185 140032541 2184->2185 2186 140032505-140032507 2184->2186 2189 140032548-140032554 2185->2189 2186->2185 2188 140032509-140032512 2186->2188 2188->2189 2191 140032514-14003252d call 1400894d0 2188->2191 2192 14003255a-14003255e 2189->2192 2193 14003270e-140032721 2189->2193 2191->2147 2204 140032533-14003253f 2191->2204 2192->2193 2198 140032564-14003257e call 140039100 2192->2198 2195 140033a11-140033a3e 2193->2195 2196 140032727-14003273a 2193->2196 2194->2177 2200 140033a44-140033a4e 2195->2200 2201 140038bfe-140038c00 2195->2201 2203 1400339a0-1400339a4 2196->2203 2207 140032584-14003258b 2198->2207 2208 140032646-140032653 2198->2208 2206 14003885a 2200->2206 2201->2147 2203->2206 2204->2189 2211 14003885f 2206->2211 2212 1400325bf-1400325dd call 1400322d0 2207->2212 2213 14003258d 2207->2213 2209 1400326fc-140032703 2208->2209 2210 140032659-140032660 2208->2210 2209->2156 2214 140032709 2209->2214 2215 140032662 2210->2215 2216 14003269f-1400326bd call 1400322d0 2210->2216 2211->2153 2225 1400325e2-1400325e5 2212->2225 2218 140032590-1400325bb call 1400322d0 2213->2218 2214->2153 2219 140032670-14003269b call 1400322d0 2215->2219 2230 1400326c2-1400326c9 2216->2230 2227 1400325bd 2218->2227 2233 14003269d 2219->2233 2225->2153 2228 1400325eb-1400325f2 2225->2228 2227->2225 2231 140038884-14003888d 2228->2231 2232 1400325f8-1400325fb 2228->2232 2234 140038878-14003887f 2230->2234 2235 1400326cf-1400326d2 2230->2235 2231->2147 2232->2231 2236 140032601-140032604 2232->2236 2233->2230 2234->2156 2235->2234 2237 1400326d8-1400326db 2235->2237 2238 140032621-140032632 2236->2238 2239 140032606-14003260e 2236->2239 2237->2203 2240 1400326e1-1400326e9 2237->2240 2238->2154 2244 140032638-140032641 2238->2244 2239->2234 2241 140032614-14003261c 2239->2241 2242 140038892-14003889e 2240->2242 2243 1400326ef-1400326f7 2240->2243 2241->2153 2242->2147 2243->2211 2244->2154
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID: %s\%s$ahk_default
      • API String ID: 1623861271-75935552
      • Opcode ID: 3315e8d2f92fcceab09eeb666790f5f1347905ab0e05203c8667429a8828c4fc
      • Instruction ID: c4c1b6c3174e26563994b3d865493565911ca4790d29567b0c81689ce5380085
      • Opcode Fuzzy Hash: 3315e8d2f92fcceab09eeb666790f5f1347905ab0e05203c8667429a8828c4fc
      • Instruction Fuzzy Hash: 90B16972604B4086EB67CB27E8447EA67A1F74DBD4F944126FB6A476F9CB38C481C740
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2245 1400360fd-14003881f SendMessageTimeoutW call 14003ef50 2250 140038825-140038844 2245->2250 2251 140038c0b-140038c38 2245->2251 2250->2251 2253 14003884a-140038858 2250->2253 2254 140038864 2253->2254 2255 140038868-14003886b 2254->2255 2256 140038871-140038873 2255->2256 2257 140038c09 2255->2257 2259 1400323b1-1400323ce GetTickCount 2256->2259 2260 140032380-140032388 2256->2260 2257->2251 2263 140032407-14003240e 2259->2263 2264 1400323d0-1400323ed PeekMessageW 2259->2264 2261 14003238a-140032397 GlobalUnlock 2260->2261 2262 14003239e-1400323aa CloseClipboard 2260->2262 2261->2262 2262->2259 2267 14003243a-140032448 2263->2267 2268 140032410-140032417 2263->2268 2265 1400323f9-140032401 GetTickCount 2264->2265 2266 1400323ef-1400323f4 call 140001ac0 2264->2266 2265->2263 2266->2265 2269 14003244a-14003244d 2267->2269 2270 14003244f-140032455 2267->2270 2268->2267 2272 140032419-140032422 2268->2272 2269->2270 2273 140032461-14003246d call 140001ac0 2269->2273 2274 140032474-14003247b 2270->2274 2275 140032457-14003245f 2270->2275 2272->2267 2276 140032424-140032429 2272->2276 2273->2274 2278 14003249c-1400324af 2274->2278 2279 14003247d 2274->2279 2275->2273 2275->2274 2280 140032434-140032437 2276->2280 2281 14003242b-140032432 2276->2281 2284 1400324b1-1400324f8 GetTickCount 2278->2284 2285 1400324fd-140032503 2278->2285 2283 140032480-140032493 call 140001ac0 2279->2283 2280->2267 2281->2267 2295 140032495 2283->2295 2284->2285 2286 140032541 2285->2286 2287 140032505-140032507 2285->2287 2290 140032548-140032554 2286->2290 2287->2286 2289 140032509-140032512 2287->2289 2289->2290 2292 140032514-14003252d call 1400894d0 2289->2292 2293 14003255a-14003255e 2290->2293 2294 14003270e-140032721 2290->2294 2292->2251 2305 140032533-14003253f 2292->2305 2293->2294 2299 140032564-14003257e call 140039100 2293->2299 2296 140033a11-140033a3e 2294->2296 2297 140032727-14003273a 2294->2297 2295->2278 2301 140033a44-140033a4e 2296->2301 2302 140038bfe-140038c00 2296->2302 2304 1400339a0-1400339a4 2297->2304 2308 140032584-14003258b 2299->2308 2309 140032646-140032653 2299->2309 2307 14003885a 2301->2307 2302->2251 2304->2307 2305->2290 2312 14003885f 2307->2312 2313 1400325bf-1400325dd call 1400322d0 2308->2313 2314 14003258d 2308->2314 2310 1400326fc-140032703 2309->2310 2311 140032659-140032660 2309->2311 2310->2257 2315 140032709 2310->2315 2316 140032662 2311->2316 2317 14003269f-1400326bd call 1400322d0 2311->2317 2312->2254 2326 1400325e2-1400325e5 2313->2326 2319 140032590-1400325bb call 1400322d0 2314->2319 2315->2254 2320 140032670-14003269b call 1400322d0 2316->2320 2331 1400326c2-1400326c9 2317->2331 2328 1400325bd 2319->2328 2334 14003269d 2320->2334 2326->2254 2329 1400325eb-1400325f2 2326->2329 2328->2326 2332 140038884-14003888d 2329->2332 2333 1400325f8-1400325fb 2329->2333 2335 140038878-14003887f 2331->2335 2336 1400326cf-1400326d2 2331->2336 2332->2251 2333->2332 2337 140032601-140032604 2333->2337 2334->2331 2335->2257 2336->2335 2338 1400326d8-1400326db 2336->2338 2339 140032621-140032632 2337->2339 2340 140032606-14003260e 2337->2340 2338->2304 2341 1400326e1-1400326e9 2338->2341 2339->2255 2345 140032638-140032641 2339->2345 2340->2335 2342 140032614-14003261c 2340->2342 2343 140038892-14003889e 2341->2343 2344 1400326ef-1400326f7 2341->2344 2342->2254 2343->2251 2344->2312 2345->2255
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendTimeoutUnlock
      • String ID: Environment
      • API String ID: 3716859204-3233436149
      • Opcode ID: 7295ac9671a1e467c4b06784b7fe6cf83e763b82d1c4f46bbb01d4fbf4ee4fb8
      • Instruction ID: 8d6aef12bdef55169265ca319fe9be65f3c0bb79da459d72335fbc30a631e11e
      • Opcode Fuzzy Hash: 7295ac9671a1e467c4b06784b7fe6cf83e763b82d1c4f46bbb01d4fbf4ee4fb8
      • Instruction Fuzzy Hash: 9E917C72604B408AEB678B27E8543EA77A1F74DBD4F544116FB6A476F8CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2346 140080e60-140080e8c 2347 140080e9b-140080ea7 2346->2347 2348 140080e8e-140080e9a 2346->2348 2349 140080ea9-140080eb2 2347->2349 2350 140080eb4 2347->2350 2349->2350 2351 140080eb9-140080ee4 GetFullPathNameW 2349->2351 2350->2351 2352 140080ef3-140080f27 GetFullPathNameW 2351->2352 2353 140080ee6-140080eec 2351->2353 2355 140080f29-140080f32 2352->2355 2356 140080f3c-140080f3e 2352->2356 2353->2352 2354 140080eee 2353->2354 2354->2352 2355->2356 2359 140080f34 2355->2359 2357 140080fff-14008100f GetFileAttributesW 2356->2357 2358 140080f44-140080f52 GetFileAttributesW 2356->2358 2362 140081103-140081105 2357->2362 2363 140081015-140081017 2357->2363 2360 140081121-140081123 2358->2360 2361 140080f58-140080f5a 2358->2361 2359->2356 2367 1400810f0-140081102 2360->2367 2361->2360 2364 140080f60-140080f6b 2361->2364 2365 14008110b-140081114 call 140064c20 2362->2365 2366 140081050-1400810d4 2362->2366 2363->2360 2368 14008101d-140081022 2363->2368 2370 140080f6d-140080f7b call 1400cadb8 2364->2370 2371 140080f80-140080f8d 2364->2371 2376 140081119-14008111b 2365->2376 2373 1400810e0-1400810ed SHFileOperationW 2366->2373 2374 1400810d6-1400810db 2366->2374 2368->2360 2372 140081028-14008102a 2368->2372 2370->2371 2385 140080f7d 2370->2385 2377 140080f8f-140080f9d call 1400cadb8 2371->2377 2378 140080fa2-140080fa5 2371->2378 2372->2366 2379 14008102c-14008104c 2372->2379 2373->2367 2374->2373 2376->2360 2376->2379 2377->2378 2389 140080f9f 2377->2389 2382 140080faf-140080fb4 2378->2382 2383 140080fa7-140080fad 2378->2383 2379->2366 2382->2360 2384 140080fba-140080fd6 call 140080e60 2382->2384 2383->2382 2387 140080ff8 2383->2387 2384->2360 2391 140080fdc-140080fe1 2384->2391 2385->2371 2387->2357 2389->2378 2391->2360 2392 140080fe7-140080ff3 call 140081130 2391->2392 2392->2367
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: FullNamePath$AttributesFile
      • String ID: :$\$\*.*
      • API String ID: 2214166259-1634566093
      • Opcode ID: 39c2249281cb4e307a955e9384a54823a4805408a13b70aad8ad057d11510539
      • Instruction ID: 5011ce6003745c5f92050821b9696668e7917299025273b322591a0087d70ff8
      • Opcode Fuzzy Hash: 39c2249281cb4e307a955e9384a54823a4805408a13b70aad8ad057d11510539
      • Instruction Fuzzy Hash: 7571A93360568086EBB2CB75A4003EA73E5FB883A4F544315F7A947AF9DB78C685CB10
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: ClipboardCloseCountGlobalMessagePeekTickUnlock
      • String ID: Jumps cannot exit a FINALLY block.
      • API String ID: 1792675829-672026804
      • Opcode ID: 561c9a7c3bbf41a098bed5b30bd29d174557c61a7729254925bc42d9d71ca345
      • Instruction ID: 7f10036c9cc37f1e85590b185cea7d833e599f5ec156f45a0384eeab0af7100a
      • Opcode Fuzzy Hash: 561c9a7c3bbf41a098bed5b30bd29d174557c61a7729254925bc42d9d71ca345
      • Instruction Fuzzy Hash: 13027632604B408AEB6B8B67E4803EE67A1F74DBD4F544126EF9A477B5DB38D981C700
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2560 140032e71-140032e8d call 1400c986c 2563 140032e8f-140032e93 2560->2563 2564 140032ede-140032ee2 2560->2564 2567 140032ea8-140032ed9 call 14003d0e0 2563->2567 2568 140032e95-140032ea3 2563->2568 2565 140032ee4-140032ef2 2564->2565 2566 140032ef7-140032f28 call 14003d550 2564->2566 2570 140033283-1400332b4 2565->2570 2566->2570 2567->2570 2568->2570 2573 1400332ba-1400332bd 2570->2573 2574 140038c09 2570->2574 2573->2574 2576 1400332c3-1400332c6 2573->2576 2577 140038c0b-140038c38 2574->2577 2576->2574 2578 1400332cc-1400332d3 2576->2578 2579 140033592-140033597 2578->2579 2580 1400332d9-14003358d 2578->2580 2582 140038864 2579->2582 2583 140038868-14003886b 2579->2583 2580->2579 2582->2583 2583->2574 2585 140038871-140038873 2583->2585 2588 1400323b1-1400323ce GetTickCount 2585->2588 2589 140032380-140032388 2585->2589 2592 140032407-14003240e 2588->2592 2593 1400323d0-1400323ed PeekMessageW 2588->2593 2590 14003238a-140032397 GlobalUnlock 2589->2590 2591 14003239e-1400323aa CloseClipboard 2589->2591 2590->2591 2591->2588 2596 14003243a-140032448 2592->2596 2597 140032410-140032417 2592->2597 2594 1400323f9-140032401 GetTickCount 2593->2594 2595 1400323ef-1400323f4 call 140001ac0 2593->2595 2594->2592 2595->2594 2598 14003244a-14003244d 2596->2598 2599 14003244f-140032455 2596->2599 2597->2596 2601 140032419-140032422 2597->2601 2598->2599 2602 140032461-14003246d call 140001ac0 2598->2602 2603 140032474-14003247b 2599->2603 2604 140032457-14003245f 2599->2604 2601->2596 2605 140032424-140032429 2601->2605 2602->2603 2607 14003249c-1400324af 2603->2607 2608 14003247d 2603->2608 2604->2602 2604->2603 2609 140032434-140032437 2605->2609 2610 14003242b-140032432 2605->2610 2613 1400324b1-1400324f8 GetTickCount 2607->2613 2614 1400324fd-140032503 2607->2614 2612 140032480-140032493 call 140001ac0 2608->2612 2609->2596 2610->2596 2624 140032495 2612->2624 2613->2614 2615 140032541 2614->2615 2616 140032505-140032507 2614->2616 2619 140032548-140032554 2615->2619 2616->2615 2618 140032509-140032512 2616->2618 2618->2619 2621 140032514-14003252d call 1400894d0 2618->2621 2622 14003255a-14003255e 2619->2622 2623 14003270e-140032721 2619->2623 2621->2577 2634 140032533-14003253f 2621->2634 2622->2623 2628 140032564-14003257e call 140039100 2622->2628 2625 140033a11-140033a3e 2623->2625 2626 140032727-14003273a 2623->2626 2624->2607 2630 140033a44-140033a4e 2625->2630 2631 140038bfe-140038c00 2625->2631 2633 1400339a0-1400339a4 2626->2633 2637 140032584-14003258b 2628->2637 2638 140032646-140032653 2628->2638 2636 14003885a 2630->2636 2631->2577 2633->2636 2634->2619 2641 14003885f 2636->2641 2642 1400325bf-1400325dd call 1400322d0 2637->2642 2643 14003258d 2637->2643 2639 1400326fc-140032703 2638->2639 2640 140032659-140032660 2638->2640 2639->2574 2644 140032709 2639->2644 2645 140032662 2640->2645 2646 14003269f-1400326bd call 1400322d0 2640->2646 2641->2582 2655 1400325e2-1400325e5 2642->2655 2648 140032590-1400325bb call 1400322d0 2643->2648 2644->2582 2649 140032670-14003269b call 1400322d0 2645->2649 2660 1400326c2-1400326c9 2646->2660 2657 1400325bd 2648->2657 2663 14003269d 2649->2663 2655->2582 2658 1400325eb-1400325f2 2655->2658 2657->2655 2661 140038884-14003888d 2658->2661 2662 1400325f8-1400325fb 2658->2662 2664 140038878-14003887f 2660->2664 2665 1400326cf-1400326d2 2660->2665 2661->2577 2662->2661 2666 140032601-140032604 2662->2666 2663->2660 2664->2574 2665->2664 2667 1400326d8-1400326db 2665->2667 2668 140032621-140032632 2666->2668 2669 140032606-14003260e 2666->2669 2667->2633 2670 1400326e1-1400326e9 2667->2670 2668->2583 2674 140032638-140032641 2668->2674 2669->2664 2671 140032614-14003261c 2669->2671 2672 140038892-14003889e 2670->2672 2673 1400326ef-1400326f7 2670->2673 2671->2582 2672->2577 2673->2641 2674->2583
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
      • String ID: CSV
      • API String ID: 130734711-2651001053
      • Opcode ID: c228477b7f7de7c55d3ba58e68037d479de28af02d476a85cdc4ebbdcd27bc7e
      • Instruction ID: dc10c5fa5826e41cddfddf06ccbc60d2646d2709f371a428c41325e297037f2d
      • Opcode Fuzzy Hash: c228477b7f7de7c55d3ba58e68037d479de28af02d476a85cdc4ebbdcd27bc7e
      • Instruction Fuzzy Hash: BCB15C72604B448AEB678B6BE4903EA77A1F74DBD4F504116FB9987BB8DB38C481C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID: Target label does not exist.
      • API String ID: 1623861271-2507343300
      • Opcode ID: 8c1b8220d21903e3e0e86c0397e21edfa0c202d24dbc1b3600f86441994a0cf9
      • Instruction ID: 6291b6f94d6353b228798434c265f17630c1ef41249e4fea711c3079aa1d7ac4
      • Opcode Fuzzy Hash: 8c1b8220d21903e3e0e86c0397e21edfa0c202d24dbc1b3600f86441994a0cf9
      • Instruction Fuzzy Hash: C1B17A72204B4485FB6B8B2BE8547EA67A1F74DBE4F544116EBA9477F8DB38C881C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID: Parameter #4 invalid.
      • API String ID: 1623861271-2921795276
      • Opcode ID: e60f1e241d85f3ca73832605bc5f23f8bea69aaaa2d7afc9b38768b71d785a0a
      • Instruction ID: 70596d9009565eb01a0ceca36ec28d3e148e86007aca9024dfd70dfa4a97d8df
      • Opcode Fuzzy Hash: e60f1e241d85f3ca73832605bc5f23f8bea69aaaa2d7afc9b38768b71d785a0a
      • Instruction Fuzzy Hash: 87A14972204B4486EB678B2BE8547EA67A1F78DBD4F504116FBAA477F9DB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID: Parameter #1 invalid.
      • API String ID: 1623861271-1208927624
      • Opcode ID: ff0f0399a1ec3aec6cbf05803d4653c119bdd6a87fecf0d14daa76df8059c98f
      • Instruction ID: 6decdd80d6993b42f21f16bbb5c9f020c1df0af37040caf091929099d10dc1fb
      • Opcode Fuzzy Hash: ff0f0399a1ec3aec6cbf05803d4653c119bdd6a87fecf0d14daa76df8059c98f
      • Instruction Fuzzy Hash: C2915B72604B408AFB678B2BE8543EA67A1F74DBD4F544116FB6A476F9CB38C881C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID: Target label does not exist.
      • API String ID: 1623861271-2507343300
      • Opcode ID: 2ae4a0e1a5ca341105cd7edd269f898309786633845dc37b16afee76a84bbee3
      • Instruction ID: d1c5810a5e4b3c52e67edff7694ab8928db8c111530e940f89fd677265cfc6d5
      • Opcode Fuzzy Hash: 2ae4a0e1a5ca341105cd7edd269f898309786633845dc37b16afee76a84bbee3
      • Instruction Fuzzy Hash: E1916B72604B4086EB6B9B2BE8943EA77A1F74DBD4F544116FB6A476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
      • String ID: wait
      • API String ID: 130734711-2112783333
      • Opcode ID: 9c59289a01d2590ead8cba9a31abccf6247afe123a0e4cfd36b6611e4edcbe20
      • Instruction ID: 86e6084e31e5676e9668fa010a65d272b8f23fae0942c397d5b149d878d2717d
      • Opcode Fuzzy Hash: 9c59289a01d2590ead8cba9a31abccf6247afe123a0e4cfd36b6611e4edcbe20
      • Instruction Fuzzy Hash: B1918D72204A4086FB678B27E8943EA67A1F74DBD0F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID: Parameter #1 invalid.
      • API String ID: 1623861271-1208927624
      • Opcode ID: d26bc31c92d9e547ee6f309e3f73b1d8d861845ab097dc8563fc4d514af778a9
      • Instruction ID: 71e6888bc6d91c0d22c29272f9b31c2637318ecef0f6e6388af1bbefbd377dd7
      • Opcode Fuzzy Hash: d26bc31c92d9e547ee6f309e3f73b1d8d861845ab097dc8563fc4d514af778a9
      • Instruction Fuzzy Hash: 45915C72604A4086EB6B9B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID: Parameter #1 invalid.
      • API String ID: 1623861271-1208927624
      • Opcode ID: ffef770461783774e5bbe169fac88499df9319bd233c72d3fc3def7d0df218f7
      • Instruction ID: 8a0fcb581157381abfbc7296d17daccef71f0693c918881cd7b1de6799dd7ad4
      • Opcode Fuzzy Hash: ffef770461783774e5bbe169fac88499df9319bd233c72d3fc3def7d0df218f7
      • Instruction Fuzzy Hash: 62916D72604B4086EB6B9B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID: Parameter #1 invalid.
      • API String ID: 1623861271-1208927624
      • Opcode ID: dff88965800a727c5990cc913f15cba609a38ce1e021a4e453d68581564ba74a
      • Instruction ID: 00c2cb68e71bf1f7e51687eb9ccaf0a78ae2c9bbdf2c2f6c25a8f50393a005a3
      • Opcode Fuzzy Hash: dff88965800a727c5990cc913f15cba609a38ce1e021a4e453d68581564ba74a
      • Instruction Fuzzy Hash: 1B915C72604B4086EB679B2BE8943EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Window$ClipboardCloseDestroyGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 2997888913-0
      • Opcode ID: d468257893893d42394ecfaf9ab33bd3ec01df53995d9215efebe94a6cba18b4
      • Instruction ID: 06d94487a9fe5bb1857a046f5022ff9328105a893332ae8eafb33d59bb21b96f
      • Opcode Fuzzy Hash: d468257893893d42394ecfaf9ab33bd3ec01df53995d9215efebe94a6cba18b4
      • Instruction Fuzzy Hash: 44916B72600B4486EB6B8B27E8543EA77A2F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: ClipboardCloseCountGlobalInfoTickUnlock
      • String ID:
      • API String ID: 3668674636-0
      • Opcode ID: 33bb54c7d427e422cb09bd2acc705329037b4415f48b749c9547c5fe0a481e6c
      • Instruction ID: 397a880e6f296bbc1f12a40d719d88740c55515b1ac29f296036d56a24f2cdc6
      • Opcode Fuzzy Hash: 33bb54c7d427e422cb09bd2acc705329037b4415f48b749c9547c5fe0a481e6c
      • Instruction Fuzzy Hash: 46D14B72600B8489EB778F26E8907DA77A1F74DB94F504216EB694BBF8DB38C581C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CloseCountTick$ClipboardGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 4107439908-0
      • Opcode ID: 719c12cb9adea9a375ae288de076c3e5229c845b7ccf47c00d56c9c62ed21f1b
      • Instruction ID: 84873feb19c15d26d9e19a6224174e2ee08982b9bf22e502baabe99be720b3a8
      • Opcode Fuzzy Hash: 719c12cb9adea9a375ae288de076c3e5229c845b7ccf47c00d56c9c62ed21f1b
      • Instruction Fuzzy Hash: 98B16C72604B448AEB678B6BE8903EA77A1F74DBD4F504116EB5A47BB8CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Close$CountTick$ClipboardCreateErrorGlobalLastMessagePeekUnlock
      • String ID:
      • API String ID: 2674141723-0
      • Opcode ID: 190d94947b4fedb057dd20c6e050789cf525fa301817514bd3f294397ea3c890
      • Instruction ID: e3deca5fe8b7128716d6cf662bd1f29500e55feecc959e885e34114aad313c7b
      • Opcode Fuzzy Hash: 190d94947b4fedb057dd20c6e050789cf525fa301817514bd3f294397ea3c890
      • Instruction Fuzzy Hash: E5B14772604B4086EB6B8B27E8947EA77A1F74DBD4F544116EBAA477F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CloseCountTick$ClipboardGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 4107439908-0
      • Opcode ID: 230c5ca6e516182274a610d1ab019b10a9a31d1762d112a38ee0bf363c47b732
      • Instruction ID: c46156ec96217f9167ba354e42885b254d1cf61f5b34b16ae00f9724c83f73dc
      • Opcode Fuzzy Hash: 230c5ca6e516182274a610d1ab019b10a9a31d1762d112a38ee0bf363c47b732
      • Instruction Fuzzy Hash: A7A18972600B4086EB6B8B6BE8947EA77A1F74DBD4F544116FB6A476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseFileGlobalMessageMovePeekUnlock
      • String ID:
      • API String ID: 1818255640-0
      • Opcode ID: b89139bbd1526d72c8e0439bb6ab743a93f96f8b1fedc2cf7fc6dca846bbfb40
      • Instruction ID: 25a9c94d8924dba4c97b4f78db3db2f5aa95f36a2e0d87645232472f900f2bb2
      • Opcode Fuzzy Hash: b89139bbd1526d72c8e0439bb6ab743a93f96f8b1fedc2cf7fc6dca846bbfb40
      • Instruction Fuzzy Hash: 23A15C72604B4086EB6B9B2BE8947EA77A1F74DBD0F544116FB6A476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$BeepClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 3141429382-0
      • Opcode ID: 8433ba2026ae7cc2509999811a42026e9353b941b4f0b8e9c4c82d6891bc3aae
      • Instruction ID: b116ebe7a77d1d7462ffbbad3995a8e124a34a82f1e6de9f0c1fc81788d9f087
      • Opcode Fuzzy Hash: 8433ba2026ae7cc2509999811a42026e9353b941b4f0b8e9c4c82d6891bc3aae
      • Instruction Fuzzy Hash: 25916E72600A4486FB6B9B2BE8543EA77A1F74DBD0F544116FB6A876F5CB38C981C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTickWindow$ClipboardCloseForegroundGlobalMessagePeekTextUnlockVisible
      • String ID:
      • API String ID: 1043259673-0
      • Opcode ID: d7d74bfb06cdff1052d9f1972af57d0f8b9f3785508e3ffffc5684e2d589a9d3
      • Instruction ID: 407fc42bf9c84bc1a670589c8cec3cd03bf36d806948dc0c694cd07d46e1d877
      • Opcode Fuzzy Hash: d7d74bfb06cdff1052d9f1972af57d0f8b9f3785508e3ffffc5684e2d589a9d3
      • Instruction Fuzzy Hash: 30917A72604B4086EB6B8B27E8543EA77A2F74DBD4F544116FB6A476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseEmptyGlobalMessagePeekRecycleUnlock
      • String ID:
      • API String ID: 2387848762-0
      • Opcode ID: 7745e7d4e99cfaec00e63f0aec3c4a6c2b8e6e1b1a703cf6d0a49a303e34ae47
      • Instruction ID: 66d6976f60aa9b0363a9b132fdba440554b6c927ad5c480b7067aab50ca62e8e
      • Opcode Fuzzy Hash: 7745e7d4e99cfaec00e63f0aec3c4a6c2b8e6e1b1a703cf6d0a49a303e34ae47
      • Instruction Fuzzy Hash: 44916D72604B4086EB6B9B27E8543EA77A1F74DBD0F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ErrorLast$AttributesClipboardCloseFileGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 3508199841-0
      • Opcode ID: c71ce566e1d91bb1abc311c352e7d0d25b4c18a6ae30bf797bd03c6827f3adc0
      • Instruction ID: 1cc576623d13ba16597448e00bacd0ed29b2628030c199559f57493d9121099e
      • Opcode Fuzzy Hash: c71ce566e1d91bb1abc311c352e7d0d25b4c18a6ae30bf797bd03c6827f3adc0
      • Instruction Fuzzy Hash: A0916A72604B4086EB6B9B2BE8543EA77A1F74DBD0F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseEnvironmentGlobalMessagePeekUnlockVariable
      • String ID:
      • API String ID: 2791281230-0
      • Opcode ID: 69db08524d877ca4a203d4131316ffbcf4264c428335cf9130b462dc11de4ba1
      • Instruction ID: 9368494d4ef6718d14e071362f3a9a1bae5c800bcf7089c088ffcb81cb3e318d
      • Opcode Fuzzy Hash: 69db08524d877ca4a203d4131316ffbcf4264c428335cf9130b462dc11de4ba1
      • Instruction Fuzzy Hash: 08914C72604B4086EB6B9B27E8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$BlockClipboardCloseGlobalInputMessagePeekUnlock
      • String ID:
      • API String ID: 3677732381-0
      • Opcode ID: b4332d581cf991dd7661b7049c4efd5ffdc308877da2b7da3e4afa10a8667f49
      • Instruction ID: 0f3842e126576e93e49fcce0345c8c3317d1d65f4670e08ca70ae8daaa6f445b
      • Opcode Fuzzy Hash: b4332d581cf991dd7661b7049c4efd5ffdc308877da2b7da3e4afa10a8667f49
      • Instruction Fuzzy Hash: E8817D72600B4086EB6B9B2BE8543EA77A2F74DBD4F544116FB6A476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$BlockClipboardCloseGlobalInputMessagePeekUnlock
      • String ID:
      • API String ID: 3677732381-0
      • Opcode ID: fbe9cd3316ec21733e7d89cb28343299ba8a61f5253220bd0d068a099a52897e
      • Instruction ID: 9f9784021859e4af3b3c380a808a709c87fd096ed58e53fa6d6b2b622caa3f67
      • Opcode Fuzzy Hash: fbe9cd3316ec21733e7d89cb28343299ba8a61f5253220bd0d068a099a52897e
      • Instruction Fuzzy Hash: 66817E72600B4086EB6B9B27E8543EA77A2F74DBD4F544116FB6A476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseDebugGlobalMessageOutputPeekStringUnlock
      • String ID:
      • API String ID: 1875564215-0
      • Opcode ID: 479ceb098433f222bc6254424d26e7af6254de9a317c9f84a1bd60b848d5e4c9
      • Instruction ID: 37861e81c452b9518b143af0734b0ef5fb4c7e801dfc2821a7f4900eb586ac62
      • Opcode Fuzzy Hash: 479ceb098433f222bc6254424d26e7af6254de9a317c9f84a1bd60b848d5e4c9
      • Instruction Fuzzy Hash: DE816D72600B4086EB6B9B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _lock.LIBCMT ref: 00000001400C9D55
        • Part of subcall function 00000001400CE5D4: _amsg_exit.LIBCMT ref: 00000001400CE5FE
      • DecodePointer.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000001400C9F19,?,?,00000000,00000001400CE603,?,?,00000000,00000001400CD9E5), ref: 00000001400C9D88
      • DecodePointer.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000001400C9F19,?,?,00000000,00000001400CE603,?,?,00000000,00000001400CD9E5), ref: 00000001400C9DA6
      • DecodePointer.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000001400C9F19,?,?,00000000,00000001400CE603,?,?,00000000,00000001400CD9E5), ref: 00000001400C9DE6
      • DecodePointer.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000001400C9F19,?,?,00000000,00000001400CE603,?,?,00000000,00000001400CD9E5), ref: 00000001400C9E00
      • DecodePointer.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000001400C9F19,?,?,00000000,00000001400CE603,?,?,00000000,00000001400CD9E5), ref: 00000001400C9E10
      • ExitProcess.KERNEL32 ref: 00000001400C9E9C
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: DecodePointer$ExitProcess_amsg_exit_lock
      • String ID:
      • API String ID: 3411037476-0
      • Opcode ID: 682e7c4c9f31b62f499d660a4a7c3cbab8bc55fc4893b5d70249ca22e9bc3579
      • Instruction ID: 431df7aedf8a09deb762b587ea3cd228e0d713eb8d84ad3723387e87d662f575
      • Opcode Fuzzy Hash: 682e7c4c9f31b62f499d660a4a7c3cbab8bc55fc4893b5d70249ca22e9bc3579
      • Instruction Fuzzy Hash: 4E41293121AB8081EA5A9F13F8483A972A5FB9CBD4F148025FB8E477B5EF78C456C711
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Resource$FindInfoLoadLockSizeofmalloc
      • String ID: >AUTOHOTKEY SCRIPT<$Could not extract script from EXE.
      • API String ID: 3366556718-1775548002
      • Opcode ID: f73f361428da554404e11a9a454f27ea623f9d261b8b9ef484fed1e2ec94c43d
      • Instruction ID: f0aad923bcce4ac5a6d1ad4f0f86a6197a1bc3d56886bf0c70e666c9a9d1aa79
      • Opcode Fuzzy Hash: f73f361428da554404e11a9a454f27ea623f9d261b8b9ef484fed1e2ec94c43d
      • Instruction Fuzzy Hash: B8318B35304B4181FB568B53E4043AAA7A0FB4CBD4F488029AF8D0BBAADF3CC545CB40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Window$ClassCurrentDialogDirectoryForegroundMessageNameProcessThread
      • String ID: #32770
      • API String ID: 2633243691-463685578
      • Opcode ID: c0d466640634422e8d88aa0a6381f22326dfc4dee6434734a0e2cbca9e7ef773
      • Instruction ID: 653ff47d109f8b38221a5fad1675112a00a1d472a14d16cbf21ae06272d5dcbe
      • Opcode Fuzzy Hash: c0d466640634422e8d88aa0a6381f22326dfc4dee6434734a0e2cbca9e7ef773
      • Instruction Fuzzy Hash: A43128B120978982FA6BCF17E8583E83791A74DBD4F084026EB0A573B4DF78D586C711
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 60ca621b781104d7c4b132eb2a638b2513b3fc7353f07d92047c6c8aeb861f4e
      • Instruction ID: eb38722b66658d01a4112d18e2748212ef6661d198a74f4463a9ec779d1762b2
      • Opcode Fuzzy Hash: 60ca621b781104d7c4b132eb2a638b2513b3fc7353f07d92047c6c8aeb861f4e
      • Instruction Fuzzy Hash: 22E19A32604B8089EB67CB6AE8443EA77A1F74DBE4F544226EF99477B5DB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: e4633538d3e02e8fb5cc716dc2e3f7e7b5d2de946f601308e6ce2e7729a22fc1
      • Instruction ID: 93df3a886b6f82453f8e0afab4c49f615d99c87bf9f28b5222db8b83427aa68c
      • Opcode Fuzzy Hash: e4633538d3e02e8fb5cc716dc2e3f7e7b5d2de946f601308e6ce2e7729a22fc1
      • Instruction Fuzzy Hash: D2C17032604B4486EB679B2BE4907EA77A2B78DBD0F544216FB5A477F5CB38C881C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: ClipboardCloseCountGlobalMessagePeekTickUnlock
      • String ID:
      • API String ID: 1792675829-0
      • Opcode ID: ad8090843782830ac102bb8591cb6546dd881ab65d9a2f446004563fc0946197
      • Instruction ID: 185ac37b67707229f4705da5afabfbdd3c79a85658a6db57f3a9baf2163377a9
      • Opcode Fuzzy Hash: ad8090843782830ac102bb8591cb6546dd881ab65d9a2f446004563fc0946197
      • Instruction Fuzzy Hash: 4EC14772604B4486EB679B2BE8507EA77A1F78DBD0F504116EB5A4B7F9DB38C881C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 7daae3bbfe2656edc3440fedd0ebc17aefcdf0eccb84622be277cd3f6026c047
      • Instruction ID: 0b4dac125b1ad67060eecffbf7088b3cb5c58a60fb87701a7d26085cfe2b98da
      • Opcode Fuzzy Hash: 7daae3bbfe2656edc3440fedd0ebc17aefcdf0eccb84622be277cd3f6026c047
      • Instruction Fuzzy Hash: 35A15C72600A4086EB6B9B2BE4543EA77A1F74DBD4F544116FB6A4B7F5DB38C881C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Window$ClipboardCloseForegroundGlobalIconicMessagePeekRectUnlock
      • String ID:
      • API String ID: 1613694844-0
      • Opcode ID: 13c631178269cba8a507aaec7c42fe60593e6e78718572eb9b7737abe8e505db
      • Instruction ID: e77e3cf3c686a5ee96b0d35c34fadfada367f514c9f1c4bf888e434bea6bb752
      • Opcode Fuzzy Hash: 13c631178269cba8a507aaec7c42fe60593e6e78718572eb9b7737abe8e505db
      • Instruction Fuzzy Hash: 88A15C72604A408AEB679B27E4543EA77A1F74DBD4F544116FB6987BF9CB38C881C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 8e92c2f0597b62b4faaf404cda46a47742f53bf9e717b9137e48675b316fc839
      • Instruction ID: c4074f1aef120996afd8e074ea4e0cb467dc84a8264f663705672889804f5aa7
      • Opcode Fuzzy Hash: 8e92c2f0597b62b4faaf404cda46a47742f53bf9e717b9137e48675b316fc839
      • Instruction Fuzzy Hash: 4CA17F72604B448AEB678B67E4903EA77A1F74DBD4F544116EBAA47BF8DB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 311da70664323771c15349ee0219bd50cf53e74a251c9de3ccdc7ac0ce9cd9eb
      • Instruction ID: 0b5a6562b7958a333828f664329ce175df2ccd2aa76877700b26c345315748b6
      • Opcode Fuzzy Hash: 311da70664323771c15349ee0219bd50cf53e74a251c9de3ccdc7ac0ce9cd9eb
      • Instruction Fuzzy Hash: 1FA17D72600B4485EB6B8B2BE8543EA77A1FB4DBE4F544125EBAA477F4DB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: f8955b97fa07d930bda3fd2af5a67a6c1779c55707eb75b8fe425b90107a84cc
      • Instruction ID: 2114b3c8cc53183b10ed3baa580dee0acde5bb8833df5387d044c80dc1666353
      • Opcode Fuzzy Hash: f8955b97fa07d930bda3fd2af5a67a6c1779c55707eb75b8fe425b90107a84cc
      • Instruction Fuzzy Hash: FAA17F72604B448AEB678B6BE4903EA77A1F74DBD4F544116EBAA477F8DB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
      • String ID:
      • API String ID: 130734711-0
      • Opcode ID: 4f826e84d4752c83cbf00fb19eae188459a642d3719fe83d5edf6e2888a4b56e
      • Instruction ID: bc8471bc7b9a8f4e81362acec51e1966cebf3d594b72b05cd0538ed0f6e59929
      • Opcode Fuzzy Hash: 4f826e84d4752c83cbf00fb19eae188459a642d3719fe83d5edf6e2888a4b56e
      • Instruction Fuzzy Hash: 8AA19C32600B4085FB6B9B2BE8543EA67A2F74DBD4F544116FB6A476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountMessageTick$ClipboardCloseGlobalPeekSendUnlock
      • String ID:
      • API String ID: 38145316-0
      • Opcode ID: 8e8f0dae052dfa317fd487e633e83902ebd8c65890353130b7e66dc273469bea
      • Instruction ID: 208f76c2936a5c6eb0eda6e793137fe5459728f9d78fb93b1abd91b05f14010a
      • Opcode Fuzzy Hash: 8e8f0dae052dfa317fd487e633e83902ebd8c65890353130b7e66dc273469bea
      • Instruction Fuzzy Hash: E6A16D72604A4086EB6B8B27E4943EA77A1F74DBD4F544116FB6A876F5CB38C981C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: e81a1d09267861deb680743a1970019c35ca2d29e0db0ee9586c0db81ce99fb9
      • Instruction ID: dec41107d4e95333bd2b404fb9695a36dde52d22d7ea863d155c56e14acee22a
      • Opcode Fuzzy Hash: e81a1d09267861deb680743a1970019c35ca2d29e0db0ee9586c0db81ce99fb9
      • Instruction Fuzzy Hash: 68A17F72600B448AEB678B6BE4943EA77A1F74DBD4F544116EB6A477F8DB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: a6acde2c1bb1f6d4dd27f6bfd248a2174346e03e147bb8e4214224a3f62e7031
      • Instruction ID: db1f4416a3e0f5f75e6dfe4a0a90ec1ad4e886e8f14047d2a44c4acd117d18de
      • Opcode Fuzzy Hash: a6acde2c1bb1f6d4dd27f6bfd248a2174346e03e147bb8e4214224a3f62e7031
      • Instruction Fuzzy Hash: A0A17D72600B448AEB678B6BE4943EA77A1F74DBD4F544116EB6A477F8DB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 47ab3be0b930d1783f6e87c9139e13263aa67628104e492ebdc8d92a0d0320e4
      • Instruction ID: 5b3d9e792f16a2cbf1c8f1aa7c70b894a21ee5f19bba4582db0c2e5f7bb8e517
      • Opcode Fuzzy Hash: 47ab3be0b930d1783f6e87c9139e13263aa67628104e492ebdc8d92a0d0320e4
      • Instruction Fuzzy Hash: BF918E72600B4485EB678B2BE4543EA77A1FB4DBE4F544216EFA9476F9CB38C981C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 6ab373c38bece95a3428d51cc1fb99976977b8f619726ab5653671225e3688ad
      • Instruction ID: 3300cd889de9f7e6b5f7b7624876ff365077f81060a1958ec16b89af0e2ee859
      • Opcode Fuzzy Hash: 6ab373c38bece95a3428d51cc1fb99976977b8f619726ab5653671225e3688ad
      • Instruction Fuzzy Hash: 96916B72604B4086EB6B8B27E8947EA77A1F74DBD0F544116FB6A876F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 1c09a1e4342203dcf23758ac86f1bf3c10a78ac7c5cc22d34cc643dac87349c1
      • Instruction ID: 09f3608c4d192ad1d6672a9df71322bb8eb7afbd93f1800d70e7767527a07b4d
      • Opcode Fuzzy Hash: 1c09a1e4342203dcf23758ac86f1bf3c10a78ac7c5cc22d34cc643dac87349c1
      • Instruction Fuzzy Hash: F1917C72604A4486EB6B8B2BE8547EA77A1F74DBD0F544116FB6A877F5CB38C881C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
      • String ID:
      • API String ID: 130734711-0
      • Opcode ID: 733376dd1a874cf1bd077a4e0cfbb95a07116f316a755fba6ecd9d3c9c906c1e
      • Instruction ID: e5ef7ba24d87c56c158a7c18c3b0afea2e4ede652da0d5a7df844b073726d31f
      • Opcode Fuzzy Hash: 733376dd1a874cf1bd077a4e0cfbb95a07116f316a755fba6ecd9d3c9c906c1e
      • Instruction Fuzzy Hash: C4A19F72600B4086EB6B8B2BE8543EA77A1F74DBE4F544215FBAA476F5CB38C481C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: b49bf63af7704dc42453fefc23ab06cce89032b342bb9ee02e22403a6aa1ef5e
      • Instruction ID: dbca15f3f2fb7dc3b695da84e4d17039d2a5d82dae49ce11f45402f406ecf37c
      • Opcode Fuzzy Hash: b49bf63af7704dc42453fefc23ab06cce89032b342bb9ee02e22403a6aa1ef5e
      • Instruction Fuzzy Hash: 94916E72604B4086EB6B9B2BE8543EA77A1F74DBD0F544116FB6A876F5CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: bd3e30a70eb46f0eff50ed4c7e45f5e559cf3f036d12ceaf3ddca564f9f9b9d6
      • Instruction ID: 9c68ccc999f1dd391b01d79f9a3fe7cb71b56c16421fb93d2d9e025b28af98e2
      • Opcode Fuzzy Hash: bd3e30a70eb46f0eff50ed4c7e45f5e559cf3f036d12ceaf3ddca564f9f9b9d6
      • Instruction Fuzzy Hash: E3918C72604A4086EB6B8B2BE8543EA77A1F74DBD0F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 0a34fb45beebf92788d3e0ff895cdfac594d4e924142acb9a32cdda1ca5e9a7e
      • Instruction ID: 258b6834059cca980af36bd183b34c1df1c2caa46bd37c9602f3d61405128880
      • Opcode Fuzzy Hash: 0a34fb45beebf92788d3e0ff895cdfac594d4e924142acb9a32cdda1ca5e9a7e
      • Instruction Fuzzy Hash: 50916E72204B4486EB6B8B27E8547EA77A1F74DBD0F544116EBA9477F9DB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 20edbbce9cb6901117c65ce76e329e310560c12dee1df98d047ddfd1828ffa56
      • Instruction ID: 2451691c6696e514d3d9157cd5600ffa4b692f170f9df3ffed71c2e299eacaf9
      • Opcode Fuzzy Hash: 20edbbce9cb6901117c65ce76e329e310560c12dee1df98d047ddfd1828ffa56
      • Instruction Fuzzy Hash: EC917C72604B4086EB679B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: e01b79c4bb7aeb71af2e2d014fe97d51c1cd79387d7823c9e691bf1daab62abc
      • Instruction ID: 2cd6803c8f52dbf4ed67081cb67a52c0a85ee1c4e69bff4fd4bce00c84c45686
      • Opcode Fuzzy Hash: e01b79c4bb7aeb71af2e2d014fe97d51c1cd79387d7823c9e691bf1daab62abc
      • Instruction Fuzzy Hash: 67917D72604B4086EB6B9B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseDirectoryGlobalMessagePeekRemoveUnlock
      • String ID:
      • API String ID: 1863380684-0
      • Opcode ID: 4aa196ad67cc3a7e12ecc588b55ec5c5dc6742e4c44c42d9fb2464e4d2039d99
      • Instruction ID: 13e38b4fa019d7bdcd70fed939fd4210353cfb6b64ca932b11609c7a7e5c769b
      • Opcode Fuzzy Hash: 4aa196ad67cc3a7e12ecc588b55ec5c5dc6742e4c44c42d9fb2464e4d2039d99
      • Instruction Fuzzy Hash: 4D915D72604B4086EB6B9B2BE4543EA77A1F74DBD4F544116FB6A476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 8f65baa6c79877a878d165efea2c3f3230cdbf5a6fad1bcfdec309759f6149a0
      • Instruction ID: 288ed62b02c1701c802e94ec6faace6cc3681e95daa58d871b1a5982afd1ee71
      • Opcode Fuzzy Hash: 8f65baa6c79877a878d165efea2c3f3230cdbf5a6fad1bcfdec309759f6149a0
      • Instruction Fuzzy Hash: A7917B72604A4085FB6B9B2BE8543EA67A2F74DBD4F544116FB6A476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseCreateGlobalInitializeInstanceKeyboardLayoutMessagePeekUnlock
      • String ID:
      • API String ID: 1422310799-0
      • Opcode ID: 54ee73af532644d9005f9833ec588925d34703846d9f185a18094cf4413b07b2
      • Instruction ID: 92b20823fc64609db101975c8b2667d135722d2beb1123f94bef951f8b4990d9
      • Opcode Fuzzy Hash: 54ee73af532644d9005f9833ec588925d34703846d9f185a18094cf4413b07b2
      • Instruction Fuzzy Hash: BB915B72204B4486EB6B8B2BE8947EA77A1F74DBD0F504116EBA9477F8DB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 189d43230b946db470a62915541e30f5e53c8f98647bd97e38a76e3796a35d7e
      • Instruction ID: 6da0c06c6a78ada20c5801cead0f23c546b72850e3770003e8dd8056189bde1a
      • Opcode Fuzzy Hash: 189d43230b946db470a62915541e30f5e53c8f98647bd97e38a76e3796a35d7e
      • Instruction Fuzzy Hash: E7914B72604B4486EB6B8B2BE8547EA77A1F74DBD0F544116EBA9477F4DB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTickWindow$ClipboardCloseForegroundGlobalIconicMessagePeekShowUnlockVisible
      • String ID:
      • API String ID: 1891409732-0
      • Opcode ID: 2596a5324b98e3050e71a82938ae059a4a96432e0876e302776220941d4206fa
      • Instruction ID: 5dc2c62c25a5b7e4b393ec0095a0528c88e0e279c710f4ab2533705e7617aceb
      • Opcode Fuzzy Hash: 2596a5324b98e3050e71a82938ae059a4a96432e0876e302776220941d4206fa
      • Instruction Fuzzy Hash: D5916872604B4086EB6B9B2BE8543EA67A1F74DBE4F544116FB6A477F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 531024026704283e13f2aec2b34178745cba10b3a0d63dc18e645b449655608f
      • Instruction ID: 8a802cbfc413144bef5acce917713e449e7aedb00dc466e02838f649062d8b47
      • Opcode Fuzzy Hash: 531024026704283e13f2aec2b34178745cba10b3a0d63dc18e645b449655608f
      • Instruction Fuzzy Hash: C3918E72604B4086EB6B9B27E8543EA77A2F74DBD4F544116FBAA476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 496abec334b34d1316c40b0a183a1e807bec8963396955dd2ce653e6736f5577
      • Instruction ID: 9c9b72edf582296672a260d771e94d6d453b78bb7a20554154f02e8fcfe63261
      • Opcode Fuzzy Hash: 496abec334b34d1316c40b0a183a1e807bec8963396955dd2ce653e6736f5577
      • Instruction Fuzzy Hash: E1913872604B4486EB6B8B2BE8947EA77A1F74DBD0F544116EBA9477F8CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: c604f08de378629e43d0b3537c3287686aca63504d0d5faf531b6167a5a94688
      • Instruction ID: d02d9e7783b730e50838fdb47f9313044242e91565dd391724fcef4db10f506c
      • Opcode Fuzzy Hash: c604f08de378629e43d0b3537c3287686aca63504d0d5faf531b6167a5a94688
      • Instruction Fuzzy Hash: 8B915B72604B4486EB6B8B2BE8547EA77A1F74DBD0F544116EB6A877F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 3d2130fb854b24aee5f391ee16de0f6c2dfd32941298298a0b0bfeb56a71c589
      • Instruction ID: b066232e915ff1759d06f0d0793afa8d56541c606c3f1c3fd0adbf9616e2fe9a
      • Opcode Fuzzy Hash: 3d2130fb854b24aee5f391ee16de0f6c2dfd32941298298a0b0bfeb56a71c589
      • Instruction Fuzzy Hash: CF919D72604B4486EB678B2BE4543EA77A1F74DBE4F544116FBAA476F8CB38C981C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: b743ba5ec7b8701805cf884e9c6f386d6c62618c427620820aa59723fd8f344b
      • Instruction ID: f9b4eaecd380d9d108645276e4cb488d16365d086ec7bff4cf6cee1033390f6e
      • Opcode Fuzzy Hash: b743ba5ec7b8701805cf884e9c6f386d6c62618c427620820aa59723fd8f344b
      • Instruction Fuzzy Hash: 74915972604B4086EB6B8B27E8547EA77A1F74DBD0F544116FBAA476F8CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Window$ClipboardCloseGlobalMessageMovePeekRectUnlock
      • String ID:
      • API String ID: 1284534901-0
      • Opcode ID: d6e39cf827985914d51cadfc1afa8fbc3ee8d328422688442d177e3be0810c7d
      • Instruction ID: b39acbd4e0f08e1d1da430aaf87c45c36c6853c214ae4f466ce36c798626cef3
      • Opcode Fuzzy Hash: d6e39cf827985914d51cadfc1afa8fbc3ee8d328422688442d177e3be0810c7d
      • Instruction Fuzzy Hash: 6E915C72604B4486EB6B8B2BE8947EA77A1F74DBD0F544116EBAA477F5CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: b2cec72841bcb05fbd7d1fbeba430d43cdad128e246c59b9c4f177c44ca6d85b
      • Instruction ID: 8feb48508ce0d847327c734e4e14de43032f761a16fb8f49d5744b6dbe444425
      • Opcode Fuzzy Hash: b2cec72841bcb05fbd7d1fbeba430d43cdad128e246c59b9c4f177c44ca6d85b
      • Instruction Fuzzy Hash: BB918176600A4086EB6B9B2BE8543EA77A1F74DBD4F544116FB6A876F5CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 3bd8d9e50afe7e28a77334881e182017310138546a3554110c2a536abbd152d6
      • Instruction ID: f38d2603a25751b4bd986b272de7e839fad5fbc46ffbdea6644840955e04d52e
      • Opcode Fuzzy Hash: 3bd8d9e50afe7e28a77334881e182017310138546a3554110c2a536abbd152d6
      • Instruction Fuzzy Hash: 9D916C72604B4486EB6B8B2BE8547EA77A2F74DBD0F544116FB6A476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 57fd764100118d7111405ccabe950724f2dc87849681ffa263b64ba85e172b95
      • Instruction ID: 7f52e5a97b237b23b58c281188c1d762d5e78a1cb7427eed17a467e2a94dfc14
      • Opcode Fuzzy Hash: 57fd764100118d7111405ccabe950724f2dc87849681ffa263b64ba85e172b95
      • Instruction Fuzzy Hash: F7915B72604B4486EB6B8B2BE8547EA77A1F74DBD0F544116EB69477F8CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: c975fecc737f758584c79cca697f343c025b04c92158641e7032785e91167508
      • Instruction ID: a7d22f22c4260aca027f329b966debb58e536db0aabca595fea53ebeb870fb4f
      • Opcode Fuzzy Hash: c975fecc737f758584c79cca697f343c025b04c92158641e7032785e91167508
      • Instruction Fuzzy Hash: E4915B72604B4486EB6B8B2BE8547EA77A1F74DBD0F544116EB69477F8CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_wcstoi64wcsncpy
      • String ID:
      • API String ID: 2569467992-0
      • Opcode ID: abaf128525cc5617aa55680bf7c64b685fc480cdb05a8936d0ab39ffa2b2370f
      • Instruction ID: bbe7b92fac733e07c6ba9482889dff2291b1cd8cbdea6ceb6ebd82501fa064a3
      • Opcode Fuzzy Hash: abaf128525cc5617aa55680bf7c64b685fc480cdb05a8936d0ab39ffa2b2370f
      • Instruction Fuzzy Hash: 89915B72604B4486EB6B8B2BE8947EA77A1F74DBD4F544116EB69477F8CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 35dab134e8b18307dda43829dd2ba3efd251b8342b2097651ede9d574fa42c55
      • Instruction ID: ce0cd341c0bd83cb94fb45a00b3e3757192aca48b0d310cbdb1241303d8e4c2b
      • Opcode Fuzzy Hash: 35dab134e8b18307dda43829dd2ba3efd251b8342b2097651ede9d574fa42c55
      • Instruction Fuzzy Hash: 12917C72604B4086EB6B8B2BE8547EA77A2F74DBD0F544116FB6A476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlockwcsncpy
      • String ID:
      • API String ID: 3258626421-0
      • Opcode ID: 361f5585ebf550eac9476617c6d43f56bbcfd5741111bd25dd3989a8eab84971
      • Instruction ID: b405ea7159099ed6530ba496edfcb45dbdcf9c7aebaa75cf87dbda6157aa819d
      • Opcode Fuzzy Hash: 361f5585ebf550eac9476617c6d43f56bbcfd5741111bd25dd3989a8eab84971
      • Instruction Fuzzy Hash: 65916B72204B4086EB6B8B2BE8543EA77A1F74DBD0F544116EBA9477F8CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlockwcsncpy
      • String ID:
      • API String ID: 3258626421-0
      • Opcode ID: 29f37be8f42d64010ab38aa0874587d774bec61c95120f304ed67ca5bdddcea3
      • Instruction ID: ef34183ef3dd20d139ed328c8e8889648d2d3e89553345666312a77d13621925
      • Opcode Fuzzy Hash: 29f37be8f42d64010ab38aa0874587d774bec61c95120f304ed67ca5bdddcea3
      • Instruction Fuzzy Hash: CE916C72204B4486EB6B8B2BE8543EA77A1F74DBD4F544116EB69477F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: b45d3c7ecf2bb7d4f93be499ef34551b5fba83f0635a4342823e7bab5f3a886a
      • Instruction ID: 11a546ba6103be942faf345e0826d9247604a43dce98270b3f743ed5af38cf8a
      • Opcode Fuzzy Hash: b45d3c7ecf2bb7d4f93be499ef34551b5fba83f0635a4342823e7bab5f3a886a
      • Instruction Fuzzy Hash: 87917C72600A4085FB6B9B2BE8543EA77A2F74DBD4F544116FB6A476F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 89075b8ed739de16ef4256e134fff424d603abc307fa6dbf438dd27dea5f3b31
      • Instruction ID: b6e1f428f5d1caddb0ed449effb6c86fefc02e5bb2bae2d7d13862c0a44519dc
      • Opcode Fuzzy Hash: 89075b8ed739de16ef4256e134fff424d603abc307fa6dbf438dd27dea5f3b31
      • Instruction Fuzzy Hash: 4C917B72604B4086EB6B9B27E8543EA77A1F74DBD0F544116FB6A876F9CB38C881C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 95a23739deef7cbc9eacb8a8c88f49089788cf8b5ac64a4c9501bab3693b5761
      • Instruction ID: b2529ebd1d16fb23292cce0733f986228328f6b146ae86a423062ec605a98dae
      • Opcode Fuzzy Hash: 95a23739deef7cbc9eacb8a8c88f49089788cf8b5ac64a4c9501bab3693b5761
      • Instruction Fuzzy Hash: 7B916C72604B4086EB6B8B2BE8543EA77A2F74DBD4F544116FB6A476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 834e4914b4f88e4c8dd6dcf2481be3a874b25fbce87cedfd4723918fb97e26b0
      • Instruction ID: 1c3dd8d0e9ef032bc6ea9b0be81be7f858dfd5ca10d237d7436bf0e35785239c
      • Opcode Fuzzy Hash: 834e4914b4f88e4c8dd6dcf2481be3a874b25fbce87cedfd4723918fb97e26b0
      • Instruction Fuzzy Hash: 5A916C72604B4086EB6B8B27E8543EA77A1F74DBD0F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendTimeoutUnlock
      • String ID:
      • API String ID: 3716859204-0
      • Opcode ID: a3028bb58c1c9fc0e76a5e779817bcd77e5a0669ace18bb72d54e88d773bb7eb
      • Instruction ID: eaa8416914f6d976813c6867cca2a7d96bcd4a63758a916a6befea7b4f50adfa
      • Opcode Fuzzy Hash: a3028bb58c1c9fc0e76a5e779817bcd77e5a0669ace18bb72d54e88d773bb7eb
      • Instruction Fuzzy Hash: B8916A72604B4486EB6B8B2BE8547EA77A1F74DBD0F544116EBAA477F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: e51305d8e338c49803053078ad7c67299323a746d9084c68c698f3a51dee77f1
      • Instruction ID: 46ae8e2d5bb4f3f655686c8571ce715c9423c0ca794f2fac8e894120926243e7
      • Opcode Fuzzy Hash: e51305d8e338c49803053078ad7c67299323a746d9084c68c698f3a51dee77f1
      • Instruction Fuzzy Hash: 44916B72604B4486EB6B8B2BE8547EA77A1F74DBD0F544116EB69477F8CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 32ec74676407c6b3dc3b9fd4ab68bc7e1be94517f24e83e0395c81d1ca2061f5
      • Instruction ID: be281a084ffc9fb350709a1a9bdeccdb74ac95854b353bf4d9a1cc2a9df9e39e
      • Opcode Fuzzy Hash: 32ec74676407c6b3dc3b9fd4ab68bc7e1be94517f24e83e0395c81d1ca2061f5
      • Instruction Fuzzy Hash: 20916C72604B4486EB6B8B27E8543EA77A1F74DBD4F544116EB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: ee2d529db94d724836f7405d8ee2f13006f951684ca0e8a9b98384c1bfbe89d3
      • Instruction ID: eeffaa19e9976e72b6b70e1f0fbea9fa8f7ccd586bff4cc893f3835237cad510
      • Opcode Fuzzy Hash: ee2d529db94d724836f7405d8ee2f13006f951684ca0e8a9b98384c1bfbe89d3
      • Instruction Fuzzy Hash: 0D916C72604B4086EB6B9B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountThreadTick$AttachInput$ClipboardCloseFocusGlobalMessagePeekProcessUnlockWindow
      • String ID:
      • API String ID: 1514730375-0
      • Opcode ID: 9ee5351dc7be510ebb27d2912622aac87dd37b472b00a12208e2abd6da8bfa5e
      • Instruction ID: 94ddcacff985797f1a004328acd822cbe3f2a47e4514827372eb4c097070d725
      • Opcode Fuzzy Hash: 9ee5351dc7be510ebb27d2912622aac87dd37b472b00a12208e2abd6da8bfa5e
      • Instruction Fuzzy Hash: 8C916B72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116EB6A477F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendTimeoutUnlock
      • String ID:
      • API String ID: 3716859204-0
      • Opcode ID: ad0089fca7d9444b19490c63fcf75a627b101837403518c951144e562a4df5c8
      • Instruction ID: 4bd3614e25a9efd20d743577cf4dbee8855ba22b3b64ac9d9f8c2019fbd10e9e
      • Opcode Fuzzy Hash: ad0089fca7d9444b19490c63fcf75a627b101837403518c951144e562a4df5c8
      • Instruction Fuzzy Hash: 65917B72604B4086EB6B8B2BE8543EA77A1F74DBD0F544116EB6A477F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: ca95643e6b620fdc78d1d6aa8a5d3757d710194e27ee74b732a84f8e572937c3
      • Instruction ID: 9274c2e652ed0a0a299bccde3de23a3e0a18bf9e5b3b0b3a59772125a316260f
      • Opcode Fuzzy Hash: ca95643e6b620fdc78d1d6aa8a5d3757d710194e27ee74b732a84f8e572937c3
      • Instruction Fuzzy Hash: D0916B72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116EB6A477F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: c35fb3a913460523f547c27e646f69d60f8ead88a2187731d8099c2d724e2f2e
      • Instruction ID: f64305c72008e8c63d6f3497a785eba05d8e62002b5bde05dbc7e62428a4f14c
      • Opcode Fuzzy Hash: c35fb3a913460523f547c27e646f69d60f8ead88a2187731d8099c2d724e2f2e
      • Instruction Fuzzy Hash: B0917C72604B408AEB6B8B27E8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 6c710904b4e0e7e81bbd0b0df7270e0fdd0fafc3ac8cce5b1536dcc5ed31ded3
      • Instruction ID: 57ed918a4dc239d280f5feacd71e57d123d51c211d9b01f1b341ff7fdc551bf9
      • Opcode Fuzzy Hash: 6c710904b4e0e7e81bbd0b0df7270e0fdd0fafc3ac8cce5b1536dcc5ed31ded3
      • Instruction Fuzzy Hash: E7916C72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$PrivateProfileStringWrite$ClipboardCloseFullGlobalMessageNamePathPeekUnlock
      • String ID:
      • API String ID: 2214806735-0
      • Opcode ID: 932a87a86846b23dbfd0e46082085f6ff92c9310e87d813d82daef97d72ec818
      • Instruction ID: f817774b436e67dc4064303c2f07559678fa1116b2fa6f46f75e2195d24beb12
      • Opcode Fuzzy Hash: 932a87a86846b23dbfd0e46082085f6ff92c9310e87d813d82daef97d72ec818
      • Instruction Fuzzy Hash: EA917B72604B4086EB6B8B2BE8543EA77A1F74DBD0F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Process$ClipboardCloseCurrentGlobalMessageOpenPeekTokenUnlock
      • String ID:
      • API String ID: 3060718303-0
      • Opcode ID: 5b88dcce50709a4f6ce887451da45df825f4f187ebf62033d32ba9ebd3c63244
      • Instruction ID: a50007b312bdd8fadb63ce32054d99cd90edf140199f74ec2bd2759bc62af6e3
      • Opcode Fuzzy Hash: 5b88dcce50709a4f6ce887451da45df825f4f187ebf62033d32ba9ebd3c63244
      • Instruction Fuzzy Hash: 63816C72604B4086EB6B9B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekTextUnlockWindow
      • String ID:
      • API String ID: 189804293-0
      • Opcode ID: 96d278861747bced0758caf6c43a42f3a0f1144573f0233c78ec63695927d1e2
      • Instruction ID: e18d84891eca884a3ac85baeee1be4f0d90f9876bd582b750fb125358c06eeba
      • Opcode Fuzzy Hash: 96d278861747bced0758caf6c43a42f3a0f1144573f0233c78ec63695927d1e2
      • Instruction Fuzzy Hash: C6916C72604B4086EB6B8B2BE8547EA77A1F74DBD4F544116FBAA476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 2a68f1da9ee13777f7c921b53ea6145823640560837e134bd94b106f52988393
      • Instruction ID: 6a37b9e80332fe43428acf21c01c94880516a2d613b590bd029a9222415103f4
      • Opcode Fuzzy Hash: 2a68f1da9ee13777f7c921b53ea6145823640560837e134bd94b106f52988393
      • Instruction Fuzzy Hash: 40916972604B4486EB6B8B2BE8543EA77A1F74DBD4F544116EB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 7b4e44ff7c385f48657ead3a8506232a9d33c28d6e7038ea15401aa31db31684
      • Instruction ID: 75b394c1aee1eea1e92cbb2f0c10311e13df69cc43b320ed28edf44fa4d907e6
      • Opcode Fuzzy Hash: 7b4e44ff7c385f48657ead3a8506232a9d33c28d6e7038ea15401aa31db31684
      • Instruction Fuzzy Hash: 93917D72604B4086EB6B9B27E8543EA77A1F74DBD4F544116FB6A476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$PrivateProfileStringWrite$ClipboardCloseFullGlobalMessageNamePathPeekUnlock
      • String ID:
      • API String ID: 2214806735-0
      • Opcode ID: 6f43f0229f5a3e5cc1448e95fbdce13369c653d2793cd72f7149d234c403159f
      • Instruction ID: 020af3c7ac43ad831aab543c04ae5d8a3f1a4cf61d6eb91a852c42d0e97e407b
      • Opcode Fuzzy Hash: 6f43f0229f5a3e5cc1448e95fbdce13369c653d2793cd72f7149d234c403159f
      • Instruction Fuzzy Hash: 3F916972604B4486EB6B8B2BE8543EA77A1F74DBD4F544116EB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Thread$ChildClassClipboardCloseEnumGlobalInfoMessageNamePeekProcessUnlockWindowWindows
      • String ID:
      • API String ID: 3620957724-0
      • Opcode ID: 3dd368a848900c0b12d8bcb81d0739d35d886675ab8a4f33fbca61ec77b72cdc
      • Instruction ID: fc33901d1ca34cab6cf6b4e286c114ff315d8dd36084cf5bb1284c5923fed366
      • Opcode Fuzzy Hash: 3dd368a848900c0b12d8bcb81d0739d35d886675ab8a4f33fbca61ec77b72cdc
      • Instruction Fuzzy Hash: 3E916972604B4486EB6B8B2BE8543EA77A1F74DBD4F544116EB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 0af306a18b8c2b4e0084415d716299b23f7d5e4849224f31c33a1056b12b2162
      • Instruction ID: b98f22edb9134565f3100f467ba4b54a7afc3409d37ab6cf244cc4721cdbc41a
      • Opcode Fuzzy Hash: 0af306a18b8c2b4e0084415d716299b23f7d5e4849224f31c33a1056b12b2162
      • Instruction Fuzzy Hash: 06916972604B4486EB6B8B2BE8543EA77A1F74DBD4F544116EB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 464a34634f05383295ebd4e328e7694038a8e10af88f2de9baefac7a3c77b8d6
      • Instruction ID: 6929816c0c732e5bf24972e6eabc78d0585a415e53a0298bc445a2bc555527c9
      • Opcode Fuzzy Hash: 464a34634f05383295ebd4e328e7694038a8e10af88f2de9baefac7a3c77b8d6
      • Instruction Fuzzy Hash: F5916972604B4086EB6B8B2BE8547EA77A1F74DBD4F544116EB6A877F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlockwcsncpy
      • String ID:
      • API String ID: 3258626421-0
      • Opcode ID: df15949186f2ee678d32a4b2b66cdac8a4f2df4bd7837e678a65de4499cc559d
      • Instruction ID: 679afe4950975493c522f1ec33d791aae13712ddf8f6cb0fb0e4262d58c7ec7f
      • Opcode Fuzzy Hash: df15949186f2ee678d32a4b2b66cdac8a4f2df4bd7837e678a65de4499cc559d
      • Instruction Fuzzy Hash: 7A916972604B4486EB6B8B2BE8543EA77A1F74DBD4F544116EB6A877F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 0288ecdd008266c863cbaaff0373f0b549cccfd271bcbc7152c184f1e5ee24dd
      • Instruction ID: 6eed64a4da364a5c9effa35746537467cdda48dc1e12e21f34e97af1f77e50a2
      • Opcode Fuzzy Hash: 0288ecdd008266c863cbaaff0373f0b549cccfd271bcbc7152c184f1e5ee24dd
      • Instruction Fuzzy Hash: DA916972604B4486EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekRectUnlockWindow
      • String ID:
      • API String ID: 1900757344-0
      • Opcode ID: 3e3207985a8fb5c5667f73bd11e5c210e84389802036416bfc230945a50603b1
      • Instruction ID: bb0d327458da1db85026c49fc07cdfd48eb8bf7e6cdc1dc3457fe29e2c2bad45
      • Opcode Fuzzy Hash: 3e3207985a8fb5c5667f73bd11e5c210e84389802036416bfc230945a50603b1
      • Instruction Fuzzy Hash: 7D915A72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 4df7efb01af68025676f9849c8426c01ccb753ead61e0e5ed064f1eaa7949d69
      • Instruction ID: 4a37506994f4e75e6fc5560af59169ecc8a586c2c5d58e7cb98800ee910ecbd3
      • Opcode Fuzzy Hash: 4df7efb01af68025676f9849c8426c01ccb753ead61e0e5ed064f1eaa7949d69
      • Instruction Fuzzy Hash: 68916972604B4486EB6B8B2BE8543EA77A1F74DBD4F544116EB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: fb9973710b066a835f10a2256b92a10519f9e0b5b0bebd222369df9d44d0b7c1
      • Instruction ID: 6aac5f5eaa1c0958dbe6297e39a3f6051f525d46d39706e62f65137a1c440b78
      • Opcode Fuzzy Hash: fb9973710b066a835f10a2256b92a10519f9e0b5b0bebd222369df9d44d0b7c1
      • Instruction Fuzzy Hash: 06817E72604A4086EB6BDB27E8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 5a567da9acb47c6b903903186c7d65cd4d2fc3510aaa3e82bda70c2f240d416f
      • Instruction ID: 7595d0b89774c543326b2503961c670c9d3364659953bce645fe6045663b5ab0
      • Opcode Fuzzy Hash: 5a567da9acb47c6b903903186c7d65cd4d2fc3510aaa3e82bda70c2f240d416f
      • Instruction Fuzzy Hash: 3C816D72604B4086EB6B9B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Close$ClipboardCreateErrorGlobalHandleLastMessageMutexPeekProcessThreadUnlockWindow
      • String ID:
      • API String ID: 4284707085-0
      • Opcode ID: 3abab05f442fa94c381372a725294529c2ef5a1e66e7ce61c36ca78747420ee4
      • Instruction ID: b55bfe7645119cd75c95fb9ee11cf1ba37fddc0290ccce86bc18661dd845f5de
      • Opcode Fuzzy Hash: 3abab05f442fa94c381372a725294529c2ef5a1e66e7ce61c36ca78747420ee4
      • Instruction Fuzzy Hash: 9D816D76600B4086EB6B9B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 0d50eb44e18d582c8ed0ac99ed387f41400490fd053e952304578f8f50c4f5fa
      • Instruction ID: fcaa4abfc22aeb62963416b755d9f488de952ec4277bdf6cfe02e56f4573609f
      • Opcode Fuzzy Hash: 0d50eb44e18d582c8ed0ac99ed387f41400490fd053e952304578f8f50c4f5fa
      • Instruction Fuzzy Hash: B0818B72604B4086EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalLabelMessagePeekUnlockVolumewcsncpy
      • String ID:
      • API String ID: 2345973108-0
      • Opcode ID: a5ab4d2fc2e52499565725dde4039022b8ad874c63332374fd6f570c6466bbc7
      • Instruction ID: 74ce86d78a370505642ba2508c743a211cdcc164a3ea93f0644f32b3e31de062
      • Opcode Fuzzy Hash: a5ab4d2fc2e52499565725dde4039022b8ad874c63332374fd6f570c6466bbc7
      • Instruction Fuzzy Hash: 97816A72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseFullGlobalMessageNamePathPeekPrivateProfileStringUnlock
      • String ID:
      • API String ID: 3404763234-0
      • Opcode ID: cc0b648204919c622e9eb9de9167ff71108cfd4507100097083834cc73d206e1
      • Instruction ID: 5eea6d471afcf342eaaa76ff79ab17208e5f4452bff60d7ee38835101d22a541
      • Opcode Fuzzy Hash: cc0b648204919c622e9eb9de9167ff71108cfd4507100097083834cc73d206e1
      • Instruction Fuzzy Hash: 87817C72604B4086EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 92d374b1b0d5edb51b37f899020647b4f0156d55c96065adeaca230f1e5c2fbd
      • Instruction ID: f80d961f058286a3a650813920ef25fefa9d734c1931857b2154671e751079b1
      • Opcode Fuzzy Hash: 92d374b1b0d5edb51b37f899020647b4f0156d55c96065adeaca230f1e5c2fbd
      • Instruction Fuzzy Hash: B5816B72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseCurrentDirectoryGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1560712716-0
      • Opcode ID: 3e88bfe125274c54540777df4e239f036986ef0c1e9c95ccccc407feed3e043e
      • Instruction ID: 6b427fee45962d201f8b588fa918973a52b8b694a937d383763de5753538b21a
      • Opcode Fuzzy Hash: 3e88bfe125274c54540777df4e239f036986ef0c1e9c95ccccc407feed3e043e
      • Instruction Fuzzy Hash: EA816C72604B4086EB6B9B27E8943EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 25b9663d3bcac55836324b1a742d90a040fe6aadadfdd6f870a1c43f505d595d
      • Instruction ID: 460a94b722521c3e0eae423e9f7ae55a0af6172c7172bb1471dcbcc93fabfea5
      • Opcode Fuzzy Hash: 25b9663d3bcac55836324b1a742d90a040fe6aadadfdd6f870a1c43f505d595d
      • Instruction Fuzzy Hash: A9817B72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: dc95913fefa2b0c4aced48f96d7683200ebdb6679f2b13ebaa659568f1d04918
      • Instruction ID: f39c071c9d4bdfed42bf3f7c9121bdf1397892eb06e7058c44f280686f5e9c02
      • Opcode Fuzzy Hash: dc95913fefa2b0c4aced48f96d7683200ebdb6679f2b13ebaa659568f1d04918
      • Instruction Fuzzy Hash: F8816C72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalLengthMessagePeekTextUnlockWindow
      • String ID:
      • API String ID: 1215013059-0
      • Opcode ID: 247156d2b0ddeca3d22b977412ca4fcc27b7063af2bdcf196f8755196be108c7
      • Instruction ID: f8345f87baa8717e536d7b1cc75849ec60e64fc647aad4ba5a26fcf45dc98f9d
      • Opcode Fuzzy Hash: 247156d2b0ddeca3d22b977412ca4fcc27b7063af2bdcf196f8755196be108c7
      • Instruction Fuzzy Hash: B0816B72604B4086EB6B8B2BE8547EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 49e862ec4b10ac7fe6c75f4f0b62d44709150588ba2fcfd47f5e1b952c89913f
      • Instruction ID: 09cfcb19af51918c627c14f18e54bcfced074ea033b88781d3a9aed9bcdb9d8d
      • Opcode Fuzzy Hash: 49e862ec4b10ac7fe6c75f4f0b62d44709150588ba2fcfd47f5e1b952c89913f
      • Instruction Fuzzy Hash: 29817B72604B4086EB6B8B2BE8543EA77A1F74DBD0F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountInternetTick$CloseOpen$ClipboardGlobalHandleMessagePeekUnlock_wcstoi64
      • String ID:
      • API String ID: 2751744677-0
      • Opcode ID: 99e88dd3cdafdc35c790d00c67fe42ae1a130b85613b9e657dd91b8baef8309f
      • Instruction ID: 389d5653171aba5897065a49e2277fec769d6ded700b0a6ea1693ab601f68c88
      • Opcode Fuzzy Hash: 99e88dd3cdafdc35c790d00c67fe42ae1a130b85613b9e657dd91b8baef8309f
      • Instruction Fuzzy Hash: 6F816C72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseDiskFreeGlobalMessagePeekSpaceUnlockwcsncpy
      • String ID:
      • API String ID: 833027430-0
      • Opcode ID: d22f75083a83d79436082f6a98452a5747d3e11f1a31ff4a73a7837c4611081c
      • Instruction ID: b5c282fa1fe26ad9a81cfbed0d60decb59a2294616d78f7bcc1f6ccf3d25bd2f
      • Opcode Fuzzy Hash: d22f75083a83d79436082f6a98452a5747d3e11f1a31ff4a73a7837c4611081c
      • Instruction Fuzzy Hash: E6816B72604B4086EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 663f8685e324e69c3914de3ac343972c356e9836e24806afb0f4cd34a5653415
      • Instruction ID: 0cd3adffc02ef9976f9dcfa11e1179d125a631498158916c3e688f19c77c332e
      • Opcode Fuzzy Hash: 663f8685e324e69c3914de3ac343972c356e9836e24806afb0f4cd34a5653415
      • Instruction Fuzzy Hash: 9F816B72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: d4babd5c7abde5c41fe61d29538f44debda5d1c9f4a430b282918e3c39bc4fa6
      • Instruction ID: 6a0b8cb3423b8b7bed755dabafb5e58bb6456d21f2754c4d086215f03bd98ba3
      • Opcode Fuzzy Hash: d4babd5c7abde5c41fe61d29538f44debda5d1c9f4a430b282918e3c39bc4fa6
      • Instruction Fuzzy Hash: 78818E72604B4086EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: e0ccc4b5189909cf9facb9d40468fa8e71c7623f396a946ebdf78e67983ee2c5
      • Instruction ID: e8a7b6187693dbd0684a85b7b3dad3019838973f470586f8b818d55179ea659a
      • Opcode Fuzzy Hash: e0ccc4b5189909cf9facb9d40468fa8e71c7623f396a946ebdf78e67983ee2c5
      • Instruction Fuzzy Hash: 31818F72604B4086EB6B8B27E8543EA77A1F74DBD4F544116FB6A876F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: ca1a0dbfeb359de3ade2a4b6b72a71255bd146cdcbae3ecc25f27cdc31a8bf56
      • Instruction ID: 85d8cd1f66daefe22fc7e5b21964cb2ed5dd75200d6b52f845ba7ec06563d9c2
      • Opcode Fuzzy Hash: ca1a0dbfeb359de3ade2a4b6b72a71255bd146cdcbae3ecc25f27cdc31a8bf56
      • Instruction Fuzzy Hash: 3F818F72604B4086EB6B8B27E8543EA77A1F74DBD4F544116FB6A876F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: a6cc2c34b296de27396c5e4afaef2466ee173787f4246721214653185469bbcf
      • Instruction ID: b47e74439a3ea4cec0a0e90e9640a148115d4642bc5205a69a10b5adbb64354a
      • Opcode Fuzzy Hash: a6cc2c34b296de27396c5e4afaef2466ee173787f4246721214653185469bbcf
      • Instruction Fuzzy Hash: 6D816C72604B4086EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: b6bb33c7165dfaad7f4b2eb109a8903603393878d84991514f6069e8db4c04d4
      • Instruction ID: 0f92c6ac9c07a92eae65dfe18c09fe438fe2722263970ecf74228db74d7b6c1a
      • Opcode Fuzzy Hash: b6bb33c7165dfaad7f4b2eb109a8903603393878d84991514f6069e8db4c04d4
      • Instruction Fuzzy Hash: BA816D72604B4086EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_wcstoi64
      • String ID:
      • API String ID: 3633153638-0
      • Opcode ID: 72f8dd43bb758cc9a6dfc35a1d3081535897b3f6a28c89de7807637e17711de3
      • Instruction ID: 8ca166d8d2c557c14526b50d25a59d67c1c2d8393d810d26a5fdf84dadc190f0
      • Opcode Fuzzy Hash: 72f8dd43bb758cc9a6dfc35a1d3081535897b3f6a28c89de7807637e17711de3
      • Instruction Fuzzy Hash: 43817B72604B4086EB6B8B2BE8543EA77A1F74DBD0F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 2c5efa518f54cd87e773a7d0eee4f37b3eeedccce83cc56d354caf6eccdc85aa
      • Instruction ID: 06347cbf25d1b47e9da64acb4a8b5f16ef7a39e38667a8000e7f8a7b3dfbef71
      • Opcode Fuzzy Hash: 2c5efa518f54cd87e773a7d0eee4f37b3eeedccce83cc56d354caf6eccdc85aa
      • Instruction Fuzzy Hash: BE816C72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendTimeoutUnlock
      • String ID:
      • API String ID: 3716859204-0
      • Opcode ID: a733b3dfeafc27432f3fe0ca82f0e5cfae9e5dedc8c0a18fdd08ee0c95ce49c1
      • Instruction ID: 7b902bc92c729d9177a8598ddbabb76ad7cc9c881cf564ffc395e92572c0a71c
      • Opcode Fuzzy Hash: a733b3dfeafc27432f3fe0ca82f0e5cfae9e5dedc8c0a18fdd08ee0c95ce49c1
      • Instruction Fuzzy Hash: 0B817D72604B4086EB6B9B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: ed1331155fb11ffe12ab3e132ad5ecd32bf7e4ad416967d68a4f6ae7c6b95496
      • Instruction ID: d26504a443a6742facda89b2b11bc4cd128c90bf1ffbe6f40a9fe0b143880c51
      • Opcode Fuzzy Hash: ed1331155fb11ffe12ab3e132ad5ecd32bf7e4ad416967d68a4f6ae7c6b95496
      • Instruction Fuzzy Hash: 2A816B72604B4086EB6B9B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 15c4febef2b81a7b564601dd204080f2218f359505c0ee0ab57215bd3c680c08
      • Instruction ID: 7fb5082a7d63f07071a92649fe50b88eb48372c541fac5ab861f349753c40fad
      • Opcode Fuzzy Hash: 15c4febef2b81a7b564601dd204080f2218f359505c0ee0ab57215bd3c680c08
      • Instruction Fuzzy Hash: 72816B72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: be0812a8daab21303550ed1af8bc140bedd56245b78174a04f5d58cc5a1b6fd5
      • Instruction ID: 9aec23ae82d6d44561fa0d635f01b9308cdd37a8d271fe6402a9bb95042258a0
      • Opcode Fuzzy Hash: be0812a8daab21303550ed1af8bc140bedd56245b78174a04f5d58cc5a1b6fd5
      • Instruction Fuzzy Hash: FB818072600B4086EB6B8B27E8543EA77A1F74DBD4F544116FBAA876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 99f5bea564d6318b49df042d13ea9e20f653a3cd97e680e26bd462eac486c004
      • Instruction ID: d61fa42ef9ed60eff64258686bc75f1edaae527889bc39c765644705140bfd6f
      • Opcode Fuzzy Hash: 99f5bea564d6318b49df042d13ea9e20f653a3cd97e680e26bd462eac486c004
      • Instruction Fuzzy Hash: 44818E72604B4086EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalKeyboardLayoutMessagePeekUnlock
      • String ID:
      • API String ID: 2243892272-0
      • Opcode ID: 300e6e4684afe4997b1eeaf5e3fb44a798576274c5abb4c574f3f370e7d3f652
      • Instruction ID: cb0c8e3db820c9f1ac30ffd97d7b77f13d1e071c171aece700e43de58041cd27
      • Opcode Fuzzy Hash: 300e6e4684afe4997b1eeaf5e3fb44a798576274c5abb4c574f3f370e7d3f652
      • Instruction Fuzzy Hash: D3816C72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 7ec8e8d99908444d79d75975b49f412130cb271761238fe2aa82df3ffbd35562
      • Instruction ID: 1aa9f8c9510b6fda89d0e21ce647f4910a1d5abdc323918e114c61e8a1636584
      • Opcode Fuzzy Hash: 7ec8e8d99908444d79d75975b49f412130cb271761238fe2aa82df3ffbd35562
      • Instruction Fuzzy Hash: 87816C72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$CloseCreateMessageMutexSleepThread$ClipboardCodeExitGlobalHandlePeekPostUnlock
      • String ID:
      • API String ID: 4035754557-0
      • Opcode ID: 889a127ca4a9c6a43266572cb36023da4b36a98cf600155a276aaaacc49d34fb
      • Instruction ID: 798761ec189776ba2409c0cbc05f91bd4179fbc21187f6f5fa598c9e8b295598
      • Opcode Fuzzy Hash: 889a127ca4a9c6a43266572cb36023da4b36a98cf600155a276aaaacc49d34fb
      • Instruction Fuzzy Hash: DD816D72600B4486EB6B8B2BE8543EA77A1F74DBD4F544116FBAA476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 5da6e81a022aaef1ce351c589eeb7944e23cc5a64025ecdf1f2f236d90e94871
      • Instruction ID: b8b87dc58513eed4fb687a6a33945d753a4873046ad88a201f2e0f08f500507f
      • Opcode Fuzzy Hash: 5da6e81a022aaef1ce351c589eeb7944e23cc5a64025ecdf1f2f236d90e94871
      • Instruction Fuzzy Hash: 27816C72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ErrorLast$ClipboardCloseDeleteFileGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 3770565981-0
      • Opcode ID: 18ca1be83b99402ea5ad07b0f1fcf638a688ebe9cfb7dd803df3267e2bc3bd03
      • Instruction ID: f61b7220afdec503cc89edc83018787d1fa78c42f2355f46a0543bcd045a74d5
      • Opcode Fuzzy Hash: 18ca1be83b99402ea5ad07b0f1fcf638a688ebe9cfb7dd803df3267e2bc3bd03
      • Instruction Fuzzy Hash: E0816C72604B4086EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseFileFullGlobalMessageNameOperationPathPeekUnlock
      • String ID:
      • API String ID: 1286959346-0
      • Opcode ID: b038ea897c25a4f051bfab7e23267f75cabc21236c716f2f934921040b2f0bde
      • Instruction ID: b6f6a0bfb88d0a245388f0a5da7c782283342b09a55b096d0e410e04d8ca4ffb
      • Opcode Fuzzy Hash: b038ea897c25a4f051bfab7e23267f75cabc21236c716f2f934921040b2f0bde
      • Instruction Fuzzy Hash: EC816C72604B4486EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseCreateGlobalInitializeInstanceMessagePeekUnlock
      • String ID:
      • API String ID: 2299052934-0
      • Opcode ID: 8c25b7e1abc0f4c099d1000af0f5b9e3a3dcc485513fb672d456c58540d1d3b8
      • Instruction ID: 92e492c227136f241dd02a264857f166b85da8497d57494a50260c4b0267e714
      • Opcode Fuzzy Hash: 8c25b7e1abc0f4c099d1000af0f5b9e3a3dcc485513fb672d456c58540d1d3b8
      • Instruction Fuzzy Hash: 4D816C72604B4086EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendUnlock
      • String ID:
      • API String ID: 1853169715-0
      • Opcode ID: 9f01fe5d6c3481218d3e0ac2a6b9a981e9ef4af6b637ded38f772d72be2be5e0
      • Instruction ID: 0b1dc5c025deed94107df23998ae642156be7f290e52b451d0ba96f9ea183c56
      • Opcode Fuzzy Hash: 9f01fe5d6c3481218d3e0ac2a6b9a981e9ef4af6b637ded38f772d72be2be5e0
      • Instruction Fuzzy Hash: B8816B72604B4086EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendUnlock
      • String ID:
      • API String ID: 1853169715-0
      • Opcode ID: d9b51f5bcb8650678d3bbc9622ba952210660c9ecf3de9fee473e083119ed222
      • Instruction ID: 13cda1ea6a1610234b67071ccc6795cb25708114e0994481928dc02620f3d764
      • Opcode Fuzzy Hash: d9b51f5bcb8650678d3bbc9622ba952210660c9ecf3de9fee473e083119ed222
      • Instruction Fuzzy Hash: FD816B72604B4086EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendUnlock
      • String ID:
      • API String ID: 1853169715-0
      • Opcode ID: 6b9885e766cbc4fbec65d0e4001c1d971d1884bebb7e9e552bef9cb4cc458a6d
      • Instruction ID: 24b262b7c5e757596e318cb2ce2bd0ea03273cfb75249cd9490d8e4630a3fbe3
      • Opcode Fuzzy Hash: 6b9885e766cbc4fbec65d0e4001c1d971d1884bebb7e9e552bef9cb4cc458a6d
      • Instruction Fuzzy Hash: 4C816B72604B4086EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: eea365b966bffe8abc8054f04d049e70e52231cba2b31a9f1ec20148024f9952
      • Instruction ID: 633790608702074fe87e49e77becc0582c7e2075ec42d72e934ec89ae9637e73
      • Opcode Fuzzy Hash: eea365b966bffe8abc8054f04d049e70e52231cba2b31a9f1ec20148024f9952
      • Instruction Fuzzy Hash: F3816C72604B4086EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Close$ClipboardCreateErrorGlobalHandleLastMessageMutexPeekProcessThreadUnlockWindow
      • String ID:
      • API String ID: 4284707085-0
      • Opcode ID: eb305d8de367635e09ec69fae9fde1f61d5805db35ee3ab4a9b00006bb49012d
      • Instruction ID: 183b52035ca2c78f944451fa93fcdd27079d4133cd190f465d1bd376e29b2827
      • Opcode Fuzzy Hash: eb305d8de367635e09ec69fae9fde1f61d5805db35ee3ab4a9b00006bb49012d
      • Instruction Fuzzy Hash: 05816C72600B4086EB6B9B2BE8543EA77A1F74DBD4F544116FB6A476F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Close$ClipboardCreateErrorGlobalHandleLastMessageMutexPeekProcessThreadUnlockWindow
      • String ID:
      • API String ID: 4284707085-0
      • Opcode ID: d114997a3acb784b9a4e6b4b6715b25e2016dbd4064ba393d54109c696946d78
      • Instruction ID: 846f2de042565f22a961275a1047af09ae9c864ffc1ef69e51a9b6f70f6a6821
      • Opcode Fuzzy Hash: d114997a3acb784b9a4e6b4b6715b25e2016dbd4064ba393d54109c696946d78
      • Instruction Fuzzy Hash: 81816D72600B4086EB6B9B2BE8947EA77A1F74DBD4F544116FB6A476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 072eb73b48229afd6b3efc7d8fd71b8490474625ed7a070fa68c19fa05141b01
      • Instruction ID: ac85c554914c20b8e6482e7abe274a3e175ac4d3d2f0791aaec8376a8d6531b7
      • Opcode Fuzzy Hash: 072eb73b48229afd6b3efc7d8fd71b8490474625ed7a070fa68c19fa05141b01
      • Instruction Fuzzy Hash: DF818072604B4086EB6B8B27E8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: fbc591181ef8008df52e8b2197cea14468b7d6fc745f17c03f80a7f07e1ddd8a
      • Instruction ID: 526c6c3405836014ea07bf83fdced8213f1e014747997a6eed3fbbcac3890a66
      • Opcode Fuzzy Hash: fbc591181ef8008df52e8b2197cea14468b7d6fc745f17c03f80a7f07e1ddd8a
      • Instruction Fuzzy Hash: CC818E72600B4086EB6B9B2BE8543EA77A1F74DBD4F544116FBAA476F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: c2ad0f3a19c3d927a7251a49deb2fc48f44d40573aab2cd8a34c9edfcba412cb
      • Instruction ID: 8940c8c914bc1266335fdf9f2ff752a8bdf32b682ee9586d1e6742985ad1801a
      • Opcode Fuzzy Hash: c2ad0f3a19c3d927a7251a49deb2fc48f44d40573aab2cd8a34c9edfcba412cb
      • Instruction Fuzzy Hash: 8C817C72604B4086EB6B9B27E8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$Message$ClipboardCloseGlobalPeekPostUnlock
      • String ID:
      • API String ID: 2416748954-0
      • Opcode ID: b1f4042bc06d1ce25de4bac59a000307290d547cce12a69d8de5ed69418eed69
      • Instruction ID: de3cf16d6b9c5ff825aae6414e3e83942e15f74b9589fe71d36ecfc67b86743c
      • Opcode Fuzzy Hash: b1f4042bc06d1ce25de4bac59a000307290d547cce12a69d8de5ed69418eed69
      • Instruction Fuzzy Hash: 7C816C72604B408AEB6B8B27E8543EA77A1F74DBD4F544116FB6A876F9CB38C481C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 6281f897c96e89e2748424dbcab3d0e7f4613b07a766a7c5c243fd45f6db02e0
      • Instruction ID: 6da776e0b8e9f5dedaff9e53c5ac6739cc0d3ef7ba4db5049642c37faba1931e
      • Opcode Fuzzy Hash: 6281f897c96e89e2748424dbcab3d0e7f4613b07a766a7c5c243fd45f6db02e0
      • Instruction Fuzzy Hash: D1816C72600B4086EB6B9B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: c1149da52b118afaa8911e9ba2b1929180481827b6bcd8f10f6e8b1b304f8c9a
      • Instruction ID: 2c721987df4b8e2c71acf83414b536ceb081f84ec87041b69e04dafaa180d3d8
      • Opcode Fuzzy Hash: c1149da52b118afaa8911e9ba2b1929180481827b6bcd8f10f6e8b1b304f8c9a
      • Instruction Fuzzy Hash: 9F817F72600B4086EB6B8B27E8543EA77A1F74DBD4F544116FB6A876F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 0f5d3859fb041b2571e13f6b545e445dc048f7211db0f5306287d37e16a8d096
      • Instruction ID: 3709e1b723f8e9390a3cd6944e6dc22dae7aab82ee49525444301f0720e8aea6
      • Opcode Fuzzy Hash: 0f5d3859fb041b2571e13f6b545e445dc048f7211db0f5306287d37e16a8d096
      • Instruction Fuzzy Hash: C0817F72604B4086EB6B8B27E8543EA77A1F74DBD4F544116FB6A876F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 2b0a542d08595dbeab4fa155e43e70a374fb8a7ed9c3d4df94513e84c67a96b7
      • Instruction ID: f07a39f9bf5e3dfac4b80a58fd9e7226b2c1d4a578de5d4f215d57cee7460be6
      • Opcode Fuzzy Hash: 2b0a542d08595dbeab4fa155e43e70a374fb8a7ed9c3d4df94513e84c67a96b7
      • Instruction Fuzzy Hash: 7A817E72604B4086EB6B8B2BE8543EA77A1F74DBD4F544116FB6A876F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 570fc201bd0773cc8d1eacf1edfa00e8357c6c6ead5a27cc92cc5b3273b2b3aa
      • Instruction ID: 3b8af9a61a74395145176a4120e1df11df08d458f2a80d59919908fe28c65a81
      • Opcode Fuzzy Hash: 570fc201bd0773cc8d1eacf1edfa00e8357c6c6ead5a27cc92cc5b3273b2b3aa
      • Instruction Fuzzy Hash: 0C816D72600B408AEB6B8B27E8543EA77A1F74DBD4F544116FB6A476F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: 082f7760417b26d09c9271be974fc9150a31892be1e9315aa2e39eb5c4cf02b8
      • Instruction ID: 29312dc96cf4475be0dfd2eb41d1aec4176fd1a523807ae1f7aacd7534773bc9
      • Opcode Fuzzy Hash: 082f7760417b26d09c9271be974fc9150a31892be1e9315aa2e39eb5c4cf02b8
      • Instruction Fuzzy Hash: F5817E72604B4086EB6B8B2BE8543EA77A1F74DBD4F544116FB6A476F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: f431079513b2a80e76b91737a3febb34cc286eb84957f4d36b7410681c3a908e
      • Instruction ID: 5a460d75574545a97b3ec84261e8996b14ea6679192842fec22b255b1cb826d3
      • Opcode Fuzzy Hash: f431079513b2a80e76b91737a3febb34cc286eb84957f4d36b7410681c3a908e
      • Instruction Fuzzy Hash: EF817E72600B4086EB6B9B27E8543EA77A1F74DBD4F544116FB6A476F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
      • String ID:
      • API String ID: 1623861271-0
      • Opcode ID: fdc77adc24e593422c06876d2da7aedec346a7ceeef46c1b39c5275527db9568
      • Instruction ID: 6f9e275d7c015680c372f837190083c837c65582415cd008dd0566f97d70eec3
      • Opcode Fuzzy Hash: fdc77adc24e593422c06876d2da7aedec346a7ceeef46c1b39c5275527db9568
      • Instruction Fuzzy Hash: A7716E72600A4086EB6B9B2BF8543EA77A1F74DBD4F544116FB6A876F9CB38C581C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: File$AttributesDirectoryFullNameOperationPathRemove
      • String ID: \
      • API String ID: 934956312-2967466578
      • Opcode ID: 950fbe2a09131c7ca975ea6498cc95a59f1bdbb82ece9913bce5ead5d533609e
      • Instruction ID: 5c27279721191db8c6a327e71d2fd58c43be18ea7396a26832fa7eb944a088b9
      • Opcode Fuzzy Hash: 950fbe2a09131c7ca975ea6498cc95a59f1bdbb82ece9913bce5ead5d533609e
      • Instruction Fuzzy Hash: 68214136508B8482EB618F21F4843EEB3A5FB897A0F544315F7A8939E8DB7CC559CB04
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: ErrorLast$AttributesCreateDirectoryFile
      • String ID:
      • API String ID: 635176117-0
      • Opcode ID: 3b11c64c2a0ff170e8e443d5f25b3503de84dea4b71e7e136c459b1e7fb6f5ae
      • Instruction ID: 26da94180b46e575fe681ee260f3b64afadda3062d6142fa6401042ae41f61d3
      • Opcode Fuzzy Hash: 3b11c64c2a0ff170e8e443d5f25b3503de84dea4b71e7e136c459b1e7fb6f5ae
      • Instruction Fuzzy Hash: C031653270265085EB569F27A8043ED6291EB8DBF5F1D8730BF6E477E4DA34C5868300
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: ClipboardCloseCurrentEnumGlobalProcessTimerUnlockWindows
      • String ID:
      • API String ID: 555064778-0
      • Opcode ID: d7e7000f7fa71b31ec12e4a71064e0cb0c189cabd957c8c5d92ba8092aa76622
      • Instruction ID: 01047a206442631c623d9fc8afa58638c66f59f0f7286b1fd80b421b1d7a3f5d
      • Opcode Fuzzy Hash: d7e7000f7fa71b31ec12e4a71064e0cb0c189cabd957c8c5d92ba8092aa76622
      • Instruction Fuzzy Hash: 6F213435204A8684EB56CF62F8403E973A6FB8CBD0F488426EF5A57338DE38C496C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Initializemalloc
      • String ID: No tray mem$Tray
      • API String ID: 88790506-3325046031
      • Opcode ID: 167b986c87a6eb74588f89e7d28eae0a4be65e4b0971b05b1d9752b3d69d51a0
      • Instruction ID: 8d564fe35c182dac0da390cce78c3ff29066b8a0d6f2ac66f5dbdf69229c0886
      • Opcode Fuzzy Hash: 167b986c87a6eb74588f89e7d28eae0a4be65e4b0971b05b1d9752b3d69d51a0
      • Instruction Fuzzy Hash: B6715670114B9195F70ACF56BC853C937E8B74DBA0F980229D7A88B779DF3881A5C782
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: IconNotifyShell_wcsncpy
      • String ID: AutoHotkey
      • API String ID: 1496823222-348589305
      • Opcode ID: 075b5b3920936fa44a9e075d04a30048c37492d5eb5f9a2142387f54d84d8c31
      • Instruction ID: 4301b8857f7c4c4964ba37c08bdae3cf2d9fa6469e76957ea886a5a6690bee5e
      • Opcode Fuzzy Hash: 075b5b3920936fa44a9e075d04a30048c37492d5eb5f9a2142387f54d84d8c31
      • Instruction Fuzzy Hash: FB2147B2305B8196EB4ECF22E588799B3A0F748BC0F444129EB6C477A4DF78E5A18700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: FileModuleName
      • String ID: Out of memory.
      • API String ID: 514040917-4087320997
      • Opcode ID: 71be8166a3eeb69e981d0dcf70a75407598f219585711e7dc8d66219c816f172
      • Instruction ID: a9d98e9732b2ba2ae1f5a7423cfb59b4d8c9666029569ffa1c12c0b705826e15
      • Opcode Fuzzy Hash: 71be8166a3eeb69e981d0dcf70a75407598f219585711e7dc8d66219c816f172
      • Instruction Fuzzy Hash: A6516F32205BC191EA72DB25A4403DE6391FB8C7D8F540625BB9D4BAE9EF78C645C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Info
      • String ID:
      • API String ID: 1807457897-0
      • Opcode ID: 34c8befe1a11d83a5b3b82f47ead34f6fae6d65b2cf58ffa0610502deb994a26
      • Instruction ID: f4681161839535ae7d438d46ae7b6f6548b7c604f713a3be3c44e761f14c89cf
      • Opcode Fuzzy Hash: 34c8befe1a11d83a5b3b82f47ead34f6fae6d65b2cf58ffa0610502deb994a26
      • Instruction Fuzzy Hash: 1A418C72700B4085EB66CF6AE44439977A1E769BD8F588325EB45477FACB38C881CB81
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Message$Post$SendTimeout$ProcWindow
      • String ID:
      • API String ID: 2617672042-0
      • Opcode ID: 7432dd97336e0ca5e2a9eb91291e145e923e69082e59b47daa1fb105893e3626
      • Instruction ID: 73b1888842463c5b28837fbf2b81dd9e0adbb29e1a5f7d4ffb7f8bd42a9d17ff
      • Opcode Fuzzy Hash: 7432dd97336e0ca5e2a9eb91291e145e923e69082e59b47daa1fb105893e3626
      • Instruction Fuzzy Hash: E211CE35314A8085EBB6CB3794157EA17A1E74DBD8F544826EF4A177B8EA3AC852C300
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: FocusProcWindow
      • String ID:
      • API String ID: 1691694861-0
      • Opcode ID: 225bcab6973eb43834ba56c0190f3af4fb52684eb590f06f8402701f701049ea
      • Instruction ID: dfc9ebec978cd219508c488e5498c733141f996883f141c2a8e9d2eb54b12dec
      • Opcode Fuzzy Hash: 225bcab6973eb43834ba56c0190f3af4fb52684eb590f06f8402701f701049ea
      • Instruction Fuzzy Hash: 1AF0C936350A84C5D6A6CB13A8087DA6366F74CBE4F445852DE4957778DE38C446C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Message$PostSendTimeout$ProcWindow
      • String ID:
      • API String ID: 2241355032-0
      • Opcode ID: ca085d233332e62cce712bdc81b40038db763beb2bcba65b5c17e6152b583c23
      • Instruction ID: a8ade55ef9d0d06bbdfb74d52d087e952efc8e738a2308589ca3a72f5bc3c959
      • Opcode Fuzzy Hash: ca085d233332e62cce712bdc81b40038db763beb2bcba65b5c17e6152b583c23
      • Instruction Fuzzy Hash: 3DF08231744B8085EABBDB23A5003EA1365F74DBD0F444062EF45577B8EE39C886C301
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Message$PostSendTimeout$DrawIconProcWindow
      • String ID:
      • API String ID: 2027319081-0
      • Opcode ID: 93840f57cddc85ad156b664afd2d61262233e55f4fb7935b86afe9d337ed8b53
      • Instruction ID: d115730de8c3497aae408bb222240737d8e4c787f739fd3b653b9da28ce79877
      • Opcode Fuzzy Hash: 93840f57cddc85ad156b664afd2d61262233e55f4fb7935b86afe9d337ed8b53
      • Instruction Fuzzy Hash: D6F08C31744B8085EABBDB23A5003EA2365F74DBD4F4840A2EF45577B8EE39C882C300
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Message$PostSendTimeout$ProcWindow
      • String ID:
      • API String ID: 2241355032-0
      • Opcode ID: e75be4071268f8953f4334042f8e2ae559fb982ed43dda6f635891db74cf67b2
      • Instruction ID: a7ab1dfd4c82ef0bbedd9820215de5bdd93caecb321ade0ea5c7e4f115c627fb
      • Opcode Fuzzy Hash: e75be4071268f8953f4334042f8e2ae559fb982ed43dda6f635891db74cf67b2
      • Instruction Fuzzy Hash: CAF08236310A80D4E7A7CB33A8087D66361F74DBE4F844952EF59577B8EA35C446C300
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: ProcWindow
      • String ID:
      • API String ID: 181713994-0
      • Opcode ID: 391c6090fe30daed53fa4ce6abced81021ce495aa6095ed17598a2b6c9ad0304
      • Instruction ID: ee0a50554e3a07e7c65452d425a741d61aec6aebf179a15b4fe4db57ecd21421
      • Opcode Fuzzy Hash: 391c6090fe30daed53fa4ce6abced81021ce495aa6095ed17598a2b6c9ad0304
      • Instruction Fuzzy Hash: 0BF0A936320A85C5E6A2CB22E4087DA2322F74CBE8F848852DF4813738DA34C44AC700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountMessagePostTick
      • String ID:
      • API String ID: 1233319983-0
      • Opcode ID: b83716a63eb8a871c1bfd25f7a3492fa9dec91893b3568fd43223b62b72cff8b
      • Instruction ID: 587e7bd50d9b9bf28bb34e4fa6077e1959e1091cb3dc814ceeae66323947b0fb
      • Opcode Fuzzy Hash: b83716a63eb8a871c1bfd25f7a3492fa9dec91893b3568fd43223b62b72cff8b
      • Instruction Fuzzy Hash: 06E08636314A81D8D7A2CB23A4053DE9315F74CBD0F584462EF8953769EE39C847C300
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • malloc.LIBCMT ref: 00000001400A9B2B
        • Part of subcall function 00000001400C98F4: _FF_MSGBANNER.LIBCMT ref: 00000001400C9924
        • Part of subcall function 00000001400C98F4: RtlAllocateHeap.NTDLL(?,?,00000000,00000001400CEC94,?,?,00000000,00000001400CE54D,?,?,?,00000001400CE5F7,?,?,00000000,00000001400CD9E5), ref: 00000001400C9949
        • Part of subcall function 00000001400C98F4: _callnewh.LIBCMT ref: 00000001400C9962
        • Part of subcall function 00000001400C98F4: _errno.LIBCMT ref: 00000001400C996D
        • Part of subcall function 00000001400C98F4: _errno.LIBCMT ref: 00000001400C9978
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: _errno$AllocateHeap_callnewhmalloc
      • String ID:
      • API String ID: 2243056865-0
      • Opcode ID: 7d383da78186c7f4575701015122d799cf6232100614cf6a718615fad900e78c
      • Instruction ID: 163a3bb145c1bda163164001befe0f179b58c58930136479e51ad4d3e2facb67
      • Opcode Fuzzy Hash: 7d383da78186c7f4575701015122d799cf6232100614cf6a718615fad900e78c
      • Instruction Fuzzy Hash: ADF08132B1464486EF95CF6AF0843AC63E2E798B98F185025EB0A47399DF34C8D1CB04
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • malloc.LIBCMT ref: 00000001400A9705
        • Part of subcall function 00000001400C98F4: _FF_MSGBANNER.LIBCMT ref: 00000001400C9924
        • Part of subcall function 00000001400C98F4: RtlAllocateHeap.NTDLL(?,?,00000000,00000001400CEC94,?,?,00000000,00000001400CE54D,?,?,?,00000001400CE5F7,?,?,00000000,00000001400CD9E5), ref: 00000001400C9949
        • Part of subcall function 00000001400C98F4: _callnewh.LIBCMT ref: 00000001400C9962
        • Part of subcall function 00000001400C98F4: _errno.LIBCMT ref: 00000001400C996D
        • Part of subcall function 00000001400C98F4: _errno.LIBCMT ref: 00000001400C9978
        • Part of subcall function 00000001400CA388: HeapFree.KERNEL32(?,?,00000000,00000001400CDAB0,?,?,00000000,00000001400CDAD3,?,?,?,00000001400C96DB,?,?,00000000,00000001400CF68F), ref: 00000001400CA3A6
        • Part of subcall function 00000001400CA388: _errno.LIBCMT ref: 00000001400CA3B0
        • Part of subcall function 00000001400CA388: GetLastError.KERNEL32(?,?,00000000,00000001400CDAB0,?,?,00000000,00000001400CDAD3,?,?,?,00000001400C96DB,?,?,00000000,00000001400CF68F), ref: 00000001400CA3B8
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: _errno$Heapmalloc$AllocateErrorFreeLast_callnewh
      • String ID:
      • API String ID: 2348730211-0
      • Opcode ID: 8bad3631f4926a19309b75f3824eced68846a3d98a3f1c59ee676ae69bc5aff7
      • Instruction ID: 7479429d75caca40d42044a962ba47e47f89eb35b2a8162d976cc363e75d9b69
      • Opcode Fuzzy Hash: 8bad3631f4926a19309b75f3824eced68846a3d98a3f1c59ee676ae69bc5aff7
      • Instruction Fuzzy Hash: 0DF0123171574041EB4F9FA2A4553E521A4A75DB84F081138BF590B395EF7C85D18750
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID:
      • String ID: AltSubmit$Background$Border$Bottom$Buddy$Buttons$Center$Check3$Checked$Choose$Class$Count$Default$Desc$Disabled$Gray$Grid$Group$HScroll$Hdr$Hidden$Horz$Hwnd$Icon$ImageList$Invalid option.$Invert$Left$Limit$Line$List$Lowercase$Multi$NoSort$NoTab$NoTicks$None$Number$Page$Password$Range$ReadOnly$Redraw$Report$Right$Section$Simple$Small$Smooth$Sort$Tabstop$Theme$Thick$TickInterval$Tile$ToolTip$Trans$Unregistered window class.$Uppercase$VScroll$Vertical$WantCtrlA$WantF2$WantReturn$WantTab$Wrap
      • API String ID: 0-806622952
      • Opcode ID: 9c0853f314653a71c16fd78cf42cb9c6634710ce3fc8e6089bbde66d51037bc0
      • Instruction ID: a70cef46a5d8823b9ad49777c05fef0cda66a725adcb39bce665a13eaccaaf30
      • Opcode Fuzzy Hash: 9c0853f314653a71c16fd78cf42cb9c6634710ce3fc8e6089bbde66d51037bc0
      • Instruction Fuzzy Hash: D303CC7220528085FBA6DB379158BFD2AA0AB4D7C4F958016FF52472F6EB78CA85D301
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Thread$CountTickWindow$Process$AsyncCloseHandleInputState$AddressAttachBlockCreateCurrentErrorForegroundFreeInfoKeyboardLastLayoutLibraryMessageMutexPeekProc_errno_invalid_parameter_noinfo
      • String ID: AHK Keybd$KbdLayerDescriptor$^+!#{}${Blind}${Click${Text}
      • API String ID: 4276635616-2714328142
      • Opcode ID: 02ed67d2469a4e8c73e79b75f289567356a61125a4aac9cdfedc9d1ad9404344
      • Instruction ID: 78a61c578ddf63c94f2f327055b1cd77146f88a506e7f979645740c686ed92c3
      • Opcode Fuzzy Hash: 02ed67d2469a4e8c73e79b75f289567356a61125a4aac9cdfedc9d1ad9404344
      • Instruction Fuzzy Hash: C872FE312046808AFB6B9B37A8543E93BA2E74DBC9F088119FB550F6F5DB7AC845D710
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Window$IconicLongParentPointsRectShow_errno_invalid_parameter_noinfo
      • String ID: AutoSize
      • API String ID: 3524692820-3273791893
      • Opcode ID: b4e4c80dccc2a4922672325c60072669c323f7c33dbe14c70343fab915200aa3
      • Instruction ID: 0bbf14fba76946e1ff8c93423ead14cae42458c2d04b1db945de5ee5c426cb03
      • Opcode Fuzzy Hash: b4e4c80dccc2a4922672325c60072669c323f7c33dbe14c70343fab915200aa3
      • Instruction Fuzzy Hash: 80129B33B006408BFB6A8B7AC544BED37A1F74CB88F048115EF1A53AA4DB78D9A5C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Window$Long$IconicParentPointsRectShow
      • String ID:
      • API String ID: 3713045906-0
      • Opcode ID: a60eb514f73574fe41525f6e7ba17ab2ba171b2741972dab2ad8be9ca517f571
      • Instruction ID: 532c410e5f9e23d1b21be3d92f6b2f384e5e70da3a5ea83f0a83d17082e70dd5
      • Opcode Fuzzy Hash: a60eb514f73574fe41525f6e7ba17ab2ba171b2741972dab2ad8be9ca517f571
      • Instruction Fuzzy Hash: 42128B33B006418BFB6A8B7AC544BED77A2F74CB88F048115EF1A53AA4DB74D9A5C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: __doserrno_errno_invalid_parameter_noinfo
      • String ID: U
      • API String ID: 3902385426-4171548499
      • Opcode ID: c0cd2dd0e2a445d843c4b24d5c1eb4c7a2cc0d013df596e675f1e90c99302d18
      • Instruction ID: 5cac9642e0d1360211bd6057fa48c3d934f2a187db6386d722f5efcc0377ee89
      • Opcode Fuzzy Hash: c0cd2dd0e2a445d843c4b24d5c1eb4c7a2cc0d013df596e675f1e90c99302d18
      • Instruction Fuzzy Hash: DD12C33220464586FB228F26E4443EEA7A1FBACBC4F554116FF9A476B4DB3DC546CB20
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Internet$CloseFileHandle$CountReadTick$MessageOpenPeek$Delete_wcstoi64fclose
      • String ID: *$8$AutoHotkey
      • API String ID: 338787218-1845633735
      • Opcode ID: 2924c1834e94852ee28bee52b8edd575c8a94f46ffda28f4fcaf0560c3071db4
      • Instruction ID: 688ff2ad57feb3cea66746958768dd33b706df81357d3a9dfb49618d48106a0e
      • Opcode Fuzzy Hash: 2924c1834e94852ee28bee52b8edd575c8a94f46ffda28f4fcaf0560c3071db4
      • Instruction Fuzzy Hash: 06A17F3220168186E7669B67E8547ED73A2FB8DBD4F948021FF4947AA5DF3CC586C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: MessageProcessSendTimeout$CloseCountHandleTickVirtualWindow$AllocFreeMemoryOpenReadThread
      • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
      • API String ID: 2761252263-457448710
      • Opcode ID: 8e2d3c244104d37e48c8a17b046af73bf27c2f9668867f9173b02d44f557f928
      • Instruction ID: db6ed67f50dd487d21aea3384e8d083f21c8d6d298fe59c762eb2d05725ae690
      • Opcode Fuzzy Hash: 8e2d3c244104d37e48c8a17b046af73bf27c2f9668867f9173b02d44f557f928
      • Instruction Fuzzy Hash: E862CC72204E8486EA679FA3E5143EA63B1FB4C7D4F444612EB9E17AB5EF78C495C300
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: malloc$CreateInitializeInstanceUninitialize
      • String ID: $ $ $ $ $Memory limit reached (see #MaxMem in the help file).$Out of memory.
      • API String ID: 1394887808-3083028912
      • Opcode ID: d0fdb1249d6e40f85268c43500ed9294abec3170a4242f36e0486dd330022261
      • Instruction ID: 63b2f1cd4fab8468095727c92ae0e7f8a9c26e5d3b3316968bcdd9b9542d9b67
      • Opcode Fuzzy Hash: d0fdb1249d6e40f85268c43500ed9294abec3170a4242f36e0486dd330022261
      • Instruction Fuzzy Hash: 00C2DC32304B8482FB638B26D0487FA63A2FB5D7D8F554212EB5A176F5DB78C585E301
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Menu$Item$Count$Window_errno$ErrorForegroundFreeHeapLastMessagePostSystemVisible_invalid_parameter_noinfomalloc
      • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
      • API String ID: 956903013-457448710
      • Opcode ID: 66b6c605174590c948f45c3afc713edf4f8239c7afb8314684db160b83b7aec6
      • Instruction ID: 39bdea7388e691cd618ec09c44664cf99d8ce3cef4532830f8afb7b260e3beb1
      • Opcode Fuzzy Hash: 66b6c605174590c948f45c3afc713edf4f8239c7afb8314684db160b83b7aec6
      • Instruction Fuzzy Hash: 59F1CE32204B8496EB669B27E4403EA63A1FB4CBD4F548621EB9A57BF5DF3CC4918350
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Metrics$IconicObjectPropSelectSystemTextVisibleWindow
      • String ID: ahk_dlg
      • API String ID: 4281603998-2093416220
      • Opcode ID: 388a6b952f8d86f91f324a756bdb61d6ce2715b891f2c80b9376e876d4d949d1
      • Instruction ID: 1b6c3d50cbcc00bfff6018689a18d044e4ef112e6d21768b55e253493bca898d
      • Opcode Fuzzy Hash: 388a6b952f8d86f91f324a756bdb61d6ce2715b891f2c80b9376e876d4d949d1
      • Instruction Fuzzy Hash: C5619E367006808AF7569B76D8547EC27B2FB8DB98F148119EB0A97BA8DF34C955C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Metrics$IconicObjectPropSelectSystemTextVisibleWindow
      • String ID: ahk_dlg
      • API String ID: 4281603998-2093416220
      • Opcode ID: 694cb15707eb2123105ebc48a55c18ff1b8391afd9d0431ea6d260a8c2472e6f
      • Instruction ID: 343015a6360ccf85803fafab88b0745f1c2c77316236fe982791e8918d461631
      • Opcode Fuzzy Hash: 694cb15707eb2123105ebc48a55c18ff1b8391afd9d0431ea6d260a8c2472e6f
      • Instruction Fuzzy Hash: 54617C36B006808AE756DB76D8947EC3772FB8DB98F148119EB0A977A8DF34C5558700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Window$Metrics$IconicLongMessageObjectPointsPropSelectSendSystemTextVisible
      • String ID: ahk_dlg
      • API String ID: 662570815-2093416220
      • Opcode ID: cd1ed712ea032a59148400ab419acb7851f52d08a955457f67b7bf9a6543041e
      • Instruction ID: 30b4280ea2257720b23cf8c651bcb625b041018c274567c46f05af2a4ea4e1c0
      • Opcode Fuzzy Hash: cd1ed712ea032a59148400ab419acb7851f52d08a955457f67b7bf9a6543041e
      • Instruction Fuzzy Hash: 95519C36B006808AE752DB76D8947EC37B2FB8DB98F148119EB0A97BA8DF34C555C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Window$Metrics$IconicLongMessageObjectPointsPropSelectSendSystemTextVisible
      • String ID: ahk_dlg
      • API String ID: 662570815-2093416220
      • Opcode ID: f3373da5eeb2be26852ea396d4e860bcf17a01722aeed4da9efba06baf3c2491
      • Instruction ID: 941eea4a58e6f9a932204d737e6069433f77235053d411a0f4d31e1437f5d424
      • Opcode Fuzzy Hash: f3373da5eeb2be26852ea396d4e860bcf17a01722aeed4da9efba06baf3c2491
      • Instruction Fuzzy Hash: 84518E36B006808AE756DB76D8947EC37B2F78DB98F148119EB0997BA8DF34C555C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Window$Long$Library$AddressCreateDestroyDialogFreeIndirectLoadParamProcProp
      • String ID: EnableThemeDialogTexture$ahk_dlg$uxtheme
      • API String ID: 1526099453-393749399
      • Opcode ID: 3d3b39cafc0a21a4fd9f3266b8a1501c2fa0e5db01f660c007338c104bcd3e42
      • Instruction ID: b4554619df3248d9d563d9d29817cbe6f4cc27d50b384ac534d0befb032c5b78
      • Opcode Fuzzy Hash: 3d3b39cafc0a21a4fd9f3266b8a1501c2fa0e5db01f660c007338c104bcd3e42
      • Instruction Fuzzy Hash: 35313D31211B8085EB129F27E8587AE33A6FB8DBD0F548525EB5D477A4DF79C846C300
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID:
      • String ID: $$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$Error text not found (please report)$LF)$NO_START_OPT)$UCP)$UTF16)$no error
      • API String ID: 0-3688278424
      • Opcode ID: cdbe989fd8f1adf1315b4597bbadee4bc7b0d518324d0eb2e3774e1c19b2ab4b
      • Instruction ID: 997b5a540507012843bd2fcd4e70456e351b2b707638b24b8e62efd58ac8284b
      • Opcode Fuzzy Hash: cdbe989fd8f1adf1315b4597bbadee4bc7b0d518324d0eb2e3774e1c19b2ab4b
      • Instruction Fuzzy Hash: C6829B72614F908AE726CFA6D4403EEB7B4F758798F504126FB8987BA4EB38D944C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: File_set_error_mode$CurrentHandleModuleNameProcessWrite
      • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
      • API String ID: 2183313154-4022980321
      • Opcode ID: 5581d4f1006f7f59a48cc31dd52fee1bf7c62befc4307cb66362e97be309267b
      • Instruction ID: ff798c847dcfd3e41cc53670097425550252e969d1d32bbb85fec9bbe46c83a5
      • Opcode Fuzzy Hash: 5581d4f1006f7f59a48cc31dd52fee1bf7c62befc4307cb66362e97be309267b
      • Instruction Fuzzy Hash: 3B51BE3131878082FB6ADB27A8117DE7396FB8DBD0F544526BF4943BA5DF38C6068600
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: _wcstoi64malloc
      • String ID: $Memory limit reached (see #MaxMem in the help file).$Out of memory.
      • API String ID: 4111414685-1193006554
      • Opcode ID: 6921d2ac176e67964dd7940825ff1be71b65bfef5117f5cc6cc67cd1bf16a1f5
      • Instruction ID: dc4a5fbb56ba3fad57ec6328a1702734d500521029dd61360cef89497a70b615
      • Opcode Fuzzy Hash: 6921d2ac176e67964dd7940825ff1be71b65bfef5117f5cc6cc67cd1bf16a1f5
      • Instruction Fuzzy Hash: D1329B72604B8086EB76DB26D5143E973A2F74CBD8F544213EB5A177F9DA3AC886C340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: ProcessProcess32$ClassCloseCreateCurrentFirstHandleNextOpenPrioritySnapshotToolhelp32malloc
      • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
      • API String ID: 2654119868-457448710
      • Opcode ID: 7f7f67783e046d24459ae325446d264f02b5fb75057d9c053b0fc468008b1c5b
      • Instruction ID: 5f74867d58a48ebe5041723945bbf8e534444e9ba551feab0c8959c0492cc0c3
      • Opcode Fuzzy Hash: 7f7f67783e046d24459ae325446d264f02b5fb75057d9c053b0fc468008b1c5b
      • Instruction Fuzzy Hash: FD91D072304B8086FB638B27D6143ED6396BB5D7D8F4A4532FB1A0B6F5EA78C4418348
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID:
      • String ID: Max hotkeys.$Memory limit reached (see #MaxMem in the help file).$Out of memory.$The AltTab hotkey "%s" must have exactly one modifier/prefix.$The AltTab hotkey "%s" must specify which key (L or R).
      • API String ID: 0-3864134736
      • Opcode ID: 816e9869e3d7c710272f99d2fba30b9fc35daa2e2b0dc593368268c7f5f19107
      • Instruction ID: 0f2ba2f35babb6e35fbc1149bba8974d81404a9330d6bc132b6322c87452410e
      • Opcode Fuzzy Hash: 816e9869e3d7c710272f99d2fba30b9fc35daa2e2b0dc593368268c7f5f19107
      • Instruction Fuzzy Hash: 9612D1726086B092FB679B2790143EA27A1F74D7D4F448616FBD90B6F5CBBAC891C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: From$CreateInstanceString$Prog
      • String ID:
      • API String ID: 3834119650-0
      • Opcode ID: e9c398f4b58003f7443d3e2bf6561f5cb0e3352f38afacd7018d328c99e1f774
      • Instruction ID: ac5922112baad4ed4681dd4dc485ef7d4405daea380aee3ae217490425c84e23
      • Opcode Fuzzy Hash: e9c398f4b58003f7443d3e2bf6561f5cb0e3352f38afacd7018d328c99e1f774
      • Instruction Fuzzy Hash: D9516937215B4582EB669F27E4187ED73A1FB88BC4F548019EB49077AAEF79C644CB00
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: BlockInput
      • String ID:
      • API String ID: 3456056419-0
      • Opcode ID: 2e2619190b5dce62074c304cdaf6cf6b7f754726ce2496bc6dcbbeeb17e02182
      • Instruction ID: 8db56e4b293fc16af5ea9314173d5609e07fcdbc4b0be01c6743b93214b248b8
      • Opcode Fuzzy Hash: 2e2619190b5dce62074c304cdaf6cf6b7f754726ce2496bc6dcbbeeb17e02182
      • Instruction Fuzzy Hash: 3A618F715086C08AE7BB8B27B8847EA7BA1B35DBD4F040115EF950B7B5D63ECA45CB10
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: _wcstoi64
      • String ID: 0
      • API String ID: 1512447906-4108050209
      • Opcode ID: 4ff8b4a688f08073bd11c93d969739cf3ab671742a555c03bb25c48ccd950a40
      • Instruction ID: 1541da35cc747ad598c25ec8b4a13abea5abb3cf6d8859bc023e50ea464ababb
      • Opcode Fuzzy Hash: 4ff8b4a688f08073bd11c93d969739cf3ab671742a555c03bb25c48ccd950a40
      • Instruction Fuzzy Hash: CEA19F76A0455141FBBB2A3B91113FE2191EB6D7C5F8A8036FF82531F5FA748882990F
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b755e3c87153a68fc1b1ff6373c1595d19dfb8b3c42b8bd0ba14be5e6421088c
      • Instruction ID: 2d2f3ecea6f8a63f2237614f8041273b31989ec03800b21762bd14bb9e2c3deb
      • Opcode Fuzzy Hash: b755e3c87153a68fc1b1ff6373c1595d19dfb8b3c42b8bd0ba14be5e6421088c
      • Instruction Fuzzy Hash: C1329C36B10A91CBE7218FAA94407ED37B1F348BD8F614126EF5997BA8DB74C941CB40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: MessageSend$ObjectSelectWindow$CreateMetricsMoveReleaseText
      • String ID: Can't create control.$SysMonthCal32
      • API String ID: 882432197-3692857110
      • Opcode ID: 6b2314eceff9eed1d9d37746a94222c8e698c6e1e89d2c21c26601dd850b8478
      • Instruction ID: 9daf20a8eb0b430d085b12a06023c23bcd2f89e50cbce29571762156b99b8000
      • Opcode Fuzzy Hash: 6b2314eceff9eed1d9d37746a94222c8e698c6e1e89d2c21c26601dd850b8478
      • Instruction Fuzzy Hash: D6C14A367007808AEB62CF26E9407DD33A1F78C798F148116EF499BBA8DB34D991CB00
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: ObjectText$CapsCreateDeviceFaceMetricsSelectStock_errno_invalid_parameter_noinfo
      • String ID: DISPLAY$Hide
      • API String ID: 2877261776-1671811882
      • Opcode ID: 0f449452ca249aad3ac27d9fb622ae29698c30e4f1e9548a9f5e996f8a46743b
      • Instruction ID: 18e6cabf330ffeb8f1893f4d937456af86b80d2a8ceb73fdaf2dc2446ca45b1e
      • Opcode Fuzzy Hash: 0f449452ca249aad3ac27d9fb622ae29698c30e4f1e9548a9f5e996f8a46743b
      • Instruction Fuzzy Hash: F9419E35600741CAEB6A8F62E4503ED37A1F75DB88F918029EF4A47BB8DB79C881C754
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Window$Long$ErrorLast$InvalidateRect
      • String ID: +-^$7
      • API String ID: 189950902-219994616
      • Opcode ID: 64b95e1410672d16fa78a0b5d8848199f3c403b7a6a22032e512b73db9f44ec5
      • Instruction ID: 67370371f2549f1f11f17ea194c75cb28901b8187bf69e12c89a08b6ea4c8d1c
      • Opcode Fuzzy Hash: 64b95e1410672d16fa78a0b5d8848199f3c403b7a6a22032e512b73db9f44ec5
      • Instruction Fuzzy Hash: FE31F23130064082F6769B27A8403FE6291BBCCBD8F598535FF0A872B6DF7CD482A604
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: _errno$_invalid_parameter_noinfo$ByteCharErrorLastMultiWide
      • String ID:
      • API String ID: 2295021086-0
      • Opcode ID: 569ddca6b35fd994ed6ef3b9bf852d5c89e6ea019961a0f45e743062bd4552c7
      • Instruction ID: 443a1a4cf19aaa4f0f629d9003c6968925001c0d4b9549c986225ecc5cce6747
      • Opcode Fuzzy Hash: 569ddca6b35fd994ed6ef3b9bf852d5c89e6ea019961a0f45e743062bd4552c7
      • Instruction Fuzzy Hash: 3E51B4726017418AFB679F66C4407EC36A1AF4C7E8F548225FB5D07AFAEB3884438721
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: MessageSend
      • String ID:
      • API String ID: 3850602802-0
      • Opcode ID: f993015a46956e3bc97ef4dd5510cb2dd11d1168c91ee112a1f33e74e4bc7202
      • Instruction ID: 5b4ca2d9224777c433b65e8ee3a2dc59392b4ebacb15cca1a8b41f6f92169f04
      • Opcode Fuzzy Hash: f993015a46956e3bc97ef4dd5510cb2dd11d1168c91ee112a1f33e74e4bc7202
      • Instruction Fuzzy Hash: 90417576714A4482F7618FA7E651BEE3762E7C9FC4F049026AF0947BA5CE35C4A28350
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Object$DeleteText$CapsCreateDeviceFaceIconInfoMetricsRectSelectStock
      • String ID: DISPLAY
      • API String ID: 2624006087-865373369
      • Opcode ID: 98d53c2107eed14f1135ddcebc93b13cde2dac229000c0c206295ecfac3ee376
      • Instruction ID: c46a05f7cc267419aa90a7256705b903e130f1f8972fa2c423152d34b92fe768
      • Opcode Fuzzy Hash: 98d53c2107eed14f1135ddcebc93b13cde2dac229000c0c206295ecfac3ee376
      • Instruction Fuzzy Hash: AD51BF367407418AFB2A8F62D4503ED37A1E79DB88F518129EF4647BB8DB38C481CB44
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b3559077afc91f2687e6953eaae759b7b6464039682bc56406f54fb7b85149da
      • Instruction ID: a78af958f985def3df44dbd53db0d2877ce6f727ba5e73d292cf3a03a32be679
      • Opcode Fuzzy Hash: b3559077afc91f2687e6953eaae759b7b6464039682bc56406f54fb7b85149da
      • Instruction Fuzzy Hash: 509101B2610681C6EB2ACB23E514BE933A1FB8DBD4F448521EB8A47BB5CF38C545C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Object$CreateDeleteText$CapsDeviceFaceFontIconInfoMetricsRectSelectStock
      • String ID: DISPLAY
      • API String ID: 3544818348-865373369
      • Opcode ID: 39679ee8ed12cd056e9910cae8218503f2001ef782f405bf793b45506097a04f
      • Instruction ID: 4a051cfcb0eaca6c5c9e16d7b99284bc12f64e95153e5900f6763bbb9fd2f602
      • Opcode Fuzzy Hash: 39679ee8ed12cd056e9910cae8218503f2001ef782f405bf793b45506097a04f
      • Instruction Fuzzy Hash: A141C43660174186EB6A9F62D4513ED37E0F79DB88F958029EF49477B8DB38C881C744
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Object$Create$FontSelectText$Delete$Draw$CapsDeviceFaceIconInfoMetricsRectStock
      • String ID: DISPLAY
      • API String ID: 287169048-865373369
      • Opcode ID: a4ebd444dbf5a892b5084ce7ae9dc2efbef0ff1468b7879e59a9d907abcd4d97
      • Instruction ID: 3b4c815120308d3a35270738515f55e0e2b521e4c275e7864e76d7e05d711a06
      • Opcode Fuzzy Hash: a4ebd444dbf5a892b5084ce7ae9dc2efbef0ff1468b7879e59a9d907abcd4d97
      • Instruction Fuzzy Hash: 5E31A136601741CAEB6A8F62E4507ED37A1F75DB88F918028EF4603BB8DB78C881C744
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetStartupInfoW.KERNEL32 ref: 00000001400CF009
        • Part of subcall function 00000001400CECE4: Sleep.KERNEL32(?,?,00000000,00000001400CDA77,?,?,00000000,00000001400CDAD3,?,?,?,00000001400C96DB,?,?,00000000,00000001400CF68F), ref: 00000001400CED29
      • GetFileType.KERNEL32 ref: 00000001400CF174
      • InitializeCriticalSectionAndSpinCount.KERNEL32 ref: 00000001400CF1B2
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountCriticalFileInfoInitializeSectionSleepSpinStartupType
      • String ID:
      • API String ID: 3473179607-0
      • Opcode ID: 780561d2c27848dcd39b9dbc2a2636a36aabcad9cb61658c5acb17392329911c
      • Instruction ID: 1d1be620e2b4c97c3ddc68b89bc1110c7da95542d38aaf378495fea7d8e46fbc
      • Opcode Fuzzy Hash: 780561d2c27848dcd39b9dbc2a2636a36aabcad9cb61658c5acb17392329911c
      • Instruction Fuzzy Hash: F8817C72204B8586EB1ACF26D8847A937A1F74CBB4F588325EB7A472F5EB38C455D301
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: __doserrno_errno
      • String ID:
      • API String ID: 921712934-0
      • Opcode ID: 96f3c619d4730691ea0ab39e746b07c26a9c82994b5e2e28ec79f301d66cb599
      • Instruction ID: 61810cb3606c2d959b1fad13ee93cd39b502097a8d7ef20277c545dd3fbbb35e
      • Opcode Fuzzy Hash: 96f3c619d4730691ea0ab39e746b07c26a9c82994b5e2e28ec79f301d66cb599
      • Instruction Fuzzy Hash: F421CF3221465446E71B6F2798913EE7961AB8CBF1F494729BF390B3F2CB7884438721
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: wcsncpy$malloc
      • String ID: Out of memory.
      • API String ID: 3893603446-4087320997
      • Opcode ID: b042ff4820e0682f67c073ad6f3c1d0de4b209f643d301f0a11639aac15e746f
      • Instruction ID: 14198d351710c859554830b83d1b07749f2ee7e081375022db9045073fd24bd5
      • Opcode Fuzzy Hash: b042ff4820e0682f67c073ad6f3c1d0de4b209f643d301f0a11639aac15e746f
      • Instruction Fuzzy Hash: F8C1AF7260069185EB679F26E4003EA33E1FB5DBD8F498512FB59876E5EB78CA81C301
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: DisplayEnumMonitors
      • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
      • API String ID: 2950131505-457448710
      • Opcode ID: 995783026674245a5d85e6fbe2f4a6a02867981b2ede4f6a1239627f0557edf9
      • Instruction ID: 5ec8ecba5ccaee74e7f2f36ab51f39b8b621e8c05e63d2cd12d947db5b864784
      • Opcode Fuzzy Hash: 995783026674245a5d85e6fbe2f4a6a02867981b2ede4f6a1239627f0557edf9
      • Instruction Fuzzy Hash: 22910E32704B4485FB63CB66E5153E96361A74DBE8F984222EF1D176E9DF39C886C340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: AddressHandleModuleProc
      • String ID: AtlAxGetControl$atl
      • API String ID: 1646373207-1501572552
      • Opcode ID: 9fb0064a145477a89debcc0b8e928a7afc2a78d4d2fa918632ad5cf76324deda
      • Instruction ID: a8bfa4c716bb2a7a3371df640928aa57c2b607b6b3af5ccf09651717095a4522
      • Opcode Fuzzy Hash: 9fb0064a145477a89debcc0b8e928a7afc2a78d4d2fa918632ad5cf76324deda
      • Instruction Fuzzy Hash: C2313D72201B0582EF469F6AE85439967A0FB8CBC9F184425EF4E473A4EF3CC585C790
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: ClassMessageNameSendTimeout
      • String ID: Combo$List
      • API String ID: 1632441287-1246219895
      • Opcode ID: fe6dec04dbfcb27015ce7c741fc8c4a9eb790a48653b37d5af99254213ea5a52
      • Instruction ID: 6b14a30170b4a3499adfbac4450d0fc46c8932112e0d4223927cd8c8cb562b71
      • Opcode Fuzzy Hash: fe6dec04dbfcb27015ce7c741fc8c4a9eb790a48653b37d5af99254213ea5a52
      • Instruction Fuzzy Hash: DF319131310A4085FB269B26A450BEA2361E78D7E8F54531AEF2A07BF5DF3DC546C781
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: Time$File$LocalSystem_swprintf
      • String ID: %04d%02d%02d%02d%02d%02d
      • API String ID: 1396123627-4847443
      • Opcode ID: cea9c1139b640c3ff6f130b677b2a80d750d402cc05b4dcf9db681a2e775cfeb
      • Instruction ID: 6d2462c4580b39a0513a4a72c03100e2aa848b7e7dae2fae746767d9a354a5ec
      • Opcode Fuzzy Hash: cea9c1139b640c3ff6f130b677b2a80d750d402cc05b4dcf9db681a2e775cfeb
      • Instruction Fuzzy Hash: FF31847220868481DB659F16E8503AEB7B2F7CABA0F144216FBAD47BE4DB3CC450DB10
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: CountTick$HookUnhookWindows
      • String ID:
      • API String ID: 4100890187-0
      • Opcode ID: e6d995f663e52b511d71d64dcde1081002d16a26a67de2394373dfde87e44bdc
      • Instruction ID: 806c98f0e59efbe05f18fcd56d670788d5d5accf6baab1ce4199ddf259e1282c
      • Opcode Fuzzy Hash: e6d995f663e52b511d71d64dcde1081002d16a26a67de2394373dfde87e44bdc
      • Instruction Fuzzy Hash: 0E81D271514A908AE75ACF26F4407A977F1F34CB85F148126EB8A4B7B9D73EC882CB10
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: ArraySafe$CreateDestroy_wcstoi64
      • String ID:
      • API String ID: 2980161006-0
      • Opcode ID: fa79dfdd818fda1223ebafd32a1d93f201dddf99b116e53d6235f19a055bfeac
      • Instruction ID: 013caffe27693f741bd030a9c6d5561f79ad45796333acdf2c575bb21932f3b6
      • Opcode Fuzzy Hash: fa79dfdd818fda1223ebafd32a1d93f201dddf99b116e53d6235f19a055bfeac
      • Instruction Fuzzy Hash: 66515973605B4186EF6A9F1695143EA77A1F7CCFC4F58A426EB4A077A1DB38CA52C300
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: _errno_fileno_flush_invalid_parameter_noinfo
      • String ID:
      • API String ID: 329365992-0
      • Opcode ID: f110fd1979069de755ee0eeb97a4febbd34db1ad4f6975d0825c039cbb75966d
      • Instruction ID: 6193ee16e510ec1f110b17263a47af7f50984df4acf2b75deac213544fc177cc
      • Opcode Fuzzy Hash: f110fd1979069de755ee0eeb97a4febbd34db1ad4f6975d0825c039cbb75966d
      • Instruction Fuzzy Hash: 72412A3132874086FA2E9E27D5547AAB691B74EBD4F2C4224FF56877F7D638C4828600
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: File$CloseCreateErrorHandleLastWrite
      • String ID:
      • API String ID: 1150274393-0
      • Opcode ID: 6c291da7dc04bf73cdfc85c294eaece946bf27ead5f565dce4c3447c35db2878
      • Instruction ID: ecdcb73defcf8d59bb4a4e6cb53c41b62ed6fa20359501fdac7c5f98df77d087
      • Opcode Fuzzy Hash: 6c291da7dc04bf73cdfc85c294eaece946bf27ead5f565dce4c3447c35db2878
      • Instruction Fuzzy Hash: AA41037230469082F766DF27A9003EA6291B78DBE4F584229EF6E47BE5DB38C4498700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: _errno$_invalid_parameter_noinfo
      • String ID:
      • API String ID: 2819658684-0
      • Opcode ID: a6134015f8465b33c1a45b495b759b2d226e53d16e56ca6402deac43e627d807
      • Instruction ID: a7afbb755975d8c9bdae54d1e6862d9b522f0d38b2164309737b1f4c3d3eb9cf
      • Opcode Fuzzy Hash: a6134015f8465b33c1a45b495b759b2d226e53d16e56ca6402deac43e627d807
      • Instruction Fuzzy Hash: D021DF3521874582FA1BAB13AC013DFA2A17B4CBD4F148025BF49477B6EF3CC8829B10
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: _wcstoi64
      • String ID: 0
      • API String ID: 1512447906-4108050209
      • Opcode ID: b919a8a227bbd832ff23e623d05075d7aaf48c76ff6371047bfbf187e74a5bb1
      • Instruction ID: 7977425857ede425d25b9d0f42fb4c7c679c295b364bcfa789275b16eca6ff67
      • Opcode Fuzzy Hash: b919a8a227bbd832ff23e623d05075d7aaf48c76ff6371047bfbf187e74a5bb1
      • Instruction Fuzzy Hash: CE818E76A94A1041EBB79B1BA4013FA62D4E758BD5F858522FF98472E5E77CC8C3C304
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: wcsncpy
      • String ID: This line does not contain a recognized action.${
      • API String ID: 322933527-101845141
      • Opcode ID: 96e2bdb50d99c289e95d7e86cc5b735fd7cf83b33a56022ef4805bb74e4ca144
      • Instruction ID: 3d5f31f157523ccd65dd07e6069d956ba6fd8be792831804eadbaea2e05837be
      • Opcode Fuzzy Hash: 96e2bdb50d99c289e95d7e86cc5b735fd7cf83b33a56022ef4805bb74e4ca144
      • Instruction Fuzzy Hash: 1441D62971928085E7318F5AE5003AA7261EB5C7D0F54221AFFA9C7BE8E73DCD51C709
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: _getptd
      • String ID: csm$csm
      • API String ID: 3186804695-3733052814
      • Opcode ID: 7e1f889b508aeba28d83891655026512b41181a10c57c3dd5106c4fa42a59377
      • Instruction ID: fb50801649d1b73dade7f2fb63442e086847a000bb47dd3fb8850ecfb4f76342
      • Opcode Fuzzy Hash: 7e1f889b508aeba28d83891655026512b41181a10c57c3dd5106c4fa42a59377
      • Instruction Fuzzy Hash: B431B0772006448AEB619F26C4803DC3BB5F758BA9F8A1215EB0D0BBA9CB71C8C1C794
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1685021156.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1685008187.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685083031.00000001400F1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140110000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685117009.0000000140119000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685144559.000000014011D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685156575.0000000140125000.00000010.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140128000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1685168451.0000000140132000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_Setup.jbxd
      Similarity
      • API ID: DefaultLanguageSystem_errno_invalid_parameter_noinfo_swprintf
      • String ID: %04hX
      • API String ID: 4090150443-3571374829
      • Opcode ID: 44e1746b1bc1057d36d6c9533498aa13510817d948778beb393e8cc75e389ccf
      • Instruction ID: 9e90dff6b33367a3cbf66256eb095ead16fcbb450e59e5a3cf4c7c932f386092
      • Opcode Fuzzy Hash: 44e1746b1bc1057d36d6c9533498aa13510817d948778beb393e8cc75e389ccf
      • Instruction Fuzzy Hash: 2FD022F4B0120042FE2E93D7A8013F402029F0C7C1F480020AF050BAB0DA3C85C94724
      Uniqueness

      Uniqueness Score: -1.00%