Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe

Overview

General Information

Sample name:SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
Analysis ID:1430577
MD5:a3bd864b819f0dc53482b5e06ffef509
SHA1:9a2594c8af8a053d698c1d96bf828286846cc066
SHA256:a7b222438781b93d33725b049c45112df2f76e267af62406098613e635dc3c31
Tags:exe
Infos:

Detection

Score:6
Range:0 - 100
Whitelisted:false
Confidence:20%

Compliance

Score:47
Range:0 - 100

Signatures

Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
Sample has functionality to log and monitor keystrokes, analyze it with the 'Simulates keyboard and window changes' cookbook
  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Compliance

barindex
Source: SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\license.txtJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\Readme.txtJump to behavior
Source: SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeStatic PE information: certificate valid
Source: Binary string: X:\zoc\v5\showem\showem.pdb source: showem.dll.2.dr
Source: Binary string: X:\zoc\v5\devmodem\devmodem.pdb source: devmodem.dll.2.dr
Source: Binary string: X:\zoc\v5\devssh\sshdll\sshdll.pdb source: sshdll.dll.2.dr
Source: Binary string: X:\zoc\v5\devtlnet\devtlnet.pdb source: devtlnet.dll.2.dr
Source: Binary string: X:\zoc\v5\devrcmd\devrcmd.pdb source: devrcmd.dll.2.dr
Source: Binary string: w:\setup\sfxmake\Release\sfxmakeheader.pdb source: SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
Source: Binary string: X:\zoc\v5\devisdn2\devisdn2.pdb source: devisdn2.dll.2.dr
Source: Binary string: X:\zoc\v5\emuqnx\emuqnx.pdb source: emuqnx.dll.2.dr
Source: Binary string: X:\ZOC\V5\zocdll.pdb source: setup.exe, 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmp, zocdll.dll.2.dr
Source: Binary string: X:\ZOC\V5\zocdll.pdb3 source: setup.exe, 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmp
Source: Binary string: X:\zoc\v5\devnpipe\devnpipe.pdb source: devnpipe.dll.2.dr
Source: Binary string: X:\ZOC\V5\phimport\phimport.pdb source: phimport.dll.2.dr
Source: Binary string: X:\zoc\v5\emuansi\emuansi.pdb source: emuansi.dll.2.dr
Source: Binary string: X:\zoc\v5\emuvt\emuvt.pdb source: emuvt.dll.2.dr
Source: Binary string: X:\zoc\v5\xfrsealink\xfrsealink.pdb source: xfrsealink.dll.2.dr
Source: Binary string: w:\setup\release\setup.pdb source: setup.exe
Source: Binary string: X:\zoc\v5\emu5250\emu5250.pdb source: emu5250.dll.2.dr
Source: Binary string: X:\zoc\v5\emu3270\emu3270.pdb source: emu3270.dll.2.dr
Source: Binary string: X:\zoc\v5\xfrxyz\xfrxyz.pdb source: xfrxyz.dll.2.dr
Source: Binary string: X:\zoc\v5\xfrkerm\xfrkerm.pdb source: xfrkerm.dll.2.dr
Source: Binary string: X:\zoc\v5\emutty\emutty.pdb source: emutty.dll.2.dr
Source: Binary string: X:\zoc\v5\devssh\devssh.pdb source: devssh.dll.2.dr
Source: Binary string: X:\zoc\v5\osys\osyswin.pdb source: osyswin.dll.2.dr
Source: Binary string: X:\zoc\v5\emuwyse\emuwyse.pdb source: emuwyse.dll.2.dr
Source: Binary string: w:\setup\Release\order.pdb source: order.exe.2.dr
Source: Binary string: X:\zoc\v5\devtapi\devtapi.pdb source: devtapi.dll.2.dr
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004381D7 __getdrive,FindFirstFileA,_strlen,_IsRootUNCName,GetDriveTypeA,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,2_2_004381D7
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004311A5 _malloc,_strlen,_malloc,_strcat,FindFirstFileA,_strcat,2_2_004311A5
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00436D80 __getdrive,FindFirstFileA,_strlen,_IsRootUNCName,GetDriveTypeA,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,2_2_00436D80
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00411C5B __EH_prolog3,_calloc,FindFirstFileA,2_2_00411C5B
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00421CF7 recv,2_2_00421CF7
Source: setup.exeString found in binary or memory: http://crl.thawte.com/ThawteCodeSigningCA.crl0
Source: setup.exeString found in binary or memory: http://crl.thawte.com/ThawtePremiumServerCA.crl0
Source: setup.exeString found in binary or memory: http://ocsp.thawte.com0
Source: The REXX Language (3rd Party Tutorial).url.2.drString found in binary or memory: http://www.borg.com/~jglatt/rexx/scripts/language/language.htm
Source: Introduction to REXX.PDF.2.drString found in binary or memory: http://www.borg.com/~jglatt/rexx/scripts/language/language.htm.)
Source: setup.cfg, setup.exe, setupenglish.dllString found in binary or memory: http://www.emtec.com
Source: setup.exe, 00000002.00000003.2307631408.00000000047E0000.00000004.00000800.00020000.00000000.sdmp, Homepage EmTec.URL.2.drString found in binary or memory: http://www.emtec.com/
Source: Readme.txt.2.drString found in binary or memory: http://www.emtec.com/common/contact.html
Source: order.exe.2.drString found in binary or memory: http://www.emtec.com/common/order.htm
Source: order.exe.2.drString found in binary or memory: http://www.emtec.com/common/order.html
Source: order.exe.2.drString found in binary or memory: http://www.emtec.com/common/order.htmlhttp://www.emtec.com/common/order.htm
Source: Readme.txt.2.drString found in binary or memory: http://www.emtec.com/common/support.html
Source: advertise_pyrotrans.cfgString found in binary or memory: http://www.emtec.com/pyrotrans/index.htm
Source: setup.exe, 00000002.00000002.3264393540.0000000001FB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.emtec.com/pyrotrans/index.htmS
Source: advertise_pyrotrans.cfgString found in binary or memory: http://www.emtec.com/pyrotrans/index.html
Source: setup.exe, 00000002.00000002.3264059138.000000000066B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.emtec.com/pyrotrans/index.html.1
Source: setup.exe, 00000002.00000002.3264059138.000000000066B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.emtec.com/pyrotrans/index.htmlV
Source: setup.exe, 00000002.00000002.3264474052.0000000002350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.emtec.com/pyrotrans/index.htmlnn
Source: setup.exe, 00000002.00000002.3264059138.000000000066B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.emtec.com/pyrotrans/index.htmls
Source: setup.cfgString found in binary or memory: http://www.emtec.com/zoc/index.htm
Source: setup.cfgString found in binary or memory: http://www.emtec.com/zoc/index.html
Source: Register.txt.2.drString found in binary or memory: http://www.emtec.com/zoc/order.html
Source: setup.exeString found in binary or memory: http://www.emtec.comPublisherEmTec
Source: zocdll.dll.2.drString found in binary or memory: http://www.emtec.comStandbyvalue
Source: Another Rexx Tutorial.url.2.drString found in binary or memory: http://www.kilowattsoftware.com/tutorial/rexx/
Source: sshdll.dll.2.dr, zocdll.dll.2.drString found in binary or memory: http://www.openssl.org/support/faq.html
Source: zocdll.dll.2.drString found in binary or memory: http://www.openssl.org/support/faq.html....................
Source: Introduction to REXX.PDF.2.drString found in binary or memory: http://www.pdfpdf.com)
Source: setup.exeString found in binary or memory: https://http://;setup.exe:1;setup.exe;-remove
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_0041493A GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,Beep,Beep,Sleep,Sleep,Beep,Sleep,Beep,Sleep,Beep,Sleep,Beep,Beep,Beep,Sleep,Sleep,Beep,Sleep,Beep,Beep,Sleep,Sleep,Beep,Sleep,Beep,Sleep,Beep,Sleep,Beep,Beep,Sleep,Sleep,Beep,Sleep,Beep,Beep,Sleep,Sleep,Beep,Sleep,Beep,2_2_0041493A
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_00402C680_2_00402C68
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_00405AF00_2_00405AF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_00402A880_2_00402A88
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_004075470_2_00407547
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_0040411E0_2_0040411E
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_3_023567312_3_02356731
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_0043E2372_2_0043E237
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00432BAB2_2_00432BAB
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004342792_2_00434279
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004422D12_2_004422D1
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004493F82_2_004493F8
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_0041056C2_2_0041056C
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004395C12_2_004395C1
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004326FB2_2_004326FB
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004347912_2_00434791
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004338762_2_00433876
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004368202_2_00436820
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_0042A8DE2_2_0042A8DE
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_0044993A2_2_0044993A
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_0041FA672_2_0041FA67
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_0044CADB2_2_0044CADB
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_0043AB2A2_2_0043AB2A
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00440BD82_2_00440BD8
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_0044BC052_2_0044BC05
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00434C052_2_00434C05
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00433D612_2_00433D61
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00448EB62_2_00448EB6
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00442FE02_2_00442FE0
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: String function: 004433AC appears 33 times
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: String function: 0043B677 appears 79 times
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: String function: 00435A4F appears 53 times
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: String function: 0041B378 appears 185 times
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: String function: 0041B3FE appears 129 times
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: String function: 00419640 appears 69 times
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: String function: 0041B3A0 appears 60 times
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: String function: 00435791 appears 147 times
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: String function: 00401071 appears 56 times
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: String function: 00411530 appears 41 times
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: String function: 00413C7C appears 38 times
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: String function: 00442F7C appears 67 times
Source: setupenglish.dll.0.drStatic PE information: No import functions for PE file found
Source: SetupGerman.Dll.2.drStatic PE information: No import functions for PE file found
Source: setupgerman.dll.0.drStatic PE information: No import functions for PE file found
Source: SetupEnglish.Dll.2.drStatic PE information: No import functions for PE file found
Source: SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean6.winEXE@3/174@0/0
Source: Introduction to REXX.PDF.2.drInitial sample: http://www.borg.com/~jglatt/rexx/scripts/language/language.htm.
Source: Introduction to REXX.PDF.2.drInitial sample: http://www.pdfpdf.com
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_00401039 ReadFile,GetLastError,SetFilePointer,GetLastError,GetLastError,FormatMessageA,wsprintfA,MessageBoxA,0_2_00401039
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_0040459C __EH_prolog3,CoInitialize,_memset,LoadLibraryA,GetModuleFileNameA,FreeLibrary,CoCreateInstance,_sprintf,MultiByteToWideChar,CoCreateInstance,_sprintf,MultiByteToWideChar,CoUninitialize,2_2_0040459C
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ZOC Terminal 5.1Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeMutant created: NULL
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeFile created: C:\Users\user\AppData\Local\Temp\FEA0B4.tmpJump to behavior
Source: SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile read: C:\Users\user\AppData\Local\Temp\~emtec~354033\commandline.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: setup.exeString found in binary or memory: /STOP
Source: setup.exeString found in binary or memory: /STOP
Source: setup.exeString found in binary or memory: /STOP
Source: setup.exeString found in binary or memory: /STOP
Source: setup.exeString found in binary or memory: /STOPEmtec Service-Controlservice.exeUninstallDesktopFilesUninstallStartmenuFiles%s\%s.URLProgramgroup entry or desktop icon%s\%s.LNKSUCCEEDED(hres)*#%PATH%\:https://http://;setup.exe:1;setup.exe;-remove StartmenuUninstallUninstallStartmenu;#DesktopIconStartmenuOpts\pcinstall.ini"openNoFinalPopupDeleteAfterExtractEmTecIdBmpInstallPathffffff
Source: setup.exeString found in binary or memory: /STOPEmtec Service-Controlservice.exeUninstallDesktopFilesUninstallStartmenuFiles%s\%s.URLProgramgroup entry or desktop icon%s\%s.LNKSUCCEEDED(hres)*#%PATH%\:https://http://;setup.exe:1;setup.exe;-remove StartmenuUninstallUninstallStartmenu;#DesktopIconStartmenuOpts\pcinstall.ini"openNoFinalPopupDeleteAfterExtractEmTecIdBmpInstallPathffffff
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe "C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeProcess created: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe .\setup.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeProcess created: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe .\setup.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: setuphook.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeSection loaded: msiso.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00021401-0000-0000-C000-000000000046}\InProcServer32Jump to behavior
Source: ZOC V5.LNK.2.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\ZOC5\zoc.exe
Source: Readme.LNK.2.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\ZOC5\Readme.txt
Source: Order ZOC.LNK.2.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\ZOC5\order.exe
Source: Feature List.LNK.2.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\ZOC5\Features.txt
Source: Order Info.LNK.2.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\ZOC5\Register.txt
Source: Developers Readme.LNK.2.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\ZOC5\Develop.txt
Source: Version History.LNK.2.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\ZOC5\Versions.txt
Source: ZOC Help File.LNK.2.drLNK file: ..\..\..\..\..\..\..\..\..\Windows\System32\hh.exe
Source: ZOC Command Line Parameters.LNK.2.drLNK file: ..\..\..\..\..\..\..\..\..\Windows\System32\hh.exe
Source: ZOC Quick Start Guides.LNK.2.drLNK file: ..\..\..\..\..\..\..\..\..\Windows\System32\hh.exe
Source: Uninstall ZOC.LNK.2.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\ZOC5\Setup.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeFile written: C:\Users\user\AppData\Local\Temp\~emtec~354033\commandline.iniJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Accept end user license agreement
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeAutomated click: Next >
Source: SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeStatic file information: File size 3113216 > 1048576
Source: SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: X:\zoc\v5\showem\showem.pdb source: showem.dll.2.dr
Source: Binary string: X:\zoc\v5\devmodem\devmodem.pdb source: devmodem.dll.2.dr
Source: Binary string: X:\zoc\v5\devssh\sshdll\sshdll.pdb source: sshdll.dll.2.dr
Source: Binary string: X:\zoc\v5\devtlnet\devtlnet.pdb source: devtlnet.dll.2.dr
Source: Binary string: X:\zoc\v5\devrcmd\devrcmd.pdb source: devrcmd.dll.2.dr
Source: Binary string: w:\setup\sfxmake\Release\sfxmakeheader.pdb source: SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
Source: Binary string: X:\zoc\v5\devisdn2\devisdn2.pdb source: devisdn2.dll.2.dr
Source: Binary string: X:\zoc\v5\emuqnx\emuqnx.pdb source: emuqnx.dll.2.dr
Source: Binary string: X:\ZOC\V5\zocdll.pdb source: setup.exe, 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmp, zocdll.dll.2.dr
Source: Binary string: X:\ZOC\V5\zocdll.pdb3 source: setup.exe, 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmp
Source: Binary string: X:\zoc\v5\devnpipe\devnpipe.pdb source: devnpipe.dll.2.dr
Source: Binary string: X:\ZOC\V5\phimport\phimport.pdb source: phimport.dll.2.dr
Source: Binary string: X:\zoc\v5\emuansi\emuansi.pdb source: emuansi.dll.2.dr
Source: Binary string: X:\zoc\v5\emuvt\emuvt.pdb source: emuvt.dll.2.dr
Source: Binary string: X:\zoc\v5\xfrsealink\xfrsealink.pdb source: xfrsealink.dll.2.dr
Source: Binary string: w:\setup\release\setup.pdb source: setup.exe
Source: Binary string: X:\zoc\v5\emu5250\emu5250.pdb source: emu5250.dll.2.dr
Source: Binary string: X:\zoc\v5\emu3270\emu3270.pdb source: emu3270.dll.2.dr
Source: Binary string: X:\zoc\v5\xfrxyz\xfrxyz.pdb source: xfrxyz.dll.2.dr
Source: Binary string: X:\zoc\v5\xfrkerm\xfrkerm.pdb source: xfrkerm.dll.2.dr
Source: Binary string: X:\zoc\v5\emutty\emutty.pdb source: emutty.dll.2.dr
Source: Binary string: X:\zoc\v5\devssh\devssh.pdb source: devssh.dll.2.dr
Source: Binary string: X:\zoc\v5\osys\osyswin.pdb source: osyswin.dll.2.dr
Source: Binary string: X:\zoc\v5\emuwyse\emuwyse.pdb source: emuwyse.dll.2.dr
Source: Binary string: w:\setup\Release\order.pdb source: order.exe.2.dr
Source: Binary string: X:\zoc\v5\devtapi\devtapi.pdb source: devtapi.dll.2.dr
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_0040A2BD LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,__invoke_watson,GetProcAddress,GetProcAddress,__invoke_watson,0_2_0040A2BD
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_00405AD5 push ecx; ret 0_2_00405AE8
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004271D9 push ss; iretd 2_2_004271DA
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004455E7 push 33000001h; retf 2_2_004455EC
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004456E9 push ebp; ret 2_2_004456EA
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00435830 push ecx; ret 2_2_00435843
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00442FC1 push ecx; ret 2_2_00442FD4
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeFile created: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\devssh.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\devmodem.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\emuansi.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\order.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\sshdll.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\phimport.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\SetupEnglish.DllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\emuvt.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\devisdn2.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\emu5250.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\devtapi.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\devrcmd.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\devnpipe.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\xfrsealink.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeFile created: C:\Users\user\AppData\Local\Temp\~emtec~354033\setupgerman.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\SetupGerman.DllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\osyswin.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\xfrxyz.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\xfrkerm.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\zoc.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeFile created: C:\Users\user\AppData\Local\Temp\~emtec~354033\setupenglish.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\devtlnet.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\emtecrt.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\emuqnx.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\emutty.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\shellicons.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\showem.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\RxREXX.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\ssh.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\emuwyse.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\telnet.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\zocdll.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\emu3270.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\zaphoddll.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\Setup.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_00401E6C _memset,_memset,_memset,lstrlenA,GetTempPathA,GetCurrentDirectoryA,GetCurrentProcess,GetModuleFileNameA,CreateFileA,SetFilePointer,SetFilePointer,ReadFile,SetFilePointer,ReadFile,SetFilePointer,ReadFile,SetFilePointer,VirtualAlloc,ReadFile,GetTempPathA,GetTempFileNameA,CreateFileA,WriteFile,CloseHandle,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,lstrlenA,lstrcpyA,lstrcpyA,lstrcpyA,lstrcpyA,lstrcpyA,lstrcpyA,lstrcpyA,VirtualFree,DeleteFileA,0_2_00401E6C
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\license.txtJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Program Files (x86)\ZOC5\Readme.txtJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ZOC Terminal 5.1Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ZOC Terminal 5.1\ZOC V5.LNKJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ZOC Terminal 5.1\Readme.LNKJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ZOC Terminal 5.1\Order ZOC.LNKJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ZOC Terminal 5.1\Feature List.LNKJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ZOC Terminal 5.1\Order Info.LNKJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ZOC Terminal 5.1\Developers Readme.LNKJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ZOC Terminal 5.1\Version History.LNKJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ZOC Terminal 5.1\ZOC Help File.LNKJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ZOC Terminal 5.1\Homepage ZOC.URLJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ZOC Terminal 5.1\Homepage EmTec.URLJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ZOC Terminal 5.1\ZOC Command Line Parameters.LNKJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ZOC Terminal 5.1\ZOC Quick Start Guides.LNKJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ZOC Terminal 5.1\Uninstall ZOC.LNKJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\devssh.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\devmodem.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\emuansi.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\order.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\sshdll.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\SetupEnglish.DllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\phimport.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\emuvt.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\devisdn2.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\emu5250.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\devtapi.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\devrcmd.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\devnpipe.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\xfrsealink.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\~emtec~354033\setupgerman.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\SetupGerman.DllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\xfrxyz.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\osyswin.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\xfrkerm.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\zoc.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\~emtec~354033\setupenglish.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\emtecrt.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\devtlnet.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\emuqnx.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\emutty.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\shellicons.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\showem.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\ssh.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\RxREXX.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\emuwyse.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\telnet.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\zocdll.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\emu3270.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeDropped PE file which has not been started: C:\Program Files (x86)\ZOC5\zaphoddll.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004381D7 __getdrive,FindFirstFileA,_strlen,_IsRootUNCName,GetDriveTypeA,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,2_2_004381D7
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004311A5 _malloc,_strlen,_malloc,_strcat,FindFirstFileA,_strcat,2_2_004311A5
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00436D80 __getdrive,FindFirstFileA,_strlen,_IsRootUNCName,GetDriveTypeA,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,2_2_00436D80
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00411C5B __EH_prolog3,_calloc,FindFirstFileA,2_2_00411C5B
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeAPI call chain: ExitProcess graph end nodegraph_0-4536
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeAPI call chain: ExitProcess graph end nodegraph_0-4543
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_004058C2 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004058C2
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_0040A2BD LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,__invoke_watson,GetProcAddress,GetProcAddress,__invoke_watson,0_2_0040A2BD
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004364AA GetStartupInfoA,GetProcessHeap,GetProcessHeap,HeapAlloc,_fast_error_exit,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,_fast_error_exit,_fast_error_exit,__RTC_Initialize,__amsg_exit,GetCommandLineA,___crtGetEnvironmentStringsA,__setargv,__amsg_exit,__setenvp,__amsg_exit,__cinit,__amsg_exit,__wincmdln,2_2_004364AA
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_0040A4C0 _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0040A4C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_004058C2 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004058C2
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_0040A75A SetUnhandledExceptionFilter,0_2_0040A75A
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_00405320 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00405320
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_0044731E _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0044731E
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00415521 _malloc,SetUnhandledExceptionFilter,2_2_00415521
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00443676 SetUnhandledExceptionFilter,2_2_00443676
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00435782 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00435782
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00440AB8 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00440AB8
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: 0_2_00406662 cpuid 0_2_00406662
Source: C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exeCode function: GetLocaleInfoA,0_2_0040A7B4
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: GetLocaleInfoA,2_2_0044B5B9
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: GetLocalTime,_memset,GetLocaleInfoA,GetTimeFormatA,2_2_00412BBC
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_0043A1AD GetSystemTimeAsFileTime,__aulldiv,2_2_0043A1AD
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00412278 __EH_prolog3,GetUserNameA,2_2_00412278
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00446706 __lock,__invoke_watson,__invoke_watson,__invoke_watson,____lc_codepage_func,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,SetOaNoCache,__invoke_watson,2_2_00446706
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_004364AA GetStartupInfoA,GetProcessHeap,GetProcessHeap,HeapAlloc,_fast_error_exit,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,_fast_error_exit,_fast_error_exit,__RTC_Initialize,__amsg_exit,GetCommandLineA,___crtGetEnvironmentStringsA,__setargv,__amsg_exit,__setenvp,__amsg_exit,__cinit,__amsg_exit,__wincmdln,2_2_004364AA
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_0042394D __EH_prolog3,_memset,_memset,_strcat,_strcat,_strlen,_strlen,_memset,htons,inet_ntoa,bind,getsockname,htons,2_2_0042394D
Source: C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exeCode function: 2_2_00423BF8 __EH_prolog3,socket,listen,2_2_00423BF8
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Spearphishing Link
2
Command and Scripting Interpreter
1
Registry Run Keys / Startup Folder
1
Process Injection
2
Masquerading
11
Input Capture
2
System Time Discovery
Remote Services11
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
1
DLL Side-Loading
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS Memory2
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
Security Account Manager1
Account Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS1
System Owner/User Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets3
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials33
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Program Files (x86)\ZOC5\RxREXX.dll0%ReversingLabs
C:\Program Files (x86)\ZOC5\Setup.exe2%ReversingLabs
C:\Program Files (x86)\ZOC5\SetupEnglish.Dll0%ReversingLabs
C:\Program Files (x86)\ZOC5\SetupGerman.Dll0%ReversingLabs
C:\Program Files (x86)\ZOC5\devisdn2.dll2%ReversingLabs
C:\Program Files (x86)\ZOC5\devmodem.dll2%ReversingLabs
C:\Program Files (x86)\ZOC5\devnpipe.dll2%ReversingLabs
C:\Program Files (x86)\ZOC5\devrcmd.dll2%ReversingLabs
C:\Program Files (x86)\ZOC5\devssh.dll0%ReversingLabs
C:\Program Files (x86)\ZOC5\devtapi.dll2%ReversingLabs
C:\Program Files (x86)\ZOC5\devtlnet.dll0%ReversingLabs
C:\Program Files (x86)\ZOC5\emtecrt.dll0%ReversingLabs
C:\Program Files (x86)\ZOC5\emu3270.dll3%ReversingLabs
C:\Program Files (x86)\ZOC5\emu5250.dll3%ReversingLabs
C:\Program Files (x86)\ZOC5\emuansi.dll2%ReversingLabs
C:\Program Files (x86)\ZOC5\emuqnx.dll2%ReversingLabs
C:\Program Files (x86)\ZOC5\emutty.dll2%ReversingLabs
C:\Program Files (x86)\ZOC5\emuvt.dll0%ReversingLabs
C:\Program Files (x86)\ZOC5\emuwyse.dll0%ReversingLabs
C:\Program Files (x86)\ZOC5\order.exe0%ReversingLabs
C:\Program Files (x86)\ZOC5\osyswin.dll0%ReversingLabs
C:\Program Files (x86)\ZOC5\phimport.dll3%ReversingLabs
C:\Program Files (x86)\ZOC5\shellicons.dll2%ReversingLabs
C:\Program Files (x86)\ZOC5\showem.dll2%ReversingLabs
C:\Program Files (x86)\ZOC5\ssh.exe2%ReversingLabs
C:\Program Files (x86)\ZOC5\sshdll.dll0%ReversingLabs
C:\Program Files (x86)\ZOC5\telnet.exe0%ReversingLabs
C:\Program Files (x86)\ZOC5\xfrkerm.dll2%ReversingLabs
C:\Program Files (x86)\ZOC5\xfrsealink.dll2%ReversingLabs
C:\Program Files (x86)\ZOC5\xfrxyz.dll0%ReversingLabs
C:\Program Files (x86)\ZOC5\zaphoddll.dll0%ReversingLabs
C:\Program Files (x86)\ZOC5\zoc.exe0%ReversingLabs
C:\Program Files (x86)\ZOC5\zocdll.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe2%ReversingLabs
C:\Users\user\AppData\Local\Temp\~emtec~354033\setupenglish.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\~emtec~354033\setupgerman.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.thawte.com00%URL Reputationsafe
http://www.borg.com/~jglatt/rexx/scripts/language/language.htm0%Avira URL Cloudsafe
http://www.borg.com/~jglatt/rexx/scripts/language/language.htm.)0%Avira URL Cloudsafe
http://www.emtec.comPublisherEmTec0%Avira URL Cloudsafe
http://www.pdfpdf.com)0%Avira URL Cloudsafe
http://www.emtec.comStandbyvalue0%Avira URL Cloudsafe
http://www.kilowattsoftware.com/tutorial/rexx/0%Avira URL Cloudsafe
https://http://;setup.exe:1;setup.exe;-remove0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.emtec.com/setup.exe, 00000002.00000003.2307631408.00000000047E0000.00000004.00000800.00020000.00000000.sdmp, Homepage EmTec.URL.2.drfalse
    high
    http://www.emtec.com/common/order.htmorder.exe.2.drfalse
      high
      http://www.emtec.comStandbyvaluezocdll.dll.2.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.emtec.com/pyrotrans/index.htmSsetup.exe, 00000002.00000002.3264393540.0000000001FB5000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://www.emtec.com/pyrotrans/index.htmlssetup.exe, 00000002.00000002.3264059138.000000000066B000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://www.emtec.com/common/order.htmlhttp://www.emtec.com/common/order.htmorder.exe.2.drfalse
            high
            http://www.borg.com/~jglatt/rexx/scripts/language/language.htm.)Introduction to REXX.PDF.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.emtec.com/common/support.htmlReadme.txt.2.drfalse
              high
              http://www.emtec.com/zoc/index.htmsetup.cfgfalse
                high
                http://ocsp.thawte.com0setup.exefalse
                • URL Reputation: safe
                unknown
                http://www.emtec.com/zoc/index.htmlsetup.cfgfalse
                  high
                  http://www.borg.com/~jglatt/rexx/scripts/language/language.htmThe REXX Language (3rd Party Tutorial).url.2.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://http://;setup.exe:1;setup.exe;-removesetup.exefalse
                  • Avira URL Cloud: safe
                  low
                  http://www.emtec.com/zoc/order.htmlRegister.txt.2.drfalse
                    high
                    http://www.emtec.comPublisherEmTecsetup.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.thawte.com/ThawteCodeSigningCA.crl0setup.exefalse
                      high
                      http://www.openssl.org/support/faq.htmlsshdll.dll.2.dr, zocdll.dll.2.drfalse
                        high
                        http://www.emtec.com/pyrotrans/index.htmlVsetup.exe, 00000002.00000002.3264059138.000000000066B000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.pdfpdf.com)Introduction to REXX.PDF.2.drfalse
                          • Avira URL Cloud: safe
                          low
                          http://www.emtec.com/common/order.htmlorder.exe.2.drfalse
                            high
                            http://www.emtec.com/pyrotrans/index.html.1setup.exe, 00000002.00000002.3264059138.000000000066B000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.openssl.org/support/faq.html....................zocdll.dll.2.drfalse
                                high
                                http://www.emtec.comsetup.cfg, setup.exe, setupenglish.dllfalse
                                  high
                                  http://www.kilowattsoftware.com/tutorial/rexx/Another Rexx Tutorial.url.2.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://crl.thawte.com/ThawtePremiumServerCA.crl0setup.exefalse
                                    high
                                    http://www.emtec.com/common/contact.htmlReadme.txt.2.drfalse
                                      high
                                      http://www.emtec.com/pyrotrans/index.htmladvertise_pyrotrans.cfgfalse
                                        high
                                        http://www.emtec.com/pyrotrans/index.htmlnnsetup.exe, 00000002.00000002.3264474052.0000000002350000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://www.emtec.com/pyrotrans/index.htmadvertise_pyrotrans.cfgfalse
                                            high
                                            No contacted IP infos
                                            Joe Sandbox version:40.0.0 Tourmaline
                                            Analysis ID:1430577
                                            Start date and time:2024-04-23 22:26:05 +02:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 6m 17s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:7
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
                                            Detection:CLEAN
                                            Classification:clean6.winEXE@3/174@0/0
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 99%
                                            • Number of executed functions: 130
                                            • Number of non-executed functions: 223
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Report size getting too big, too many NtSetInformationFile calls found.
                                            • VT rate limit hit for: SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
                                            No simulations
                                            No context
                                            No context
                                            No context
                                            No context
                                            No context
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1443
                                            Entropy (8bit):4.623068410416077
                                            Encrypted:false
                                            SSDEEP:24:+auTmQ8/W+Ru39AEAY9CZHlvbdwoIMEZZa:5GRRAYYZbsZZa
                                            MD5:A5445EAA315EE0F49D8E63832D2FDE89
                                            SHA1:C3ABA4B19430D0EEFFDBACD2D4A48E5216458572
                                            SHA-256:92524ABC7E7E5205EA98CCCDED484D82669258B599128823C3CAF0020964B18F
                                            SHA-512:195ADE0D3A3BEF3F03E0E37CFF34F0E297B612F20D578597EDFD94ACDD9D22C359FFE8C6AA0F6EA55AA7372CBE3A5537547E3ACE630D4E566FD634BBDF184D3E
                                            Malicious:false
                                            Reputation:low
                                            Preview:.. ------------------------------------------------------------------------.. DEVELOPER INFOMATION.. ------------------------------------------------------------------------.... If you are a developer, there are several points for you to.. hook in. .... The most obvious area where a programmer could control ZOC is.. the REXX programming language. It is very powerful and allows.. access to many areas of ZOC. .... The REXX processor was licensed from Enterprise Alternatives, Inc. .. and is included with ZOC. If you want to use a different REXX.. processor (e.g. IBM's Object REXX or the freeware Reginald .. REXX) you can use Options, Program Settings, Special Files to .. sepcify a different REXX processor DLL..... If you want ZOC to act as a background communication server you.. can use DDE. DDE is described in the Online Help (Help->Contents->.. Programming ZOC) and you can get a sample DDE client (C source.. code) from EmTec's ftp ser
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):2241
                                            Entropy (8bit):4.912840591139236
                                            Encrypted:false
                                            SSDEEP:48:Wo2DV9v2GRhsBhQiauGRfEOlWLFap6HSLFEez:+DvpMTQL5tlWpzez
                                            MD5:7D2D7011A27E6B94921E6C796A09ABE7
                                            SHA1:E283887498798FCF13038765DFEAC9FB4B49279E
                                            SHA-256:684E39072A1824487B483603303CB91ED96F20123ABEF2025C482CB9056644B8
                                            SHA-512:649563A9479148B08D8B7F14B0A5C84111DD6F274064BFAC8B4407DEF5C28B203749BA3ED61639272D2C6C066E5F28A9C4C262A213A1AB2267811CEFB802521B
                                            Malicious:false
                                            Reputation:low
                                            Preview:.. ------------------------------------------------------------------------.. LIST OF FEATURES.. ------------------------------------------------------------------------...... COMMUNICATIONS.... * Telnet, Rlogin.... * Secure Shell (SSH V1/V2) with public/private key .... * Modem via serial port and TAPI (Windows modem).... * ISDN via CAPI V2.0 (including X.25 and X.31 support).... * File transfer via Ascii, Xmodem, Ymodem, Zmodem, Kermit .... * Data trace on device level (user dump and binary mode)........ EMULATION .... * LINUX console-like xterm including colors and full keyboard.... * VT52, VT100, VT102, VT220 (complete implementation incl... print through, keyboard and ANSI colors).... * ANSI-BBS, ANSI-SCO, Avatar.... * IBM-3270, IBM-5250.... * Sun-CDE.... * Wyse 30, 50, 60.... * TVI9xx.... * QNX V4.... * TTY........ USER INTERFACE.... * Host directory (with full option set for each entry and.. automatic logi
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):2991
                                            Entropy (8bit):4.2533442234184475
                                            Encrypted:false
                                            SSDEEP:48:+Rk4EnN0uJofOcy6kR0dETmEkMfV71griZh6T5lDi5w6vC/lq4n:+ezN0uJofzy6dCmEkMN5grkfw66/k4n
                                            MD5:86841177443D82B0A3347DD871AA19D4
                                            SHA1:67916E65F35FA5519E9A2B8CFC906264E573C83C
                                            SHA-256:0789809A277346C8D10CFFA7A7A6E84BF9B78C4C8A0F7EBCAE2EBF96F8B73353
                                            SHA-512:09DB1CD1D6B39BB4896F2894F9C0E9811ABAED7C937279064F9998479EA9D48DC97270FFA9B041F76C3BA9A6ED023F050F09AE760A00E99F8D46370588C00D81
                                            Malicious:false
                                            Reputation:low
                                            Preview:.. ------------------------------------------------------------------------.. WHAT TO DO IN CASE OF PROBLEMS.. ------------------------------------------------------------------------........ ------------------------------------------------------------------------.. 1. FIRST OF ALL.. ------------------------------------------------------------------------.... RELAX!........ ------------------------------------------------------------------------.. 2. IF YOU CAN'T INSTALL OR START ZOC.. ------------------------------------------------------------------------.... * Please try installation into a fresh directory on your hard disk. .. Do not convert files from an existing version..... * Try to start ZOC from the command line instead of using the desktop.. icon, eg. CD ZOC.. ZOC.... * It is possible to unpack the SETUP.FIL file with a standard UNZIP... However, this is only an emergency method..... * You can view the help file wi
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):4520
                                            Entropy (8bit):4.520829187694182
                                            Encrypted:false
                                            SSDEEP:48:AcGD9+6kh1Hpjt3HcOql43yZWNGaDbrka0xpb+yljAxboLgpWAcISAbptidIn/RL:C+DjcDLZWN99aHWttSSj/OliJOw
                                            MD5:869777FCAB4E75F1B60397E42147D2C7
                                            SHA1:0239E72F211A341C7B571610913B13592B70036D
                                            SHA-256:A6F8BBBE7BAC325ABEB2A282D8BAFDED6481057CE1252EBEF4FE75B8188354CB
                                            SHA-512:7BFC50FA073686230A7C5A2D61FC56A3D206605FA18942A6AF19A6F878C72F90A890FC7E40E4054854509AF6B6E8895F2CD41563A2ED1F8B3271681ECEDA6984
                                            Malicious:false
                                            Reputation:low
                                            Preview:.. ------------------------------------------------------------------------.... CONTENTS .... 1. ABOUT ZOC.. 2. DISTRIBUTION, COPYRIGHT.. 3. INSTALLATION.. 4. CONTACTING THE AUTHOR.... ------------------------------------------------------------------------........ ------------------------------------------------------------------------.. 1. ABOUT ZOC for Windows 9X/ME/NT/2000/XP/2003/Vista and higher.. ------------------------------------------------------------------------.... This is V5.x of ZOC. ZOC is a high power terminal client for telnet,.. SSH, modem, ISDN, and more. ZOC has a reputation of being one of.. the best telnet and SSH clients around. Have a look at the feature .. list and the screenshots at www.emtec.com and you will see why..... The program is available from many online sources (www, ftp, etc.). .. However, your main source of download and information will be .. the EmTec website: .... http://www.em
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1989
                                            Entropy (8bit):4.570849514395709
                                            Encrypted:false
                                            SSDEEP:48:dyO+2cMan0bzBavbkJQMM8jaz6faGU+CIvxcO9r:dyOAMa0jWbGU+btr
                                            MD5:71A23F49F1AEB6AB80D23AF3936A690C
                                            SHA1:547D817A37F7BB2B6837A75748A0131CE99502E3
                                            SHA-256:A5F3BD0BA8A3E635284EE2EE8FD95190BC8342D5F55049E00EAAEFFA38027AF5
                                            SHA-512:CD7988B38B363F9EA9B68FC1EE5B04D0EBD673356490EF94D9B9EBB2A861B6D7B29C4F593986117345B256B1AB8973E3CBDC8D6FA3F4730409EDC72B73CDBC15
                                            Malicious:false
                                            Reputation:low
                                            Preview:.. ------------------------------------------------------------------------.. PURCHASING/ORDERS .. ------------------------------------------------------------------------.... This is a summary -- see please see http://www.emtec.com/zoc/order.html .. for more details. .... To actually order, please visit the our website (see above link) or .. select "Order ZOC" from the ZOC Program group in the Windows Start menu..... The shareware version of ZOC is fully functional in every way. Compared.. to the licensed version, the only difference is that it shows occasional.. windows to remind you of the evaluation. The are no hidden or built in .. problems that go away when you order a software license, everything that .. happens due to the evaluation mode is clearly marked to do so..... When you order a license code you will receive a software code, that .. unlocks all evaluation versions of ZOC with a certain version number .. (eg. all V5.xx). The li
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):248832
                                            Entropy (8bit):6.4448639083649395
                                            Encrypted:false
                                            SSDEEP:6144:85soBLHHNcxy1p68V5UTXzkELTSNpexX1p:85rLnOy1Y8r+XZKpenp
                                            MD5:30E0E4DC13E3307D2D60F3CA0E22C3E0
                                            SHA1:D1736D840393B41EDDF150AD0C615F179F38FB31
                                            SHA-256:876703E0E34AF3125C4E22FCDA6B463411F4A92713456E30CF4BA9236AB9C5A0
                                            SHA-512:AA73D33EAA91C0C0E9825B88495D1D7A1C5C2E538E01CC4E5D096A8E110301DD9B2A2FC4EDE1C984D5106714EF6AAADD89A84490425106E9E58932937256EA4A
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....\4...........!......... ......0x.......................................0..................................................d................................7..................................................................................text...p........................... ..`.rdata..............................@..@.data...D........z..................@....idata..l............f..............@....rsrc................x..............@..@.reloc..L<.......>..................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):632248
                                            Entropy (8bit):6.449097954904934
                                            Encrypted:false
                                            SSDEEP:6144:1AnAlC5W1ZUfb3OZFpMwDZi2aZW2ENFsypo4xhTGjL1bEfNMDUqTWlpb225NPaoz:1uw8b3OZ3zloWTHgNgFM6b2eUA/
                                            MD5:51F4C23DB5D7F30E4F2B50AED1851339
                                            SHA1:43D30BB2CB683CED13BDE7B95976F0562EDF77AC
                                            SHA-256:9EC8FD7D1C01783F653A49BFA885B0A2DC9882BD068FD5F4A8489A0216635F11
                                            SHA-512:9E04389378D34E87CAB0C5FC67E719BC45C991CF02AD149C908FD3B816CE235D0AC6AC5E2E493671D1F60000B6FC3D4D03DA5740F7D9A4600EB4F884CD6A58FF
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 2%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........<...RQ..RQ..RQ.(/Q..RQV..Q..RQ.*,Q..RQV.2Q..RQ..SQ..RQV..Q..RQ.(?Q\.RQ.(<Q..RQ.(.Q..RQ.(*Q..RQRich..RQ........................PE..L......I.................0...........f.......@....@..................................r...............................................@..............................pE...............................B..@............@..t............................text...!%.......0.................. ..`.rdata...x...@.......@..............@..@.data....{.......@..................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):98304
                                            Entropy (8bit):4.596786790402431
                                            Encrypted:false
                                            SSDEEP:1536:FnoitMmU499/Mh9muec5Dnz9hwY3JbScGPaVLHO4:p7tO4WmYzbwY3FnGPaU4
                                            MD5:0AD002F80572C02A9F746E8420D8084F
                                            SHA1:AF1921A44FDBE9A2E640782B38CF49B4B19C6B5A
                                            SHA-256:5D3A66975C924437CFCFD75F4D5129C17BFAC8917BD58D5620D92718F556B662
                                            SHA-512:38AC70A30AA67948CC59B0B0410056F59FDA18E3928A1BB6A9CE5197ACE30B31C10228F7F138B3632825C2F3B4F01B912C4C572A6DEAE884EFBB65BD5571A00E
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........-T.L:..L:..L:...F..L:...B..L:.Rich.L:.........PE..L....z.I...........!.........p...........................................................................................................^...................p.......................................................................................rsrc....^.......`..................@..@.reloc.......p.......p..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):102400
                                            Entropy (8bit):4.445942285482228
                                            Encrypted:false
                                            SSDEEP:3072:u+7tO4R3odQuMV/ejSX7p99mymYzbwY3FnGPhREP7jdIMrbMKiwssMSIcrqQGvX5:xpbp1T31GP
                                            MD5:360E58DD2B63F5C097E228268272349C
                                            SHA1:A1EA8CECC3155227B89B0001D3EB8730D2906A64
                                            SHA-256:F1A99F390734DE85EF6FF7ED8A50A6BB268BA7A07D781E837743883695B36226
                                            SHA-512:465084056F9F08F0589D11D1A7A1F92D580CF84A582F7F39DFD2D7321124C4F7349DDB319BD9747AC7ACC13644D6C35A5CA2076D994494B1784BE647D273A7E0
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........-T.L:..L:..L:...F..L:...B..L:.Rich.L:.........PE..L....z.I...........!....................................................................................................................x`...........................................................................................................rsrc...x`.......p..................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:Nim source code, ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):24806
                                            Entropy (8bit):5.0356974885609125
                                            Encrypted:false
                                            SSDEEP:192:8e7FMEpTRmoXoFDYV8CADHWGjc17IZX3XpOuNo6QiEnqulzxByeHX3JDWNUAYu9m:FPTGCADIhIuio6QnqOxvqVZsdzQFHUZ
                                            MD5:B3BF22F6F9934099AAAB62B6CD01866F
                                            SHA1:EAA067FA30BF06D92289F2C2C7CEA66374C2985A
                                            SHA-256:859220BC7A24F0D9929A5D5D322837E054ED04147CB58320A37B7BA5A37D9DA3
                                            SHA-512:A918FED72CF9BF29B53B9F4E751980F6A652E85DDD2CED1E5A6D0B4DE63F4A225F118238EF5CB03ABCC0571EF240AD8355B5888EF5F165ED750028544835762E
                                            Malicious:false
                                            Reputation:low
                                            Preview:..History of changes....-------- ---------------------------------------------------------------------------------.. DATE TEXT..-------- ---------------------------------------------------------------------------------......-------- ---------------------------------------------------------------------------------..02.12.08 REL: VERSION 5.12..-------- ---------------------------------------------------------------------------------..09.11.08 FIX: file-request windows were not sizable..04.09.08 FIX: could not connect to serial device directly with empty 'Connect To'..04.09.08 FIX: folders (program settings) now uses the most relevant macro for paths..01.09.08 FIX: problem with Local Typing when the scroll-lock=LT option was on..30.09.08 FIX: automatically fix host directory entries with wrong section..-------- ---------------------------------------------------------------------------------..22.09.08 REL: VERSION 5.11..-------- ------------------------------------
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:MS Windows HtmlHelp Data
                                            Category:dropped
                                            Size (bytes):248276
                                            Entropy (8bit):7.913808491167825
                                            Encrypted:false
                                            SSDEEP:6144:UmO5lf1dEW+iPd/QHAj5030bIvA2CVOxUD6CpPrg3Q3pplhmTD9e:nO5fr+iOcm3PvHIOxU+CBr/3ppzm/s
                                            MD5:5323FA5C6BD0D59B6FF0469011C895F6
                                            SHA1:9244590B35CD572EB8F764951BB4B144C8305665
                                            SHA-256:9B98154923105A3F13B356DEAAE84335ED7C532E8796AACFC1BCA16EB398322C
                                            SHA-512:7AF85943E7ECA89681ECA2A12075CBDF47F1654A488EE36F2F25DF14B596DE5B5966E9944CDD890EBD01100C19BD12859D4FA3EA28121410F575885117EB8EFD
                                            Malicious:false
                                            Reputation:low
                                            Preview:ITSF....`.........I........|.{.......".....|.{......."..`...............x.......T0.......0..............................ITSP....T...........................................j..].!......."..T...............PMGLR................/..../#IDXHDR...V.../#ITBITS..../#STRINGS..._.9./#SYSTEM..v.../#TOPICS...V.@./#URLSTR.....Y./#URLTBL.....p./#WINDOWS.....L./$FIftiMain...!..5./$OBJINST...b.?./$WWAssociativeLinks/..../$WWAssociativeLinks/Property...^../$WWKeywordLinks/..../$WWKeywordLinks/Property...Z../html/..../html/topic-100.html...p.../html/topic-10200.html...y.#./html/topic-10220.html.....u./html/topic-10221.html.....}./html/topic-10222.html...d.q./html/topic-10223.html...U.*./html/topic-10224.html.....2./html/topic-10225.html...1.../html/topic-10226.html...1.w./html/topic-10230.html.....V./html/topic-10240.html...(.=./html/topic-10241.html...e..`./html/topic-10242.html.....|./html/topic-10243.html...X.H./html/topic-10244.html.....(./html/topic-10245.html...E.../html/topic-10250.html...@.9./ht
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1020
                                            Entropy (8bit):3.2763416949440325
                                            Encrypted:false
                                            SSDEEP:24:Mi+8kVM8yYJ4VAthaBulxVXc8VHOIOG/C6Za3P/XD:l+8kpJ4VAthtlxRzOV4yP/z
                                            MD5:206563E1375E1FFC16F83B160E68DD9D
                                            SHA1:37F83ADDF575E4203A5DA58BD46F581AC37C5212
                                            SHA-256:88C2DE98660AD031321212136E2AEA9C39879DAC4D6CA85754F52BD7AAB2BF63
                                            SHA-512:C04DD3AED8A1CDEE54150B998814E81E81B2FDAA39D4341BA1EC13460A66E5E74AFD9AF33BA0F907C5AB335E3AA46F434A144530DDFD73E4DFC81D77CA7DADC8
                                            Malicious:false
                                            Reputation:low
                                            Preview:100..10200..10220..10221..10230..10222..10223..10224..10225..10226..10240..10241..10245..10243..19282..10242..10244..10250..10254..10253..10256..10255..10252..10251..10300..10860..10830..10835..10820..10840..10870..10373..10850..19275..19230..19231..19235..19236..19237..19241..19240..19238..19239..19284..19283..19249..19247..10370..12110..19252..10375..10400..10430..19330..19335..19329..19326..19331..19321..19328..19327..19325..19322..19323..19333..19324..19332..10420..19300..19301..19302..19246..10410..19002..19013..19014..19005..19012..19020..19017..19010..19016..10530..19029..10439..10449..10450..10451..10452..10453..10441..10442..10443..10444..10446..10445..10470..10471..10472..10473..10460..10461..10462..10463..10480..10481..10482..19504..10483..10484..19500..19501..19502..19503..10456..10457..10458..10459..10475..10476..10478..10500..10510..10518..10521..10519..10600..10640..10620..10627..10625..10650..10610..10670..10700..10748..10710..10720..10722..10724..10721..10730..10755..1
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):3202
                                            Entropy (8bit):5.061039262509073
                                            Encrypted:false
                                            SSDEEP:48:3lE4CE0egmbKgrcTR3hs9/MmSfUKB6CxF9OhDpLMndq/mtpGuFVoosXq+A4RAtyt:yW0e8RW9/pvE6+F9Of4hFmo8/EJc
                                            MD5:6D2BA7DE970881ED5962FD40107F2423
                                            SHA1:BC9D7529EB0D340782B4A09127447B6411AC94AD
                                            SHA-256:D464A7561E5815E54F5288E3C313ABCD30FFA06CE30AF22FDD0BFC49F182F41F
                                            SHA-512:EA91294613CE94554490DB447259701BEA10046D47F44ED8E3EA8C79E703F706C94B136F27618142D67B51F036AA14C44FABCA9C0A037E4C82A4BFBE4807CB1E
                                            Malicious:false
                                            Reputation:low
                                            Preview:// config file for administrative magic....// this file (in conjunction with the program settings file) allows ..// the configuration of shared installations, partially shared installation, ..// per user installations etc. If you have questions on how to achieve ..// a specific result, please conact us for support.....// suported environment strings:..// %ZOCFILES% (ConfigDataFolder), %ZOC% (program folder), %APPDATA%, ..// %ALLUSERAPPDATA%, %USERNAME%, %USERDESKTOP%, %USERPROFILE% (My Documents), ..// %USERPICTURES% (My Pictures), %ALLUSERPROFILE% (Shared Documents)......// user data folder (if this folder does not exist it will ..// be created and %ZOC%\newuserprofile will be copied ..// into it). This folder is then referenced as %ZOCFILES%...// Later on the folder can be relocated by the individual user..// and HKCU\Software\ZOC\ConfigDataFolder will override it...ConfigDataFolder=""....// set SharedInstall to yes if this is a shared installation..// (XP/NT/2000 for all user
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):127
                                            Entropy (8bit):5.041262672840127
                                            Encrypted:false
                                            SSDEEP:3:t9JjWcgNBOA5FF88vdARDGDY23MH2D7OVdxFH:tPUOcFhVA5GD73a2P6/9
                                            MD5:BB108694D4E738D6109C38CAF1FE561E
                                            SHA1:B26E962890C7C6DF0225C83D2D05EE95A3024964
                                            SHA-256:9EDC0CA328559C2058AD41E1B02EE103F6ECEF3A7CA3A6157824306AAB204053
                                            SHA-512:35EF405AF026524A4D225297A2904365FC144A77B2D3D24498B2A2D1B410E25B413520E532AFA0080A0C91E79843675B4B6A27DAA8F8D7F6DA44A726039CB03E
                                            Malicious:false
                                            Preview:ConfigDataFolder="%USERPROFILE%\ZOC Files"..SetupCreatedConfig=yes..SetupDefaultConfig="5"..SetupSubsystems="11200000.11200000"
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):3131
                                            Entropy (8bit):5.082011504461222
                                            Encrypted:false
                                            SSDEEP:48:3lE4CE0egmbKgrcTgVhs9/MmSfUKB6CxF9OhDpLMndq/VFVoosXq+A4RAtyp/tGq:yW0e8B9/pvE6+F9OfrFmo8/nsi
                                            MD5:99C2EE2047811118C6FE19D7846B295B
                                            SHA1:898C4FE89A59C64151370DE673CFF340093FB8BB
                                            SHA-256:6893B91C7AA592E83B75CE7184DC440ABFCD72EEF44457E327D0D40F8A31EC99
                                            SHA-512:20620E78C0C56494BAC57EFC65677616306E82183051D2FDB62AAA01845800AB850A61A5CB46845FDFB715A1A4EFDCC2C152715BA85DFEF236319F2E9587DD0F
                                            Malicious:false
                                            Preview:// config file for administrative magic....// this file (in conjunction with the program settings file) allows ..// the configuration of shared installations, partially shared installation, ..// per user installations etc. If you have questions on how to achieve ..// a specific result, please conact us for support.....// suported environment strings:..// %ZOCFILES% (ConfigDataFolder), %ZOC% (program folder), %APPDATA%, ..// %ALLUSERAPPDATA%, %USERNAME%, %USERDESKTOP%, %USERPROFILE% (My Documents), ..// %USERPICTURES% (My Pictures), %ALLUSERPROFILE% (Shared Documents)......// user data folder (if this folder does not exist it will ..// be created and %ZOC%\newuserprofile will be copied ..// into it). This folder is then referenced as %ZOCFILES%...// Later on the folder can be relocated by the individual user..// and HKCU\Software\ZOC\ConfigDataFolder will override it...ConfigDataFolder="%USERPROFILE%\ZOC Files"....// set SharedInstall to yes if this is a shared installation..// (
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):65584
                                            Entropy (8bit):4.526486337233923
                                            Encrypted:false
                                            SSDEEP:768:ntq6LXiMo0xf94MlxH26A8Lp6B/Wm9Yddo6fExVVo5:ntq6L3vxf94MlxHdA8Lp6B/79YdAHVo5
                                            MD5:F65AD9E2B5B36F5528874143237409B7
                                            SHA1:87C97A78050FA2636BDB37D071EB68B6BFE0FA24
                                            SHA-256:797FA0F7D9BB027DBEF92D2858C92F1652421DBC4B726F24DBDF9EDE1E869D7B
                                            SHA-512:093D01AEAFC25BEE87B3EF1D1C0B1AB07D82B5DA8AE1092A77E3AD31BCCF7E9CE2FA06014717E295BCA6E523A2F4594D0CEF2BAFFC36035890955E881B1305E5
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 2%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ur......................7.......4......................U...............Rich....................PE..L...V^5I...........!.....`..........!T.......p......................................................................pr..u.......x....................................p..................................................(............................text...|U.......`.................. ..`.rdata.......p.......p..............@..@.data....D.......P..................@....idata..............................@....rsrc...............................@..@.reloc..f...........................@..B................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):53296
                                            Entropy (8bit):4.0522792142968465
                                            Encrypted:false
                                            SSDEEP:768:L+53Cv6KRUU81m3h0oD60GYGqY8LSKSIK:L+Av6KRUn1mxTD60kT8y
                                            MD5:32FEDB697310E7EDF9C0A0FBAAD86EE8
                                            SHA1:67D859508262498195BB6B6CC8A0AF650A2BC6DF
                                            SHA-256:C87C577F613B496E502BC94EF949C03493FE6D1E9162C79AEE159F6557FE5FCC
                                            SHA-512:8EDEAA55069BB6ACCD5D8882283DF9E6DED720ACFC6C0C571AF89CFBD67B21E8037D364CFBED1147B013181AA6FF67642C23FD82508EDE10B130577C769605E1
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 2%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........b.....................................:...............-.......}.......-.......Rich....................PE..L...X^5I...........!.....`...p.......O.......p......................................................................pr..u.......x...............................8....p..............................................,................................text....Q.......`.................. ..`.rdata.......p.......p..............@..@.data...............................@....idata..............................@....rsrc............ ..................@..@.reloc..e...........................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):36912
                                            Entropy (8bit):2.6404835102374324
                                            Encrypted:false
                                            SSDEEP:192:GQThUkx5L+GFnSy9Fl+i5qiMU8JvnwAJdzpziS/Sk+0ZqwcXgjRV2a:GxkLP8y9r+i5qiZ8VnLJ+oSYcXgXV
                                            MD5:5502E3DFA38F99D96844FF7DF95041DB
                                            SHA1:7E2168835FC3BA4E9BF4F78209E41086B83B8BF1
                                            SHA-256:4F351B04B1AEE3086D9272BD8F73A074B36B46838E6D453A1D95ED22094BD64B
                                            SHA-512:518A7431410F646BB7321F4CCDF434F5ECC91D32940CC92D317C969EAF95943A3C8F28C4C05187319A5BC91A35C5251E2313EF95EB36E2E9DDE2774303F1C636
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 2%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......'...c.a.c.a.c.a...m.a.a...r.a.a.e.k.f.a...e.a.a.c.`.R.a...j.a.a..g.b.a...e.e.a.Richc.a.........................PE..L...X^5I...........!.....0...P......{$.......@......................................................................pB..u....`..d....p..........................H....@...............................................a...............................text....%.......0.................. ..`.rdata.......@.......@..............@..@.data........P.......P..............@....idata.......`.......`..............@....rsrc........p.......p..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):36910
                                            Entropy (8bit):2.8284940764777797
                                            Encrypted:false
                                            SSDEEP:192:UOlZj7apMoD+A18E2jRjGRtYJGyFdk+ZaWeYyDAT9xoTIxuxSrne5rS+S:TGpzDGlGxodpZaUyDgkN5rSB
                                            MD5:3FFC6CFE8615E87FEC57A320AB381DA8
                                            SHA1:71C78B3A92FA71A6774885CE53DBE4B9988C53AF
                                            SHA-256:6D218B9C92752F9A312068243B81910023284B31D2D95F2791E868E5A56E3C33
                                            SHA-512:4A6241D0EF1405B9DC06060B49AF98BDE58C80E90F5B75EFDEC86B713741236C7365FE8451F1AFD9B7E3EF61109FDD3F37CF300541E018F4539A10EF0A16DEF4
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 2%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.@.............p.".....i.=.......$.......*......./.8.....%.......(.......*.....Rich............PE..L...Y^5I...........!.....0...P.......(.......@......................................................................pB..t....`..x....p..........................,....@..............................................@b...............................text....*.......0.................. ..`.rdata.......@.......@..............@..@.data........P.......P..............@....idata..t....`.......`..............@....rsrc........p.......p..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):69676
                                            Entropy (8bit):4.2668195897768
                                            Encrypted:false
                                            SSDEEP:768:4ItuFrhb6lHO49Eblhm3SpTzKrJ7HEsgoNj3o:3tuFVWHx9EbHmipWLEsgoNj3o
                                            MD5:0514D4B46B7BFE9655ADDBE99518262B
                                            SHA1:10FC3147FC393A239C324594B550D7CA9D6C95B9
                                            SHA-256:2AFDCFF0C7CC13E2FC4AC0FA591FA65E81CF209BBE7DC1D645076FE0F40BB05C
                                            SHA-512:2868F4C0E0F35B742FBA9E77AAA839372BEC632AB4D88DF2D4E92E3BBD855FF18F89FC1DA660714E59F00F0709ED6FFEAE4EBCB9BAC63FBC254721907A21DF86
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......GgF...(...(...(.x.$...(.a.;...(...&...(..%"...(..&,...(...).~.(...#...(.......(...,...(.Rich..(.................PE..L...\^5I...........!.....p...........g..............................................................................p...s...............C*......................x................................................... ................................text....j.......p.................. ..`.rdata..............................@..@.data...l........ ..................@....idata........... ..................@....rsrc...C*.......0..................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):73774
                                            Entropy (8bit):4.786531851506525
                                            Encrypted:false
                                            SSDEEP:384:c3QS8iD/HXPNEuSaL+3dNfQubYqBPbmN//aGdBV/GLNwSpKoe92wOVf5R9f57A5k:EBDDP1EJvQ3//GLuSpKABokX3
                                            MD5:8AB56C9F790B16E4CB5F221BD8FEC6C6
                                            SHA1:891EB6B43BB76657B028E0CCCD88DA8E0B721DD3
                                            SHA-256:05CD8A739D20A9A033EC4DF0BE5611E303FE67553B65805674537C68C6CCC24C
                                            SHA-512:B3699E2E6C149ADAC10D45C57B2E3D37974CE00B152A5974351B2BE055FCE16E1697FC2932BF1CC1B6D3BEE4156E1177F960D72BA241CD927A8DE473291FBC40
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 2%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.G...G...G...%...E...<...E...G...F......F...A...B.......E...G...y.......C.......F.......A...RichG...........PE..L...W^5I...........!.........p......59....................................... ..........................................t.......d...............................(...................................................8................................text...4........................... ..`.rdata........... ..................@..@.data............ ..................@....idata..............................@....rsrc...............................@..@.reloc..0...........................@..B................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):57392
                                            Entropy (8bit):3.773738549405251
                                            Encrypted:false
                                            SSDEEP:384:Ym3k3Xw9jB8NgVNsrPUNrd/cdd30AlVka/9QfoEL6FPQwr7PfKD:63A9V8SYoNSv37nbibC/CD
                                            MD5:2593E82FF9BD1E732073FA61C9443C58
                                            SHA1:ECFC317E6EBB9895456EC83913A6025A69671AFD
                                            SHA-256:B70F8F953BF846E900DDABBBEAC34785578608FAE2AA96B8BCB35EEE6C261F44
                                            SHA-512:21BBDB8BC827054EC83723B78408D7DE8EB0B1E16D3BD63609F15045886100ECAF6BA55CEF20F8882097BA02B45B0CA93AB8A76C4BA8F4DFDE4788F4B712CD95
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........W.K.9.K.9.K.9.0.5.H.9.).*.M.9..7.J.9.M.3.N.9...=.I.9.K.8./.9...2.I.9..?.J.9...=.M.9.RichK.9.........PE..L...Y^5I...........!.....`...p......QO.......p......................................................................pr..u............................................p..............................................l................................text....Q.......`.................. ..`.rdata.......p.......p..............@..@.data............ ..................@....idata..............................@....rsrc............ ..................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):245760
                                            Entropy (8bit):6.482748071127331
                                            Encrypted:false
                                            SSDEEP:6144:dRMW7+AlcUD8tbALEkPnvJMlr11RqQtCH9FMWiFaNF7R5LK61hKm:dZDcUyAl/k5tCV5BBx
                                            MD5:AE1C7BB7A3C4DB5DC6FFD58AD13C47D1
                                            SHA1:AC0851C6278C572A96BB15AA81122C162DBC8E43
                                            SHA-256:7C80667337192BF301F6A2368841B0EE86732E3B489A922325EF116BAD29F000
                                            SHA-512:808224F8BC8477833C00C937D64C96ACA38F60E7CD676ACD8AD6C199F23FCA9282FDA35E1BB0A7C3C1154373EDBAB24E189F4C23495B425C78FCC670757FD537
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>...z~..z~..z~...a..y~..z~...~..|]...~..a..w~..a..Z~..x..{~...b..;~..|].....^..{~..Richz~..........PE..L....$.?...........!......... ......tp.............x.................................$..................................Q<......(................................"......................................................D............................text.............................. ..`.rdata..!m.......p..................@..@.data...(h...0...P...0..............@....rsrc...............................@..@.reloc..J%.......0..................@..B................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):53294
                                            Entropy (8bit):4.351503374256036
                                            Encrypted:false
                                            SSDEEP:384:oBU9EbAmyRjHVPjFA8IbT/gTlD4G3TU7pYiQwOvZmoxZF6wZcT9295/1fKrf47:oLCRjHhjicTOGo2fR7ZF6+ag
                                            MD5:79A8C1025828A34C858DFB4130994F4F
                                            SHA1:040FB1BF157E7FBDC152270C4ED4E6CD37B30CBD
                                            SHA-256:0345CA114FCE2BC1055C4B5903078FF75A76A2175D69A897300A654F8BEAD00A
                                            SHA-512:2AECB204E5901CDB53EA27E86226E67EB9B6CAEEC60C33E7F179BD3BC97D3BB7EB00BA105462A62D243C2B338347A386E28970926870A7405CE0F049F204281B
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 3%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&m.GG..GG..GG..<[..EG..%X..EG...[..FG..Ad..BG...g..EG..GG..oG...X..CG...A..FG...X..AG..RichGG..........PE..L...]^5I...........!.....`..........ZU.......p............................... .......................................r..t.......d....................................p..................................................h............................text....U.......`.................. ..`.rdata.......p.......p..............@..@.data...<j....... ..................@....idata.."...........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):98350
                                            Entropy (8bit):5.60607986767422
                                            Encrypted:false
                                            SSDEEP:1536:qpgoG3ubMwBrZT9TAIzdhQDJK8U61BuDSdUc44Mv8PWLvCZjQ:qToubMg9TA4Ul5yGWL6Q
                                            MD5:DDE06E0CE5569E5D349FAEF43B397B81
                                            SHA1:944D5BC18B2C60AA535BEF51339CCAFDA435783A
                                            SHA-256:3C83FC50809DC731C39F6858AEADDFD0C07CEA18C5D48399EFF025C06E9C3F38
                                            SHA-512:132EBF51D792962453B09C059FC84C99221E3DB8C03F2256A1A50DA22BD0B5B886850855E25B82429946D86C4CA0485922B1180630FCC0BEF04797C962723C62
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 3%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n...........................Q........,......-/.............:.......j.......:.......Rich............................PE..L...]^5I...........!................+...............................................................................0...t....P..d....`.......................p..@...................................................dR...............................text............................... ..`.rdata...1.......@..................@..@.data....9.......@..................@....idata.......P.......P..............@....rsrc........`.......`..............@..@.reloc../....p.......p..............@..B........................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):45102
                                            Entropy (8bit):3.9544505323892722
                                            Encrypted:false
                                            SSDEEP:384:igMT3/pJrEH3Lt+RiV7K47S/dxSnEzXsKL5KP2xL7tT22wg2C9RSwO7:ij3r+u+qx02XDNu2Bx22zVbO7
                                            MD5:749DCD72564475D9B75394937507CF80
                                            SHA1:B6E24DBC4425524C5987D0E54FABE37CDD9CB76D
                                            SHA-256:D9BB7413A3B21156E0186D25CDAA7BA6FC89096783EA64FB3A4BA34CB1EEE553
                                            SHA-512:98049887BEAE10733D5D3A166390E5181D4A1271596975FD5218A42CE7C9F65275B3BD1829A5A77C9389242A4F0A1929D0AD5249235B8BBC04106C206070FF24
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 2%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......I.....u...u...u.v.y...u.o.f...u.......u...q...u...t.<.u...~...u...s...u...q...u.Rich..u.................PE..L...^^5I...........!.....P...P.......L.......`.......................................................................b..t.......d....................................`...............................................................................text....N.......P.................. ..`.rdata.......`.......`..............@..@.data........p.......p..............@....idata..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):41004
                                            Entropy (8bit):2.7027385698206
                                            Encrypted:false
                                            SSDEEP:192:bouceMonmCUXO+bBCa8XL7heyvVrs+1aBGvujVw8wtp/OlZ1S9mu:boSmCwtbs5dVQMEhw8wvV9mu
                                            MD5:5BEE6A7F6338F3524DC0F84801C865CE
                                            SHA1:E47BB33F0D4726DCE439C282815111D4CE606627
                                            SHA-256:79C82549649EADC953476181057AD8C54B1D4E31AD799AA104598814CA7F9309
                                            SHA-512:21B34B018500854157E779C0CE679A375AA54A8E8F8EECB948CC2694405CEB4EB4E163269350A9B81EFB2DD8FE679BB8C50EB91E980130AE7C39106CC05E5247
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 2%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1\_.u=1.u=1.u=1.."".w=1.s.;.p=1...5.w=1.u=0.h=1..":.w=1..;7.t=1.."5.s=1.Richu=1.........PE..L...^^5I...........!.....@...P.......0.......P.......................................................................R..s....p..d.......c............................P...............................................q..4............................text....2.......@.................. ..`.rdata.......P.......P..............@..@.data........`.......`..............@....idata.......p.......p..............@....rsrc...c...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):32812
                                            Entropy (8bit):1.6862333581582454
                                            Encrypted:false
                                            SSDEEP:96:EDcDAWOlyzUP98mJU5DgWV+pQpKWhS98/c2i:EDcDAlyzUP98mJU5DaUK8S98c/
                                            MD5:16433D8569BA6E5DB11DCB7705FFCCD7
                                            SHA1:AB4B21BFA1C1B8D62B64901BB83184074EB0E014
                                            SHA-256:98101AD3FE9C19A14AE46736680F06BF3B5FC66C713AB99D24CCB5AB13239C29
                                            SHA-512:A7743DB5AE0E34AA6F29C1A16261EBC5F1CC450838D26FF08415F2D73CEBA41DEFD40579D651B4F14F8291624B10AF483639D9649388AB2E8FE87083B24715AA
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 2%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........t............................J...............]...............].......Rich............PE..L..._^5I...........!..... ...P...............0.......................................................................2..s....P..d....`..F....................p..4....0..............................................lQ...............................text...6........ .................. ..`.rdata.......0.......0..............@..@.data...`....@.......@..............@....idata.......P.......P..............@....rsrc...F....`.......`..............@..@.reloc.......p.......p..............@..B........................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):61482
                                            Entropy (8bit):4.415492076383275
                                            Encrypted:false
                                            SSDEEP:384:WNMqmbG+MTVy8yzkL6Fdw/DM59xgXjv/yoc/zS7hL9Zu7+pi0HP3txo2D1Q56+sF:xkVj56ftAVc/z4PZ3pv3k5dsIQmZex
                                            MD5:E4D5C13B15A40B4B7E18686E73B3AE4A
                                            SHA1:08877943CFE7058E40415F3AA32B9DE7CC71DEBE
                                            SHA-256:64B4976E7F511A0893C7DDE50D500329B2B2780377579B8BF06CD834C29423AC
                                            SHA-512:5AFADA6AECF6A6430CD92803D60E9C4E83FFF0FC272A8644A73B3EDA899EB9FA9EFE29FBF860D3364AE67CC4445257227A981485811BD68E4C0E7CE79E8065A7
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......en..!...!...!...Z... ...C...#....... ...',..$..../..#...!..........."....... .......'...Rich!...................PE..L..._^5I...........!.....p...p.......k..................................................................................r.......d.......&.......................P....................................................................................text...Wm.......p.................. ..`.rdata..............................@..@.data...t........ ..................@....idata..............................@....rsrc...&........ ..................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):53294
                                            Entropy (8bit):4.246433740888109
                                            Encrypted:false
                                            SSDEEP:384:bUJmI8bd6AtBZb4gsZSsmraopfhzXUBh+pvuynKCGsT0ZPXGe5RnbYLNhBgUhYqK:z/B5kgnraoHXghivucelZ+e556vgL4w
                                            MD5:E3559327F44EF076D8AE871E78E793B6
                                            SHA1:19F62637613E365E67D3A81768D8ED8F5E728E08
                                            SHA-256:2BFF04532CE2B94A37040527F7E43C3C957764B3001858771C90A822645FD17B
                                            SHA-512:9BF1F71002168BF8DE6FBFC2E5B84B578275C40FB8A0F2D24B95AF5B34C9EE8E514BEC66546515AC90F6EAA09E30050D951C7C61DABC9279A769BE774F4D144A
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........o..Y..Y..Y.."..X..;...[.....X.._-.\....[..Y..j.....].....X...._..RichY..................PE..L...`^5I...........!.....p...P.......c..................................................................................t.......d....................................................................................................................text....e.......p.................. ..`.rdata..............................@..@.data...............................@....idata..............................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 22050 Hz
                                            Category:dropped
                                            Size (bytes):42044
                                            Entropy (8bit):7.26208833033609
                                            Encrypted:false
                                            SSDEEP:768:+3yxIuPvUsUNZ93Pczrw9P3sN/nfBhhyrBikjFI6RjGnLlX:QaUZN8zrw9PO5ehC6R8BX
                                            MD5:1EDB666DB90FD25360679D364FB3CEA0
                                            SHA1:BB90B7F89A0D0D54E18D45F8705151FAE7C26D5F
                                            SHA-256:DEC7D894F9A3778F738159ABD2DF39ECA6848358A9B05FD37F74800F1DB6044E
                                            SHA-512:4F767A17E63A1D7C9E43F4D3B50A4E056468313314BFEDE481DF20C8D197F28523C1FD5D88D09BD2AE4901B514D16A96D301332D568DECC1CA15BF42652E6002
                                            Malicious:false
                                            Preview:RIFF4...WAVEfmt ........"V..D.......data....|.......~.u.p.r.z.y...s.j.h.p...~.x.x.z.|.....|.}.y.e.|.p.g.x.....m.......}.z...z.j.f.`.b.w.....w.r...}.[.f.....q.........y.d.|.o.........|.~.~.}.~.u...u.|...|.|...e.X.f.y.{...z.v.y.......|.....y...x.t.....u.k.........{.t.i.v.u.~...q.{.s.[.v.|...........t.q.......}...s.........|.t.n.s.....s.............m.q.....}.......r.}...x.y.........u.y.t.z.............{...............................~.............................w...............................~...........k.........}.|.d.{.....{.......{.[.z...{.{...u.~...y.W...........w...........".............D...,.}......@.............}.C.....:.....r...........B.....%.q...........7.............R.Z...y.............#.......d...&....=.3.|.:.......m...b.%...+.a.....`.........U.i.L.Z.n.S...J.".....+.......>.....8...e.,................M.N....... .........O.......b.F.t.......'.......%.+.....w...........p.......".....j.<.}....L..t.g.}.>..1...f.y................o.........h.i...!...P...x...}.....W...e...
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):9193
                                            Entropy (8bit):4.720150069783411
                                            Encrypted:false
                                            SSDEEP:192:yaVTEG5oNKJcrYVNeODY+anQzXqGEIvy0PgaaE:nVTEWoNKJcfEzJgdE
                                            MD5:E8A159A0357B073EEB4D7D75C42E7264
                                            SHA1:46D6AD8CB8A7E9AC9E1897CEF16AD83ED0063060
                                            SHA-256:8D945D5BF835E6E90F934E8B45D1B759AA885C72FCB46C07905FCAF339E8DD01
                                            SHA-512:CE3726A6BA9EE2EFB3B7FD66308713B26D7F42258C398E64BB1EBB68E2FD62CFEF9845994697DBAD9E0A1F2CAF6DD22FB5D495F45578655CC4B452565F94BED6
                                            Malicious:false
                                            Preview:.. INTERNATIONAL LICENSE AGREEMENT.. .. If you live inside Germany, this agreement does not apply to.. you. Please read the agreement outlined in LIZENZ.DOC instead.. or, if LIZENZE.DOC is not available, ask EmTec for a copy of the.. German license agreement... .. This is a legal agreement between you, the end user, and EmTec,.. Innovative Software, Markus Schmidt ("EmTec")... The EmTec ZOC Communications Software program version 4.xx.. (the "Software") is licensed by EmTec for use only on the terms.. and conditions set forth in this document. Please read this.. license agreement carefully. If you download the Software you.. are indicating to EmTec that you accept and agree to be bound by.. the terms set forth in this document. If you do not agree to the.. terms and conditions set forth in this document, you agree that.. you will not download the Software and we thank you for your.. interest...
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ISO-8859 text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):9974
                                            Entropy (8bit):4.497257544659393
                                            Encrypted:false
                                            SSDEEP:192:LEA3V72K5Y2drDFv50gnEvEoicVtEZOkgiCVgAIIUIJSGgH9SH7Bv5IjM:YKqynFvSVYg5TJSHSH7ngM
                                            MD5:FFE41046AF6927238133068704F95EF1
                                            SHA1:2B82A9D23F65CEFF269C17BAD81F9F2912B906B5
                                            SHA-256:D684D326A272DD0223D83433500E5A1768C3DD82208C85B2AB8FA6196C629740
                                            SHA-512:286BDE83899C7235CF05607C6B7BEBBCC9523D6B7D2015AB1F0363156802EAFB34E63EAF7E2B8714D53810912F34AADFBF77AF62156C8C120B6DA51A8A22BE35
                                            Malicious:false
                                            Preview:.. LIZENZVERTRAG F.R DEUTSCHLAND.. .. 1. Vertragsgegenstand: Vertragsgegenstand ist eine Nutzungs-.. erlaubnis (nachfolgend Lizenz genannt) des Computerprogramms.. ZOC, die die Firma EmTec, Innovative Software, Markus Schmidt,.. (Sitz: Kirchenweg 14, 90419 N.rnberg, Tel: 0911 7406856 Fax: 0911.. 7406857, nachfolgend EmTec genannt) interessierten Personen.. (nachfolgend Benutzer oder Lizenznehmer genannt) einr.umt... Hierbei wird ausdr.cklich darauf hingewiesen, da. es nach dem.. heutigen Stand der Technik nicht m.glich ist, Computersoftware.. zu erstellen, die in allen Kombinationen und Anwendungen.. fehlerfrei arbeitet. Vertragsgegenstand ist daher ein.. Softwareprodukt, das die in der Bedienungsanleitung.. beschriebenen Leistungen erf.llt und dessen Fehlerfreiheit dem.. Stand der Technik entspricht... F.r die Pr.fung der Verwendungstauglichkeit des Programms zur.. L.s
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PDF document, version 1.4, 9 pages
                                            Category:dropped
                                            Size (bytes):82452
                                            Entropy (8bit):7.889896102760033
                                            Encrypted:false
                                            SSDEEP:1536:OYMxsszUS+5tYpHFk9LIhIdYuvrTlx/be4+opb90Aa:Oxs2SOlIdYunzt+eaAa
                                            MD5:C5D1971E682CE12FEE68FC8B0DB87AD8
                                            SHA1:727746711982880B667C6B088ADB76AB049C3F4D
                                            SHA-256:ADF712B5322C770A2EF5E13CA44952EF14CDF82D0BE37DF9189DA0C1CAD7CA42
                                            SHA-512:D80E6624F2A89CB90E6FFC9DA2194EEC7E093F2B8ED1114DC866E212D5CC91FF7B2DA249C59E207CF5A4C4E6D9139889490F3694EF46DC860D9AB3EADE40BCF0
                                            Malicious:false
                                            Preview:%PDF-1.4.%.........5 0 obj.<<./Length 6 0 R./Filter /FlateDecode.>>.stream.x..._.m9q..........Z^..WF.....0.Iw....4.L ..........>...|D.!...].W...r.;.|.[.m........|...........?..|;..>..w?...>..7>...........+.q....].....T8......)..3.KA......#p.:..?..lo.....m...Y.kE...n..oo..c..h.G. ...>...........~.../..?..W[h...W...........A.>..Y..GO..v..T...+.,....*hy.....-...@.Q......u.....\g....|F...t.[....6.....3....?..........(t.^...}...<....c..i.....1(..[..V...V.S.{....e._(|5E..?9I...q.w.C......V.3.....\.R..]..?..y.]zV...LQJm;<...Lx......v....j._(............"!.B.%H%Ad8..|.D.~.kTz...\........%..../.. ...h\..c.U.).X....vA..C%.s.......G..{.....?v.....jL.V..&(...BO.5?R.`T.J...RW".`.._.|.4^.._*|A<..:..U.)....e..g.i...p....'....6X.%-$Xw...&.X.;1n../.&.:.&<-}..~..|njO..L...L.......jeh....W.5.x........m........S.z.F}.+}^.+.n|...*.(mj&T4....PQa.'T..`m.[....%..L.R.?..0............4...8..N.P..h...............n-.W.<....?.]p...n.g...,6{.;...E...RVH...P...
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):6224
                                            Entropy (8bit):5.206987889396174
                                            Encrypted:false
                                            SSDEEP:96:NJfKtot6L5XXORrMsgagxq4B/OKttWXOlrjeDP:jfKtot6L5ORI6gU4B2KttameDP
                                            MD5:C2CD4258D2E1EA353A5B4343B1AA308D
                                            SHA1:9053EF06625079AB51981F7635EF285FE84FD0AE
                                            SHA-256:F4022DA38EBADF01D42385C114057FE151B5CD2F90E7C6FE27A68346263F5315
                                            SHA-512:FFAED7B9944D1413C14050021B1E4F1C91D533AD4D786D0BDACB38E1DA20D14011FAF7AB1947AFEFA52E47412887BAB1731134320B5DCB0312D37449A236FADC
                                            Malicious:false
                                            Preview:ZOC 4.14....[OPTS_DEVICE]..ActiveDevice=3..DeviceOpts#00=""..DeviceOpts#01="[1]38400-8N1|9|250"..DeviceOpts#02=""..DeviceOpts#03=""..DeviceOpts#04=""..DeviceOpts#05=""..DeviceOpts#06=""..DeviceOpts#07=""..DeviceOpts#08=""..DeviceOpts#09=""..DeviceOpts#10=""..DeviceOpts#11=""..DeviceOpts#12=""..DeviceOpts#13=""..DeviceOpts#14=""..DeviceOpts#15=""..TimeoutString="^!"..TimeoutControl=1..TimeoutTime=0..Standby=yes..NoStats=yes....[OPTS_TERMINAL]..ScrlLock=2..BackSpace=yes..CtrlChars=no..DumpMode=no..AscTrace=no..BinTrace=no..StripHiBit=no..Echo=no..Host=no..InCR=no..Beep=maybe..Software7E1=no..DoTrans=no..EchoCrOnly=no....[OPTS_CAPTURE]..CaptStatus=no..CaptDc2Dc4=no..CaptHeading=yes..CaptAppend=yes....[OPTS_TRANSFER]..TransAltDir="QW?|GIF|JPG"..TransAutoRemove="TMP"..ActiveTransfer=2..TransferOpts#00=""..TransferOpts#01=""..TransferOpts#02=""..TransferOpts#03=""..TransferOpts#04=""..TransferOpts#05=""..TransferOpts#06=""..TransferOpts#07=""..TransferOpts#08=""..TransferOpts#09=""..Transfer
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):7459
                                            Entropy (8bit):5.187363026269914
                                            Encrypted:false
                                            SSDEEP:96:NBeEfQto6ByR05DL5uH4Rw+0dpgagxq4B/OKttWXOlrjeDu:7DfQto6URcDL5+4RIhgU4B2KttameDu
                                            MD5:35E00E6D697A8D6314EB57C2C0CE8E4A
                                            SHA1:EDA98F72CE8FEEBFA3B24A8E7331F9846E084FED
                                            SHA-256:6D7CD2C875B9E222937D2CFFE8710F9BF20893FC14243DD07D76C2F39E493AAE
                                            SHA-512:AC8C0AA55D25D8B625576D8451209EDC67778512F0F8BDBD2D5A4BD97D29ED63C391BD72168506307530BD1DEA7E06BD426F8BECF528B0D115B312ED2DBDADF8
                                            Malicious:false
                                            Preview:ZOC 4.14....[OPTS_DEVICE]..ActiveDevice=3..DeviceOpts#00=""..DeviceOpts#01="[1]38400-8N1|9|250"..DeviceOpts#02=""..DeviceOpts#03=""..DeviceOpts#04=""..DeviceOpts#05=""..DeviceOpts#06=""..DeviceOpts#07=""..DeviceOpts#08=""..DeviceOpts#09=""..DeviceOpts#10=""..DeviceOpts#11=""..DeviceOpts#12=""..DeviceOpts#13=""..DeviceOpts#14=""..DeviceOpts#15=""..DeviceOpts#16=""..DeviceOpts#17=""..DeviceOpts#18=""..DeviceOpts#19=""..DeviceOpts#20=""..DeviceOpts#21=""..DeviceOpts#22=""..DeviceOpts#23=""..TimeoutString="^!"..TimeoutControl=1..TimeoutTime=0..Standby=yes..NoStats=yes....[OPTS_TERMINAL]..ScrlLock=2..CtrlChars=no..DumpMode=no..AscTrace=no..BinTrace=no..StripHiBit=no..Echo=no..Host=no..InCR=no..Beep=maybe..Software7E1=no..DoTrans=no..EchoCrOnly=no....[OPTS_CAPTURE]..CaptStatus=no..CaptDc2Dc4=no..CaptHeading=yes..CaptAppend=yes....[OPTS_TRANSFER]..TransAltDir="QW?|GIF|JPG"..TransAutoRemove="TMP"..ActiveTransfer=2..TransferOpts#00=""..TransferOpts#01=""..TransferOpts#02=""..TransferOpts#03="".
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):148
                                            Entropy (8bit):4.113006473123906
                                            Encrypted:false
                                            SSDEEP:3:qNLjZyZY2Qyitpo0ZjwH5/URkyqo/vUsQss7vqgtv:CjoZ/QyiPogjwuR5qYU9ss7vbtv
                                            MD5:7A011D4EF7B7F62D428006D2301161CE
                                            SHA1:08AAB427BF5ACDF0FC20B2C7C3715B06E66A2BEB
                                            SHA-256:F85586E72E3802BF2B77EF0B49654DB54D0FCCC5E2BABA05290CAD9921B2C14C
                                            SHA-512:EF4BB0CF87F42110DE60C30DE1B9043E896904ACE49E8BF1E2258EAAAD24985C9D4059314B1CB1E5D5A1B165B9112235BC7884293537A8FCA260041D81AD5808
                                            Malicious:false
                                            Preview:ZOC3.93 // TRANSLATE..I|5B|8E..O|8E|5B..I|5C|99..O|99|5C..I|5D|9A..O|9A|5D..I|7B|84..O|84|7B..I|7C|94..O|94|7C..I|7D|81..O|81|7D..I|7E|E1..O|E1|7E..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):148
                                            Entropy (8bit):4.113006473123906
                                            Encrypted:false
                                            SSDEEP:3:qNLjZyZY2Qyitpo0ZjwH5/URkyqo/vUsQss7vqgtv:CjoZ/QyiPogjwuR5qYU9ss7vbtv
                                            MD5:7A011D4EF7B7F62D428006D2301161CE
                                            SHA1:08AAB427BF5ACDF0FC20B2C7C3715B06E66A2BEB
                                            SHA-256:F85586E72E3802BF2B77EF0B49654DB54D0FCCC5E2BABA05290CAD9921B2C14C
                                            SHA-512:EF4BB0CF87F42110DE60C30DE1B9043E896904ACE49E8BF1E2258EAAAD24985C9D4059314B1CB1E5D5A1B165B9112235BC7884293537A8FCA260041D81AD5808
                                            Malicious:false
                                            Preview:ZOC3.93 // TRANSLATE..I|5B|8E..O|8E|5B..I|5C|99..O|99|5C..I|5D|9A..O|9A|5D..I|7B|84..O|84|7B..I|7C|94..O|94|7C..I|7D|81..O|81|7D..I|7E|E1..O|E1|7E..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):148
                                            Entropy (8bit):4.051572559025934
                                            Encrypted:false
                                            SSDEEP:3:qNLjZy8o1QoVZvRfgaCuRpU3y4VZB3HaAovfXqfqvn:Cjo8/2UaCuR+3RVP6Nvf68
                                            MD5:CCBE187B718F7DAD8318F9152EA3B83C
                                            SHA1:AE82B1A3203CC77445E5FFDC94022C2B49114DD4
                                            SHA-256:877EA0A397BEB0DCB6D6F4252A38BD98EC71F443514716CA157FBBF057389A3D
                                            SHA-512:F2281F17A9645ED01700BB9BC0606EA9180D9F7F86B308C5917B2094538E13ECC62CAE4AF56A5FD17E27B25A0996E6996573023FC6D825E44CFD74BC83843B6E
                                            Malicious:false
                                            Preview:ZOC3.93 // TRANSLATE..I|5B|C4..O|C4|5B..I|5C|D6..O|D6|5C..I|5D|DC..O|DC|5D..I|7B|E4..O|E4|7B..I|7C|F6..O|F6|7C..I|7D|FC..O|FC|7D..I|7E|DF..O|DF|7E..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):148
                                            Entropy (8bit):4.051572559025934
                                            Encrypted:false
                                            SSDEEP:3:qNLjZy8o1QoVZvRfgaCuRpU3y4VZB3HaAovfXqfqvn:Cjo8/2UaCuR+3RVP6Nvf68
                                            MD5:CCBE187B718F7DAD8318F9152EA3B83C
                                            SHA1:AE82B1A3203CC77445E5FFDC94022C2B49114DD4
                                            SHA-256:877EA0A397BEB0DCB6D6F4252A38BD98EC71F443514716CA157FBBF057389A3D
                                            SHA-512:F2281F17A9645ED01700BB9BC0606EA9180D9F7F86B308C5917B2094538E13ECC62CAE4AF56A5FD17E27B25A0996E6996573023FC6D825E44CFD74BC83843B6E
                                            Malicious:false
                                            Preview:ZOC3.93 // TRANSLATE..I|5B|C4..O|C4|5B..I|5C|D6..O|D6|5C..I|5D|DC..O|DC|5D..I|7B|E4..O|E4|7B..I|7C|F6..O|F6|7C..I|7D|FC..O|FC|7D..I|7E|DF..O|DF|7E..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):379
                                            Entropy (8bit):5.040496853090476
                                            Encrypted:false
                                            SSDEEP:6:+oVO2IU9D/c6bDwBoJ7oIwBuG7oIwBE7oIwB4K7g7oIwBtdQaBGwqkdLbBG4DIV3:+oVwU9D/bcoJ7obBuG7obBE7obBY7obo
                                            MD5:61A0C8380AF3F4399B42859CDEC7716C
                                            SHA1:CD15CE9338799DB7816DF2DE1830DE929AC735DE
                                            SHA-256:664FDA31E23CE761AD701F90D65B006DDC62ABEECBBBEE207120D6D601BC368C
                                            SHA-512:FA259355CC94109248C80BF6FEE131BE1AB2ED138DC11B1A04641F3BAB0CD450F1968AECDCAA5E6CE651858A8CDD360039543727AB24077F9EF9DCAED297EEA9
                                            Malicious:false
                                            Preview:ZOC 5.00 AT COMMAND PROFILE..ModemLoadInit=yes..ModemInitCD=no..ModemDtrHangup=yes..MdmIni="AT&F^M"..MdmDial#00="ATDT ^#^M"..MdmDial#01="ATDT ^#^M"..MdmDial#02="ATZ0^M~~~~ATDT ^#^M"..MdmDial#03="ATZ1^M~~~~ATDT ^#^M"..MdmHangup="+++~~~~ATH^M"..MdmAnswerOn="ATS0=1^M"..MdmAnswerOff="ATS0=0^M"..MdmDtrOn="+++~~~~AT&D2^M~~ATO^M~~^H^H^H"..MdmDtrOff="+++~~~~AT&D0^M~~ATO^M~~^H^H^H"....
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):7601
                                            Entropy (8bit):5.228091077364758
                                            Encrypted:false
                                            SSDEEP:96:czeEDutIBn05PKktRwfwBkdpgagxq4B/OKttWXOleMD2w:8DDutIBcP5tROekhgU4B2KttawDP
                                            MD5:27DA6834266E810B7181E3002DC8E4CE
                                            SHA1:B8BF95CE9E1FF684F080DDA80FE4C4D2446CA73B
                                            SHA-256:681A873F2F05C2B562A45856453CFB7463E68B3D3B4D6B7C1B272852829A8AAF
                                            SHA-512:A0FE06056C8BD94C5302278256F6368A3BB410DAC397CD3477325BD3AC79A66710F9DBE120276C74CB42E2EF43DA3131C049C7ED9FACE5FF7AD1E2F124DF3A75
                                            Malicious:false
                                            Preview:ZOC 5.00....// OPTS_DEVICE..ActiveDevice=-1..DeviceOpts#00=""..DeviceOpts#01="[1]:38400-8N1|9|250<Standard.zat>"..DeviceOpts#02=""..DeviceOpts#03=""..DeviceOpts#04=""..DeviceOpts#05=""..DeviceOpts#06=""..DeviceOpts#07=""..DeviceOpts#08=""..DeviceOpts#09=""..DeviceOpts#10=""..DeviceOpts#11=""..DeviceOpts#12=""..DeviceOpts#13=""..DeviceOpts#14=""..DeviceOpts#15=""..DeviceOpts#16=""..DeviceOpts#17=""..DeviceOpts#18=""..DeviceOpts#19=""..DeviceOpts#20=""..DeviceOpts#21=""..DeviceOpts#22=""..DeviceOpts#23=""..TimeoutString="^@"..TimeoutControl=0..TimeoutTime=0..Standby=no..NoStats=yes....// OPTS_TERMINAL..ScrlLock=0..CtrlChars=no..DumpMode=no..AscTrace=no..BinTrace=no..StripHiBit=no..Echo=no..Host=no..InCR=no..Beep=yes..Software7E1=no..DoTrans=yes..EchoCrOnly=no..DoEnq=no..EnqString="ZOC^9"....// OPTS_CAPTURE..CaptStatus=2..CaptDc2Dc4=no..CaptHeading=yes..CaptAppend=yes....// OPTS_TRANSFER..TransAltDir="QW?|MO?|TU?|WE?|TH?|FR?|SA?|SU?"..TransAutoRemove="TMP"..ActiveTransfer=2..TransferOpts#
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):148
                                            Entropy (8bit):4.06198202052733
                                            Encrypted:false
                                            SSDEEP:3:qNLjZiZtdtVvdfkOBuNjMyqAZgZwyZBtHua2ZNyCq:CjcZllupM5AyPVHHSs
                                            MD5:A6A1C8FF5D1D02249DB9DEE328475CC0
                                            SHA1:507C7FC77F024C0FA6106EAEE34677D33ABE620B
                                            SHA-256:2FE24DC47E2A9BCBDB1F5BA3BA0D17178894DAB1581B861422EC6130447F9A9B
                                            SHA-512:00A43D17973E85674DC4B48DD8E735E4D3B06A12FB729EFBD2E0CD9A15146C58F53D9E808CDC5C779ABFFCE186872058F77B5A026280C53B2A993461708C2ABA
                                            Malicious:false
                                            Preview:ZOC3.93 // TRANSLATE..I|8E|C4..O|C4|8E..I|99|D6..O|D6|99..I|9A|DC..O|DC|9A..I|84|E4..O|E4|84..I|94|F6..O|F6|94..I|81|FC..O|FC|81..I|E1|DF..O|DF|E1..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):148
                                            Entropy (8bit):4.06198202052733
                                            Encrypted:false
                                            SSDEEP:3:qNLjZiZtdtVvdfkOBuNjMyqAZgZwyZBtHua2ZNyCq:CjcZllupM5AyPVHHSs
                                            MD5:A6A1C8FF5D1D02249DB9DEE328475CC0
                                            SHA1:507C7FC77F024C0FA6106EAEE34677D33ABE620B
                                            SHA-256:2FE24DC47E2A9BCBDB1F5BA3BA0D17178894DAB1581B861422EC6130447F9A9B
                                            SHA-512:00A43D17973E85674DC4B48DD8E735E4D3B06A12FB729EFBD2E0CD9A15146C58F53D9E808CDC5C779ABFFCE186872058F77B5A026280C53B2A993461708C2ABA
                                            Malicious:false
                                            Preview:ZOC3.93 // TRANSLATE..I|8E|C4..O|C4|8E..I|99|D6..O|D6|99..I|9A|DC..O|DC|9A..I|84|E4..O|E4|84..I|94|F6..O|F6|94..I|81|FC..O|FC|81..I|E1|DF..O|DF|E1..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):136
                                            Entropy (8bit):5.1423689121079414
                                            Encrypted:false
                                            SSDEEP:3:qFu0/a6CXb5Q9Q2QpAq2oS4b9K5nTR32c7LKQWLhCw:QYXb5Qy1uYS4bSnTdLUFj
                                            MD5:1A54E33AF68277595634B09084CB407D
                                            SHA1:1363560BDC5B07DF34992C32366B78787DD1E139
                                            SHA-256:E761735658CCBD0BB265A598896189E4A810BB7BFFF1630CAE6903F65C3680CC
                                            SHA-512:67AD3C9D4458304644BC7694B56F4157A09BA5C3E8A0D00D14E2007CD856D5A86564ADFB60DCF5514C2408BFB0838CA9BA85F2455DD062C554C88B514E07FE5F
                                            Malicious:false
                                            Preview:ZOC3.00 // KEYBOARD..// scancode|flags|void|void|future|future|remap-string..// flags= binary 0,0,Alt,Ctrl,Shift,Ignore-Num,Scroll,Num..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):247
                                            Entropy (8bit):3.4069447517556832
                                            Encrypted:false
                                            SSDEEP:6:TVFf3OxVM/c9jT00mckKmLqbMzkTCKXswVRC61Ac3Nm:ZEY/MTz67LqWICksw7C61Acdm
                                            MD5:CD23D90408F40E9730DDC82473D83CBF
                                            SHA1:E0D40ACB84B2618DD9B5E6F35C9F17EB8B6B89A6
                                            SHA-256:180DF880DDD1A170D432F7E3E2351A4CE6F8926A58E0D9992DD070214BB59307
                                            SHA-512:540E55084AD630C26C5A3BF560A52D5EDBD816B78BC4EF459F63D602537AD92F510499CE10F4C0AF9A8AA8400A0FE21A0767C76815FB1000A75CEF76EA0C8DDB
                                            Malicious:false
                                            Preview:ZOC4.85..0 1 1..08200..08451..08452..08475..08499..08210..08490..08395..08393..08390..08456..08457..08360..08365..08367..08352..08370..08517..08516..08470..08471..08482..08484..08410..08479..08155..08215..08240..08255..08285..08250..08245..08286..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):157
                                            Entropy (8bit):4.864970826691657
                                            Encrypted:false
                                            SSDEEP:3:qFxlwak3YFi1QnpoaztAFq9dZ7YSnQzMRFVJ3MFgNP4JFK3AU:QxlkokLaRFvQ+j8ONwJFzU
                                            MD5:588562013C171D29DFEDDF935F0A1413
                                            SHA1:45DADF01B4873252CE7A9807E61EBC5DE2AC4DD0
                                            SHA-256:C2A999124134C4439E86A67D658DC55F55F714F3BEFC4A1F2C11D03C8D02387E
                                            SHA-512:F9D4C9B583F52180DEE9412626E94E67F7FEF2E3B738BD496B19C8E8B01B5604BF4A2EFFED398EE699D8619D8C3FFD285C3F31817CBBDEF49A111FA7C48F3234
                                            Malicious:false
                                            Preview:ZOC3.00 // TRANSLATE..// CHARACTER TRANSLATION TABLE (CHANGED ENTRIES ONLY)..// format: x|Old|New ..// x= I (inward) or O (outward), Old/New in hex..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):148
                                            Entropy (8bit):4.06198202052733
                                            Encrypted:false
                                            SSDEEP:3:qNLjZToyh7Ht7ov55GUZdj/psVo0njUdM6W2n:CjloypZuhj2V/jUdM8
                                            MD5:8C4827EAB32AED3719B4EB5897CD2A49
                                            SHA1:BE1287F909BA9D8136105CD3D6DFA826C26FDDE8
                                            SHA-256:2C542703FF74BE150D4B460AB14E03705441834337397730C8DA80A32C6177B0
                                            SHA-512:9AB0017258708C1531CDD3E4BE033BAA26645C16F148CC35A60F307B8002D49667F0FD3961EC467AAAE51D114A5E9AAB338A1F9AE5B9BB14D6F10D2B7923A985
                                            Malicious:false
                                            Preview:ZOC3.93 // TRANSLATE..I|C4|8E..O|8E|C4..I|D6|99..O|99|D6..I|DC|9A..O|9A|DC..I|E4|84..O|84|E4..I|F6|94..O|94|F6..I|FC|81..O|81|FC..I|DF|E1..O|E1|DF..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):2347
                                            Entropy (8bit):5.39625939318526
                                            Encrypted:false
                                            SSDEEP:48:TpPvvxQgY9/qGwIa9je4qjWkpzjT7YCXgjSwNDjrzjT7Y41gjSwH1SDjrzj4:F5Q7SdefHpfTlXyLPfTzyh6Pf4
                                            MD5:FB568290B72934C5208A49A6FD6CC8A1
                                            SHA1:A33EDF5E2973FD9478161104E9B96DE0C64C8F65
                                            SHA-256:4FA894A5259E519FCF377990C217BD4E3AA721EEDC0E69D3FF6307A5109885EF
                                            SHA-512:0CF77543BBF3084794A7C1E9165F17FED4589A049021572BD346B4F227D5BDBF599DFC7C1B8104D378D4A5A54249A066DDB1C29E2EDDB2A9AFFDC01AEF28332C
                                            Malicious:false
                                            Preview:ZOC 4.96 // X:\zoc\v5\workdir\Options\ZOCHOSTS.INI....# HOST DIRECTORY. LAST WRITTTEN 2004-06-05 16:51:10....<SECTIONS>..Flags=0..NumSections=2..Section#0=Samples VT100..Section#1=Samples 3270..</SECTIONS>......[ENTRY]..book=1..handle=1086446180..name="Library of Congress"..number="locis.loc.gov"..deviceid=3..emu=11..deviceopts="[3]0"..emulationopts="[11]00|01|00|{swap}*"..first=no..dosimpledial=no..dialtype=0..qaccess=no..icon=0..username=""..password=y'Xs2hudnX5fGw3v/VCJqWgZXa4eqz1dPK+63T0KWHtp2xoO7FuaHf0/LJudbIhqaKh/yawdGjPRDo9FW3yoYXFA=='..authfile=""..authglobal=no..script=""..scriptparm=""..waitsend=""..learn=no..optfile="3270.zoc"..logname=""..dlpath=""..ulpath=""..keyboard="Standard.zky"..translate="Standard.ztr"..charset=0..protocol=-1..donewwinpos=no..newwinpos=""..ctrlfkey=0..newwindow=0..memo="3270 Emulation ... Library of Congress"..calldue=0..multimaster=no..iemsibits=63..iemsiwanted=no..calls=0..lastcall=0......[ENDENTRY]....[ENTRY]..book=0..handle=1086445972..name="New
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:Generic INItialization configuration [InternetShortcut]
                                            Category:dropped
                                            Size (bytes):168
                                            Entropy (8bit):5.133979352516949
                                            Encrypted:false
                                            SSDEEP:3:9mw32/0S4ASE9NEhQs1+1bABGQYm/0S4ASE9NEhQs1+2MDBuTVx0knVEN:8wm/r4ASE9NVFFVm/r4ASE9NVXMZXG
                                            MD5:334F676722A45FCE338BDACD6C7187A9
                                            SHA1:D36EA51318747F63D6CFAFD67A1C790B55716EA8
                                            SHA-256:DAF30DB014A597C1A9013ACF1D6281A51C351D0E3984FA261A5113751F3562F7
                                            SHA-512:A5B0A8EADBA0B479A48AF7653FC2CD25C47CA3C2E52881CF07D909DC3EEA3DB01967EAB5A713115D3A2B795DC32C1A417C6E76F762BDBB825A7328AEBD587CF8
                                            Malicious:false
                                            Preview:[DEFAULT]..BASEURL=http://www.kilowattsoftware.com/tutorial/rexx/..[InternetShortcut]..URL=http://www.kilowattsoftware.com/tutorial/rexx/..Modified=60421E6A6A2CC40185..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:Generic INItialization configuration [InternetShortcut]
                                            Category:dropped
                                            Size (bytes):200
                                            Entropy (8bit):5.239094115833339
                                            Encrypted:false
                                            SSDEEP:6:8wm/r4qpdOOEi0FVm/r4qpdOOEiVzlRsU:8wipAOIFVmFpAOBBRx
                                            MD5:66D3EA6678C8C1C928A3CB422507F991
                                            SHA1:DAD08BA648C7A4913833CD4ED878CD1C124DEAB1
                                            SHA-256:7378B84C53C86ABEA5567606DABE2B49C5446D023C8EB2D5CC6562B84DF718A6
                                            SHA-512:30919D7428DE6816E50BFF7BF35B409B92A679C7F0CCB747E0BE9B3082A1F00083ACD382890310FE8C339F0B29F38D27BA99EFD0C522CED64220A00B52B8391C
                                            Malicious:false
                                            Preview:[DEFAULT]..BASEURL=http://www.borg.com/~jglatt/rexx/scripts/language/language.htm..[InternetShortcut]..URL=http://www.borg.com/~jglatt/rexx/scripts/language/language.htm..Modified=40DA4CD8692CC40198..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):611
                                            Entropy (8bit):5.175413963129593
                                            Encrypted:false
                                            SSDEEP:12:UIIVKwq/GRK/WLE2Shr22txA1g/T2j3pHGtPHfh5HasUuv:3IVxweYfhqexA1gr2t4P/Da/uv
                                            MD5:8BF2D6621265E344CD0282548A6AC999
                                            SHA1:378DD96D6C3B4F3E9C76460823A8103BF799A7C7
                                            SHA-256:7F11600371D4F603024AA4911320E17AC48D3E0BA593C208E7EB58BB16637CC4
                                            SHA-512:CC7B96410CFE1F59B207F8FBDAC2536379C86CCCEDDCF3A30E834C80BD573CE49E3170FD40931903D454B04F2ED50B42519E94F7CBC953810933089DD1B95094
                                            Malicious:false
                                            Preview:/* REXX SAMPLE TO PRINT TO AN ATTACHED PRINTER */..../* REXX does not support printing directly. However, if you are using .. the VT100, VT102, VT220 or Linux emulations, output can be redirected.. to a printer, by using the VT-PRINT-ON and VT-PRINT-OFF sequences..... After printing is turned on, all screen output will be redirected.. to the attached printer ..*/....esc= D2C(27)..vtprton= esc||"[5i"..vtprtoff= esc||"[4i"....CALL ZocWrite vtprton....Call ZocWrite "Printing ..."....DO i=1 to 10 .....SAY COPIES(" ", i)||"Hello World"....END....CALL ZocWrite vtprtoff....Call ZocWrite " done!"......
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):477
                                            Entropy (8bit):4.985838011623867
                                            Encrypted:false
                                            SSDEEP:12:U2qFv8oG2Xr2qPSqq3MZE0j26/Wu7RGmOoa:tQ8N2qqaqqMEAJO6gxr
                                            MD5:E542B7B62FE76134BB656CF367DAB34E
                                            SHA1:BD58EB43148E8D13F2F441EDE3627A4D89A4B9B5
                                            SHA-256:EFB561370A22D367367FBD6A3F66D4B7AACF182175BBFA71FCD0410664B293D9
                                            SHA-512:BEB325CB1894AE3FFCA8D83C75098662E739D60889FF732861F437242B75EF0EDF8FABA56DE2640CDF8B6AB3921FBB3B2EC7E567DEA53CCAE44CD61367B155E6
                                            Malicious:false
                                            Preview:/* REXX */../* ^^^^^^ REXX programs always begin with /* REXX */ on the first line */..../* clear the screen */..CALL ZocCls..../* set a variable */..WHO= "World"..../* output text and variable via string concatenation operator: || */..CALL ZocWriteln "Hello "||WHO||"!"..../* Ask user for his/her name */..who= ZocAsk("What is your name")..../* print some text to the ZOC window */../* (this time we're using REXX's internal SAY command) */..SAY "Hello "||WHO||"!"....EXIT....
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):627
                                            Entropy (8bit):5.0165608006206615
                                            Encrypted:false
                                            SSDEEP:12:UxAmq2vv5RRNKCJra1KKEINuFgc6aGEdREuzV+1KA4MkZ8+FGBa:0q23PHla1ldwGvaGGEuzYcxMkbV
                                            MD5:2A9268861EB1185F224C04E0051D62C6
                                            SHA1:0E259F2A64B39AE88D7EF4A7A8A0623D9B3E86D2
                                            SHA-256:B5DD06CC2EE3E16A2FF93EC077500B8A7423189F7D44C34BF3946C033E3D634E
                                            SHA-512:F6C47505AA7C25FAD5957E1DF03595D69613DFE15435FE44DF136621122F9375073022D0B4C56ECE6F9E60C5631CFD032E839957D962831457DFA7042982806B
                                            Malicious:false
                                            Preview:/* REXX */..../* THIS SCRIPT SHOWS HOW DECISIONS WORK IN REXX */....CLS..../* show a nice request window to the user */..answer= ZocRequest("Do you like ZOC?", "YES", "NO")..../* here comes a decision with one alternative */..IF answer="##CANCEL##" THEN DO.. SIGNAL endit /* jump to the end */..END....../* here comes a decision with two alternatives */..IF answer="YES" THEN DO .. SAY "Nice to hear that!"..END..ELSE DO .. /* ANSWER=NO */.. SAY "Oops, are you really sure about that?".. SAY "(maybe you mixed it up with Hyper Terminal)"..END......endit: /* target for the SIGNAL command above */..EXIT....
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):539
                                            Entropy (8bit):4.864272524556626
                                            Encrypted:false
                                            SSDEEP:12:UxAmqbqoAZzju15Im0ptBcKw5bCJ5MDEcuyPQA5ktwlxAAGxiWFnyoa:0q/AZzFmmIcHMDEcuyPZQ+qMWFnyr
                                            MD5:421CEB22C5AA75B5EFA784FC2A76380D
                                            SHA1:45B6BD7EBB3511D5A8474501F99305756C19D851
                                            SHA-256:834C2EF4EB69B3151FCD660DDF2589ED037846B61826524F6E2CEB964C037411
                                            SHA-512:B947BBA25F916BBE08077BD5707F07E1C7B7FF634EF79BFBDD97FD7653CBF88B7BECE7610E416F021D3954CC2EBFCB40059DD8CE13C512356A2A1AF67949DCCF
                                            Malicious:false
                                            Preview:/* REXX */..../* THIS SCRIPT SHOWS HOW TO LOOP COMMANDS */....CALL ZocCls..../* a simple loop (running three times) */..DO 3.. SAY "ZOC!"..END ....../* a loop running until the user answers YES */..DO UNTIL answer="YES".. answer= ZocRequest("Do you like ZOC?", "YES", "NO")..END ....SAY "Glad to hear that!"....../* a counting loop */..DO i=1 TO 11 .. IF i//2 \= 0 THEN /* if i not dividable by two */.. DO .. SAY i": He loves me".. END.. ELSE.. DO .. SAY i": He loves me not".. END..END....EXIT....
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):341
                                            Entropy (8bit):5.0078133170210295
                                            Encrypted:false
                                            SSDEEP:6:Uyt9r9YZjKBANQ3nxbHIIPTsso5GbAIUg51/5qUSOTNroxNMewNroxXiI6oa:U6dBAq3aIPtcbgABkoNMeuox6oa
                                            MD5:6ECB7DCDB03A045B6BC1DD90B5B4CA64
                                            SHA1:A20D1052D85A722E589945849B66ADAAE20F0373
                                            SHA-256:E125606EEBACD70E51789D60BD7663EB717CC7C29C84E96B7BB6C0645E326F18
                                            SHA-512:10FA08B089C034352C1A49544455ABE594DB0212FEBA7EFE0B1C47EA63DBE961C827D266C28438BCF0AD387A34EFC284DDC1DC7EBE966C9F064319100A4DB677
                                            Malicious:false
                                            Preview:/* REXX */..../* send something to the modem and wait for an anwser */..CALL ZocSend "ATZ^M"..../* tell ZOC to wait 3 seconds max. */..CALL ZocTimeout 3..../* wait for answer */..timeout= ZocGetline()..IF timeout=0 THEN DO .. SAY "THE MODEM SEEMS TO RESET FINE!"..END..ELSE DO.. SAY "THE MODEM SEEMS TO HAVE PROBLEMS!"..END....EXIT....
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1181
                                            Entropy (8bit):4.82158349700145
                                            Encrypted:false
                                            SSDEEP:24:/f+T8jZ6IVWDwfJtrNdOVskFSJHcG7SbhTF0eASYPvXChrr:3A8zVAwRQWkibub0/vmr
                                            MD5:7A38FCEB1DA7DED6079618754B229AF6
                                            SHA1:511C65726B2FC5C2EC59BFB03C0B623CCB055721
                                            SHA-256:E0479181BCBCD776FE9B41E8B51FC3FDFB70D14648F80D5B348C64383D792AFC
                                            SHA-512:D5244689BA206823B65474181F160D95D2F1853132D915D21DB0DEB97C0DFBB5EBE9B73364609DEC9BB211531A8B229D7674B239A44903EC4EF66DE6856C7C58
                                            Malicious:false
                                            Preview:/*******************************************************..** AUTORESPONSE..********************************************************..** ..** with the ZocRespond function you may setup automatic..** responses for incoming data. These responses are ..** checked within a ZocDelay or ZocWait command...** ..** There is a limitation of 16 responses, each having..** 80 characters max...** ..** This is a example of how to login to a bbs and skip..** across the initial news (assumed that they have..** a "- press enter to continue -" prompt)...** ..** However, this is not the typical way to do a login;..** it is merely a sample to show the use of ZocRespond...** ..*/....../* Setup a few replies for the login and form the info blurp */..CALL ZocRespond "Name", "ZOC^M"..CALL ZocRespond "Password", "SECRET^M"..CALL ZocRespond " continue -", "^M"..../* Dial in (no error busy etc. checking) */..CALL ZocDial "1234567"..../* wait until main menu and leave the work to the responses */..CALL ZocTimeout 3
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1315
                                            Entropy (8bit):4.637518650497564
                                            Encrypted:false
                                            SSDEEP:24:Ls8iTNnb8OS/TFEQUCi3sbQIArtnp8pISFIM/x9PNyN4HJZ:ANnY/TFEc1bQHn0ISjj1yUZ
                                            MD5:52FB14A0F75D22E620845ABDD0C956B1
                                            SHA1:A26A7FEB891A4A666A187060FA867E539AE792A7
                                            SHA-256:2C41135CF8E59C0EBF69A401B3AB48899866891E59CC62410674E453BB0802A9
                                            SHA-512:0DDF1BC30B528B94056956B2EEDAB03652FD7FBA0EC380907BCDA6B6B08F7D1580FC8E99AE62CB816D0B6C2244D1C961D774F70FC0E05CC2F15AEECE826D42A8
                                            Malicious:false
                                            Preview:/* REXX */..../* This program lets the user enter a value. It is done in a sub- */../* routine with global variable space that modifies the variables */../* of the calling program part. Then another subroutine checks if */../* the value can be divided by any other number. */....CALL ENTERIT....IF HAS_DIVIDERS(number)=0 THEN DO .. SAY number||" is a prime number!"..END..ELSE DO .. SAY number||" is not a prime number!"..END....EXIT..../* Below is a subroutine. It has access to the varibale pool of the */../* calling program. Of course, this could be done in a more elegant */../* way. */..ENTERIT:.. SAY "Please enter a number (up to 1000)".. PULL number.. RETURN....../* Below is a function. The word PROCEDURE was added, to give it a */../* local variable pool. Exchange of data with the calling program is */../* done through argument passing and zocresult return mechanism.
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1295
                                            Entropy (8bit):4.59138834143411
                                            Encrypted:false
                                            SSDEEP:24:Ls8LaS3L/TFEQUCi3sbQIArQgL8pISFIM/x9PNyN4HJZ:A8T37TFEc1bQF+ISjj1yUZ
                                            MD5:785F8BB85085868122077033FB99CD0C
                                            SHA1:0A06C8B6D653AAEE9C8A32CAC4BE538ACACAC28E
                                            SHA-256:0602C22D225ED7792819F486696A9EDA1B276A651B987D1FDBE7876BA4BC661A
                                            SHA-512:90247382B81160FBA1EC50894EFE1D66895B622ACD09BA01AAB8A61D704C58345131E082A8B7FE5475A8C2915F6E9C27E2FBE57F49EC7DDECA3C7BB512B7E494
                                            Malicious:false
                                            Preview:/* REXX */..../* This program lets the user enter a value. This time we do it */../* in a function that returns the entered number. */../* Then another function checks if the value can be divided by any */../* other number. */....number= ENTERIT()....IF HAS_DIVIDERS(number)=0 THEN DO .. SAY number||" is a prime number!"..END..ELSE DO .. SAY number||" is not a prime number!"..END....EXIT..../* Below is a subroutine. It has access to the varibale pool of the */../* calling program. Of course, this could be done in a more elegant */../* way. */..ENTERIT: PROCEDURE.. SAY "Please enter a number (up to 1000)".. PULL n.. RETURN n....../* Below is a function. The word PROCEDURE was added, to give it a */../* local variable pool. Exchange of data with the calling program is */../* done through argument passing and zocresult return mechanism. */..HAS_DIVI
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):994
                                            Entropy (8bit):4.695522465090394
                                            Encrypted:false
                                            SSDEEP:24:EtGXyAnJ2U7Y28r8GSt/hanfPzS/pm8ZISVIM/x9PNyN4HJZ:EtQmUcPO/hau/pnISzj1yUZ
                                            MD5:2A5C7F9E3E5714DB2B010BF7FE66E9CE
                                            SHA1:9587D3ADEE9DA1382250D60F0A6CC59D98FBBA6E
                                            SHA-256:1129BA68550EA73BAEA41F87AC5683A4B901EDAABBBCBEE5074BD76CF8D1A035
                                            SHA-512:6CF69C4603414EE2094892DD17F97293D197EAA8EB0F363E6B1E07C7C3C135AAB1D47715A57DBB17645EBFC4905CFF34FF53D071519CB801FC7EC0B9313E853A
                                            Malicious:false
                                            Preview:/* REXX */..../* Arrays are built by appending a period and an index to a variable name */../* Typically the size of the array is stored in index 0 */..../* Build a list of 50 prime numbers */....list.0= 0..z= 3....DO WHILE list.0<50 .. IF \ HAS_DIVIDERS(z) THEN DO /* IF NOT ... THEN */.. list.0= list.0+1.. ind= list.0.. list.ind= z.. END.... z= z+2..END....DO i=1 TO list.0.. SAY list.i..END....EXIT....../* Below is a function. The word PROCEDURE was added, to give it a */../* local variable pool. Exchange of data with the calling program is */../* done through argument passing and zocresult return mechanism. */..HAS_DIVIDERS: PROCEDURE .. /* Pick up first (and only) argument */.. z= ARG(1).. zocresult= 0.... DO i=2 TO z-1.. IF (z//i)=0 THEN DO.. /* leave loop if i is a divider of z */.. zocresult= 1.. LEAVE i.. END .. END.... RETURN zocresult....
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1958
                                            Entropy (8bit):4.682063876684421
                                            Encrypted:false
                                            SSDEEP:24:1SH3fcw3fyHBSKw/oW/wF3GUUirgTn6kQ/eR/aeQ7Bulgjr:1o0SaHB0L/UGUGr6OXAjr
                                            MD5:E9803D34F124C7A94F88FAE85B5BF6A7
                                            SHA1:6AF33012F57F22755C1685AF0178B9F90E84A89E
                                            SHA-256:92C86AB58A8E0026BEA95F9D1126C43AE3D36C3694325B9B1A6E7718442D8BF0
                                            SHA-512:0BB8B2D03912365AC2776AE352A1EAE8417703FECD84C2748ECFB462366AE1EEA8E3EF6472D820708E63155D1FCD4765A24D73F965750A25745E643A1B445A58
                                            Malicious:false
                                            Preview:/* REXX ..** ..** This example demonstrates the basic file functions:..**..** - check for existence of file..**..** - open file for writing ..** - write data to file..** - close file..**..** - open file for reading ..** - read data and check for end of file..** - close file..**..*/..../* ------------------------------------------------------------------ */..../* the STREAM(,"C","QUERY EXISTS") function call can be used to check */../* if a file for exists. */....IF STREAM("SOME.TXT", "C", "QUERY EXISTS")\="" THEN DO.. /* file exists, so delete it */.. ADDRESS CMD "DEL SOME.TXT"..END..../* ------------------------------------------------------------------ */..../* the STREAM(,"C","OPEN WRITE") call is used to open a file. */..CALL STREAM "SOME.TXT", "C", "OPEN WRITE"..../* the LINEOUT call writes data to a file. Instead of a file handle, */../* the file name is used. */....CAL
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):3698
                                            Entropy (8bit):4.8792779713640035
                                            Encrypted:false
                                            SSDEEP:96:5/lLuW4+be83ZHSICaxvUzNNgSrUrSwVFEmFr:XuUd8zNVuSwzFr
                                            MD5:295E21AAFDB9A74E592854F9E815E280
                                            SHA1:D32F7DB7BB4C621AA575F6F8C6512B6C963E9F0E
                                            SHA-256:4440E8A8A005238DC34D505067119C99F1D0C7AA8A88554FEFB6550C7F8A2FC8
                                            SHA-512:FA8F3550C8B37626F44C10D2D907323BB46E4626FA3981D40251C60738FD60FA5542F9284C20A463DFD40654ACD594CCA8DE964EA3A52871BAA184172D3377D4
                                            Malicious:false
                                            Preview:/* REXX ..**..** This is a non-functional skeleton for creating an autologin ..** script. However you might not need it, since simple autologins ..** can be achieved without script programming using the autologin ..** feature of the phone book...**..** Scenario:..** Let's assume Zaphod Beeblebrox uses the Megadodo bbs on Ursa ..** Minor Beta to download new messages and upload the replys that ..** he wrote offline. ..** This script calls the bbs and eventually tries again until it..** gets a CONNECT. Then it goes to the main menu where it downloads..** a new mail packet and, if available, uploads Zaphod's replies...**..*/....../* Prevent users from accidently dialling long distance to Ursa Minor Beta */....CALL ZocMsgBox "This is a sample file. You should check it's source code"....really= ""..yesno= ""..DO UNTIL yesno="##NO##".. yesno= ZocMsgBox("Are you "||really||" sure that you want to make a "||,.. "call across the universe?", 2)..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):461
                                            Entropy (8bit):4.906846021583566
                                            Encrypted:false
                                            SSDEEP:12:U6dBAq34+cPjRVDox1Q+vvYtZpmumguUD4rubD4qaEc0CJo6oa:ndBY++jf38vGJmgNMrC5aEcU6r
                                            MD5:AFA516AAC6EB71B2B60345D57944FF35
                                            SHA1:1FD9777FBF3325CC5BFBB37D3547C27237BFF7B6
                                            SHA-256:2D2726623206A03BFC20131157716421BFB378A6BCDAF9281B69C8F9B8DC6668
                                            SHA-512:5587FED5651AD1834BFF4CAA32ABF7FA84C565DF92C2C58BC9B549F523822A965EB271FDB0AE88D7A44EEFCC23188A007FFD9881B687F69E85006747D6D32B26
                                            Malicious:false
                                            Preview:/* REXX */..../* send something to the modem and wait for an anwser */..CALL ZocSend "AT\S^M"..../* wait for answer */..CALL ZocTimeout 10..../* read text linewise and wait for a line containing OK */..DO X=1 TO 999 UNTIL ZocLastline()="OK".. timeout= ZocGetline().. IF timeout=640 THEN DO .. LEAVE.. END.... /* remember all lines */.. A.X= ZocLastline()..END ..../* show all lines again */..DO Y=1 TO X.. SAY Y ":" A.Y..END....EXIT....
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):143
                                            Entropy (8bit):4.467841256956491
                                            Encrypted:false
                                            SSDEEP:3:Uy99IIC5fxTPKov1swessXsGTysw3iK8HiFuLRFqmqov:Uy4gyyrXn4yjqHov
                                            MD5:F4607CD1DA24023A937577AE5B047F8D
                                            SHA1:BA7DEC9C2CBD2C5F2630DA0FCC350E91737590EE
                                            SHA-256:086F71AE18E5B23E7F687BE11FD8136F9064C5C6BCB8FD3E6319C4FC752151EF
                                            SHA-512:BABDE7EE40ECA40FEFEFB22C517B2FF3FD809A01AF7708F8D4F52F9063CD3408660B4034267CB76EA4DC095C7794CFBC57BC44B1D3EEFC4EB308C6BDD90DB678
                                            Malicious:false
                                            Preview:/* REXX-Program: FIRST.ZRX */....CALL ZocCls /* clear screen */..CALL ZocWriteln "Hello World!" /* print text */..EXIT..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):744
                                            Entropy (8bit):5.047610240590951
                                            Encrypted:false
                                            SSDEEP:12:UXKyKS4jXNHFbwlMBPNMLHnRgk5N+MWbaN8hj0Fbwl6BPNMZgTCjqxrZ5N+vuEov:WK759wmBPonmk5N+MtLw0BPlCYZ5N+WZ
                                            MD5:9D8F17370B70D0FD1A99795A073CA0B1
                                            SHA1:9A7E88BF7D61E73B780D2E971A4A33D221BBBE73
                                            SHA-256:37BF18F6B51D72F2EED16C19ABC1DA901C299D57BAA47CA48BB7A01BC9BC7BF6
                                            SHA-512:1E46CBE2482656C7CAE658C6C6AB3686EE8857C0FB6A250327124801359E12FEB4D72494AF1E7DDF7A6B62D2382661A6DDEDF1C2D5B17EC7DBC47E05C49A661E
                                            Malicious:false
                                            Preview:/* REXX sample about decisions */..../* Set max wait time to 60 seconds */..CALL ZocTimeout 60..../* Wait for text 'Name:' - check for timeout.. and send user name or report error */..timeout= ZocWait("Name:")..IF timeout=0 THEN DO.. /* received 'Name:' */.. CALL ZocSend "Joe User^M"..END..ELSE DO.. /* Ouch, 'Name:' was not received */.. CALL ZocWriteln "ERROR (Name)!!".. CALL ZocHangup..END..../* Wait for text 'Password:' - check timeout.. and send password or report error */..timeout= ZocWait("Password:")..IF timeout=0 THEN DO.. /* received 'Password:' OK */.. CALL ZocSend "secret^M"..END..ELSE DO.. /* Ouch, 'Password:' was not received */.. CALL ZocWriteln "ERROR (Password)!!".. CALL ZocHangup..END....EXIT..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):837
                                            Entropy (8bit):5.043415793560473
                                            Encrypted:false
                                            SSDEEP:24:WK759wmBPonKk5N+MWKrCLw0BPlCYZ5N+WF:WK8QWx2zZ/
                                            MD5:695D4AA15AEEA083CDE1942F52F1A2DC
                                            SHA1:5A20AFE704C256631208C95F6EBFC0668C46E0CD
                                            SHA-256:15B44D8DB593E3489444C0C24C99792FD4B3F0DED4E5DBF315A22AD63E2BFAB8
                                            SHA-512:AE7B7FEBDA6B946D7282A4CD0B409B5D538025F54F79B822CD2AC8C48B417031F6E1FCEA49FCF9EFD0AE17FCFC9454CBF271CF5B54F9DF36EC2F4385685654BD
                                            Malicious:false
                                            Preview:/* REXX sample about decisions */..../* Set max wait time to 60 seconds */..CALL ZocTimeout 60..../* Wait for text 'Name:' - check for timeout.. and send user name or report error */..timeout= ZocWait("Name:")..IF timeout=0 THEN DO.. /* received 'Name:' */.. CALL ZocSend "Joe User^M"..END..ELSE DO .. /* Ouch, 'Name:' was not received */.. CALL ZocWriteln "ERROR (Name)!!".. CALL ZocHangup.. SIGNAL GetOut /* Jump to end of program */..END....../* Wait for text 'Password:' - check timeout.. and send password or report error */..timeout= ZocWait("Password:")..IF timeout=0 THEN DO.. /* received 'Password:' OK */.. CALL ZocSend "secret^M"..END..ELSE DO.. /* Ouch, 'Password:' was not received */.. CALL ZocWriteln "ERROR (Password)!!".. CALL ZocHangup..END....GetOut: /* target for SIGNAL command */..EXIT..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):800
                                            Entropy (8bit):4.935324415591888
                                            Encrypted:false
                                            SSDEEP:24:WKSyw1BhVnvMnwWIPrDVW5N0Wjg35N+MAy:WKWHBWIM+Ay
                                            MD5:26297DD7F3E806A603347B1F979C105B
                                            SHA1:76BB7EA89715C0659E4305BC0945C2A9C3852F31
                                            SHA-256:02FD4458AD9632EAC8D7426F6D659C942B70CE43F1FAA32CA107F160BCD6DE74
                                            SHA-512:F006DE69EC0F1D6F0D5A57E9E854BCF6904705B83532165E8B0F437BBA0780DBBDEAC089FB35421000694E5F222BAFD9E95AA3773DB9C458BB72592A2991F7D9
                                            Malicious:false
                                            Preview:/* REXX sample about decisions */..../* Set max wait time to 60 seconds */..CALL ZocTimeout 60..../* Wait for 'Name?' - check for success and report error */..timeout= ZocWait("Name?")..IF timeout=0 THEN DO /* outer IF */.. /* received 'Name?' */.. CALL ZocSend "Joe User^M".... /* Wait for 'Password?' - check for success and report error */.. timeout= ZocWait("Password?").. IF timeout=0 THEN DO.. /* received 'Password?' */.. CALL ZocSend "secret^M".. END.. ELSE DO /* inner IF */.. /* Ouch, 'Password?' was not received */.. CALL ZocWriteln "ERROR (Password)!!".. CALL ZocHangup.. END /* inner IF */..END..ELSE DO /* outer IF */.. /* Ouch, 'Name?' was not received */.. CALL ZocWriteln "ERROR (Name)!!".. CALL ZocHangup..END /* outer IF */....EXIT..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):878
                                            Entropy (8bit):4.8448417392950995
                                            Encrypted:false
                                            SSDEEP:12:UBjXR4RkBuj00rRFEiDFpds8mPOgay0DsQ0SEFgXQIDX2Q8vSr7:Aj+GbkfvFk8GOga/YuE2XZG3a7
                                            MD5:38C77C5FD4096245047A14865CA26472
                                            SHA1:317E6C206D321A2A4F5A468092EB4E6459E47C79
                                            SHA-256:A9253A8D06DE8D09AA18DAA0F64BC42C9CC944DD1A1806EFE09D74FEF7306A40
                                            SHA-512:A46BB0B1505AEF37188C52BA9315ED19A9B481B0F7D36E9A4C56305FBC704B1BD3538CE076E8A1CBBE558ED2D4DC551766DA13F31B2F4C9C0F3DA76D04AEEE80
                                            Malicious:false
                                            Preview:/* REXX-Program: LOGIN.ZRX */....CALL ZocCls /* clear screen */....CALL ZocTimeout 60 /* max. time to wait for something */....CALL ZocWait "Press <ESC>"..CALL ZocSend "^[" /* ^[ is the code for the ESC key */....CALL ZocWait "Name?"..CALL ZocSend "Joe User^M" /* don't forget ^M after the name */....CALL ZocWait "[Yes/No]"..CALL ZocSend "Yes^M"....CALL ZocWait "Password?"..CALL ZocSend "secret^M"..../* the next command means that ZOC should .. automatically send a ^M (Enter) every time .. the text "Press Enter to continue" arrives... This way all the news screens are skipped,.. no matter how many of them appear */..CALL ZocReply "Enter", "^M"..../* Wait for the main menu */..CALL ZocWait "Main Menu"..../* Cancel the previous REPLY command so ZOC won't .. kick in if we received that text later */..CALL ZocReply "Enter"..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1839
                                            Entropy (8bit):4.996162808785838
                                            Encrypted:false
                                            SSDEEP:24:j582eJLw1BPnbN+MAI54H4JLwzBPH7llnj6N+WsCmqLhfbSf5IgM4z++onN2c72F:gJsHCO5JsFvz5qLlbUjM4ynNz/UZ8I
                                            MD5:5C6B56BA9F67B46989DD07331FEAC083
                                            SHA1:27FF0F5F2A0D754AFB80B9D605A71E752D14E7FA
                                            SHA-256:960367CB30BB65B211964899961698666A056CC9F8EABF01D4DEBD124668F112
                                            SHA-512:DB30EFD58EF7526737CD9DB4E76F8D7CCEF897F3970A45973B3E1AE93CE065546A53BAEC013B54C64DD686FF1A6C19C53CC7AE361EBACD568CDBAD4DE74A3A15
                                            Malicious:false
                                            Preview:/* A REXX sample to show how to log into a bbs and do .. work automatically */....CALL ZocTimeout 60 /* general time out */..../***** Wait for name prompt or bail out *****/..timeout= ZocWait("Name?")..IF timeout=0 THEN DO.. /* received "Name?" */.. CALL ZocSend "Zaphod^M"..END..ELSE DO.. /* Ouch, "Name?" was not received */.. CALL ZocWriteln "ERROR (Name)!!".. SIGNAL BailOut /* this command jumps to the end */..END..../***** Wait for password prompt or bail out *****/..timeout= ZocWait("Password?")..IF timeout=0 THEN DO.. /* received "Password?" */.. CALL ZocSend "HeartOfGold^M"..END..ELSE DO.. /* Ouch, "Password?" was not received */.. CALL ZocWriteln "ERROR (Password)!!".. CALL ZocHangup.. SIGNAL BailOut..END..../***** Skip host's intro screens *****/../***** (and probably security feature) *****/....CALL ZocReply "Press ENTER to continue", "^M" ..CALL ZocReply "Enter your birthdate", "270466^M" ....CALL ZocWait "Main Menu" /* we just
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1446
                                            Entropy (8bit):4.749518613763713
                                            Encrypted:false
                                            SSDEEP:24:X5/FfECjxTJuTHGQoq7aFAKhPdIM//g1QSQDkW9vPJL/DC49/PwSjP3yqWLIQdyt:XVyIxTWDWVA1oYW5JrDJDELRyt
                                            MD5:CB53D0962A039DF7922910E2AC4A1CE1
                                            SHA1:C152E41EC15DB02B6035A85D6849ACA246F40CD2
                                            SHA-256:E4AFBB8CE770FD9C4AEB90A12B22D820E92ACE4AD7BC3D1B9C8EE1FDAEF27517
                                            SHA-512:498AD9DC809A1056468818198EC08F9514BCFCD224D04C1C60CAFB6291DAD426169DE65981DFB7B69E2CBCF1E4C2BCF275687212D9CA04D7BAB88D81BE6D3269
                                            Malicious:false
                                            Preview:/* REXX script to dial (and retry) a phone number */..../* Ask user what number should be dialled */..number= ZocAsk("What number shall I dial?")..../* dial the number if it was non empty and if user .. did not press the ESC key */....IF number\="" & number\="##CANCEL##" THEN DO .. /* redial 5 times max. */.. DO TRY=1 TO 5 .... SAY "Try #" TRY .... CALL ZocDial number.... /* wait for CONNECT within 60 seconds */.. CALL ZocTimeout 60 .... /* scan the next 6 lines for something interesting */.. DO LINE=1 TO 6.. /* receive next line of text */.. timeout= ZocGetLine().... /* if timed out, end script with error */.. IF timeout=640 THEN SIGNAL ERROR.... /* if BUSY was received, try again (leave inner loop) */.. IF ZOCLASTLINE()="BUSY" THEN LEAVE LINE.... /* if NO CARRIER was received, end with error */.. IF ZOCLASTLINE()="NO CARRIER" THEN DO.. SAY "Error!".. LEAVE TRY
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):264
                                            Entropy (8bit):4.881008105807107
                                            Encrypted:false
                                            SSDEEP:6:UytPbn8bmJrH29yomUA1RHKK9yNT1RmbjOyNT1/vv:UuNlH29yoQKK0NfmbbNNvv
                                            MD5:15652593AF9AA24E56CE9DDA69E83B8F
                                            SHA1:2F741A56A8521A84D389130F53F53DC5F7C6C595
                                            SHA-256:1C6E74A1CFFF642B67743BE8D064A03F57D20C9879872FFA6F9EBE35451B394E
                                            SHA-512:8A0E2E3149918C5691ED9016040CB4636DE380B9644005225193F57E2910248F800C4E254AA5E449B0713CE6ADA0B883431CAFC9017244CEB567B880F2246C9D
                                            Malicious:false
                                            Preview:/* REXX */....answer= ZocRequest("Are you sure?", "Yes", "No")....IF answer=="Yes" THEN DO .. SAY "User really wants it!"..END....IF answer=="No" THEN DO.. SAY "User isn't sure!"..END....IF answer=="##CANCEL##" THEN DO.. SAY "User pressed the ESC key"..END..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:MS Windows 3.1 help, Thu Jun 3 17:17:30 2004, 59631 bytes
                                            Category:dropped
                                            Size (bytes):59631
                                            Entropy (8bit):6.10531993749522
                                            Encrypted:false
                                            SSDEEP:768:lJllMQAV2vzamF+JVszFmPfhMhEeCupKTlyCnSMFGmq6y2pghv1//Tgrokrn+TY6:z/92MaKIsEm1PpKThSM4mqJgKFnYn+
                                            MD5:5E421A7B4AE1A807CC42FF4697ED2A4D
                                            SHA1:1F3A37C9F957F467B0278DD7EDE450D617584711
                                            SHA-256:F68845143F07EFF25035EBC80580E4F2D217A0407799E8555EFAB94B808EA5CF
                                            SHA-512:22B4B36E1CC83DE8DC05D2466AEC30AC3C34ADFDCDFF16283BA1A47138F7685693494DB71FB876629D8360D82C213F19C61B7940B849780C9F312E16B800F2C0
                                            Malicious:false
                                            Preview:?_........................(,.:[])].,aADDRES.Sanandar.eargumen.tA.@s.Psa...sign..beb.lank-del.imitedBu.iltbycas.echaract.er.`scomm.^.concate.nati..ond"i.@verC.co.untcurr~..datadeci.malDefau.ltd.Pfine.dDIGITSd.igitseit herEnr.pr.iseenvir.o. expre..Don.psex..d.ed..rnalf.irstfoll.owingfor.fromfunc...F.@h..ler.hex-str'.....PifIfIn.i..<.m. inpPutIn*.uF i...v0isB.gua.geL.@leng.thlogica.lna..otNo.tesnumbe.rNUMERIC8ofor.s...op.er..s. tor$sO.Popd.or.out..padp.osn!progr.am..dre......!require...sn.retur.........sREX$Xs".ch.0edg......if../.pi..fi..tP"..r.t. \...teV".P.-...ps[.eam.a1g11n12sub.x1SuL.rysy.mbolM.plS.Ft....tTh..e.tow.k"dtyp.eusedVAL.UEvaluev@ariabl.`s.w3 rwhich willwO.wo..."").".%.''),'/'(."()([)),.).*+-......)..]/00..0011.24..08.59;<<.=,=>=,[,.\<\>]];].]AA-Fa-z.A-ZABBRE.Vabbrevi..#ab..ABSa.ccv...>.iv.....afI.allA.ll..owsal.soAnANDa.....anyAPI.app."..l=.`.(ARG.S-@2Ar1).met^..psc...s..#edA.c...oc....ss......"atBB2Xb...b..m.@sbx..be>...gi.......g. ..havi.orbe. lo..A..wbetw9 yq..bin...0gCB
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):94
                                            Entropy (8bit):4.702596273066022
                                            Encrypted:false
                                            SSDEEP:3:U5VUL3CKQCNsuFyxJPHyHK9/GycKlUL3o:U5V50FyLHPGelR
                                            MD5:4AE64E464764B3C057A9F3124FEDACD6
                                            SHA1:874CAB5C7E7C58B67CFA334ECC479F662A047ED9
                                            SHA-256:053873E159F3E203C388E4B10E0D52043F86C87377A1932DE0257029969C1075
                                            SHA-512:932A52725B406A4C7BA9201A1A327C4AF72FD49A325DD047B0D1C18ED8587351B918BA091A8BFAF04B04528B2CE0290C2982537E3AE100D2A27E23ADA0F4AFBD
                                            Malicious:false
                                            Preview:/* LEARN01.REX -- write "hello" to screen */....SAY "Hello, world."..../* END LEARN01.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:OS/2 REXX batch file, ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):307
                                            Entropy (8bit):4.018420704081766
                                            Encrypted:false
                                            SSDEEP:6:U5VXsuKKJwSPUFHL0fdeeyHL0fdfi/fYgfdePMlXs1D:U5VXsKJb1MHA1fi/Qg1QaXU
                                            MD5:29E8AC38C6BE8DC9049BF1C7391AD10F
                                            SHA1:38B71405F6F0E440A636C8C5CAB62E15A04EF7E3
                                            SHA-256:18BFCA06A45B7A2212F55B32F2A17E672D42B17FD0FF3D236034632C9190F665
                                            SHA-512:2821CC08E4DAFA335DED3CA810A079C003DE2A42C3F4A5149A8A127BFDC48F08A0D419DB217B6FEC96A97FF134B4F18790F16D36669B7E4272062B5729F7CB2D
                                            Malicious:false
                                            Preview:/* LEARN02.REX -- show different clause formatting */....x = 4 + 5 /* (1) */..SAY "The answer is" x....x = 4 + 5; SAY "The answer is" x /* (2) */....x = 4, /* (3) */..+ 5; say,.."The answer is" x..../* END LEARN02.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):225
                                            Entropy (8bit):4.807467288344102
                                            Encrypted:false
                                            SSDEEP:6:U5VdFr3Woo95NRHDWRAivCnqDWRAi7wpQx1xhErFA/RpyRldFr:U5VL3U5XaRAiEJRAi0yurmZpyfL
                                            MD5:28FD2D4A223B6B93A246DF9101723B8B
                                            SHA1:791AD05A778B139CBB79940660AF8EA7AB5FE298
                                            SHA-256:17BD27D1132FF61B6DD4F7275DEC75FD9CB2FDA22B238F5BCFDB827E6FA01F73
                                            SHA-512:8D40E779A8943B901C764BD1A4F393AAFEEE86B163AF40732AD6D19ECA3F95A84D076CBDCC2F63C0A35DBA5B57320FCE1E635D3FF4087867FC34D34362A39E49
                                            Malicious:false
                                            Preview:/* LEARN03.REX -- get user's name and age into variables */....SAY "Please enter your name"..PULL name..SAY "Please enter your age"..PULL age..SAY name"," age "years is too long to be without REXX."..../* END LEARN03.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):189
                                            Entropy (8bit):4.99805043474594
                                            Encrypted:false
                                            SSDEEP:3:U5VR8n1b2wyzFTENJzFzlF2ObWvGi99H/a0vDUHoSEWFKlx1CW6NGjWOr5UlR8nr:U5VR812L9a5Z2ObWrNYH3ENlu9N7oUl+
                                            MD5:68F0B51E672EB7E28D917A9E42FA1994
                                            SHA1:674F8DFFA57E8B65DD9DCE34FF188255DB12A3C6
                                            SHA-256:374E24E0FB03408F40E82B6AEBD2293987FA165110EA0E4CF56EB68697A09F51
                                            SHA-512:EEBC25A35818E313E6C34CCEB4961D7AB22FE0EBF2197E19862AD57E45619CD7BD66F13E71B6557F519A428D6E7FE27E980342EB30B05EDC93204B494EDA40CE
                                            Malicious:false
                                            Preview:/* LEARN04.REX -- concatenate two variables without space */..first_half = "Cow"..last_half = "lishaw"..SAY "REXX was designed by M. F." first_half || last_half"."../* END LEARN04.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):210
                                            Entropy (8bit):4.871206839394081
                                            Encrypted:false
                                            SSDEEP:6:U5VpAg1U2AhqgR8FHe7stQG/EFG0FRQyZq7SaswMQCpl9D:U5VpAqUrhhvG0FqSB3X9D
                                            MD5:87CBCB44AC267E677EA314875E0FF397
                                            SHA1:67550DEEBDDE44C4E5C5B036EA679B82C73A5B3E
                                            SHA-256:73FDD501F6A368B078C60A66DEF8496B2991EA934D7DDF3156B0F420D710030B
                                            SHA-512:50759AE81B5233FD6D5010A29E4F7C5CF56B05327F192B3081154492F01964350F6E5849EFABB3B0C9533F15C23088AB5F5BF55025FE4DE60A66C5B232629797
                                            Malicious:false
                                            Preview:/* LEARN05.REX -- calculate circle characteristics */....PI = 3.14159..SAY "Enter radius"..PULL radius..SAY "Area = " PI * (radius**2)..SAY "Circumference = " 2 * PI * radius..../* END LEARN05.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):213
                                            Entropy (8bit):4.824562646183596
                                            Encrypted:false
                                            SSDEEP:6:U5VTu3ORKe5NRHDWRAiwLzb4qYLthAoqL6kDR9ACJlTU:U5VTu3k5XaRAiwP0jthAFN9ASTU
                                            MD5:CCFF6BDF28E70FD7D5BB0910D17AEC75
                                            SHA1:70E16A9C442B79A3A9F2EB0361EB7C686310DF4F
                                            SHA-256:F6D36CD20F7A7A542551193FBABFC637C4806812687083C03B27D46C86253D7E
                                            SHA-512:432E2E00EF203DD66A4DBFFDFA61F251E00BD47305DCF173DC7436C7B6A58693D39FBC7CB28C61A9D88B62B5BAAB65315B68C5D2A430FCAC647C3061FEDD1308
                                            Malicious:false
                                            Preview:/* LEARN06.REX -- get user's name into two variables */....SAY "Please enter your first and last name"..PARSE PULL firstname lastname..SAY "The name entered was" lastname"," firstname"."..../* END LEARN06.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):218
                                            Entropy (8bit):4.889620378740217
                                            Encrypted:false
                                            SSDEEP:6:U5V99M5zLHy44gHDWRAiZRJbCclkGKU0JL6pTvl7D:U5VshxaRAivJbflkGtTN7D
                                            MD5:FDF644F7B27C2D3D4FA1572B4C24BBA3
                                            SHA1:36FB09974B429BCA106F22B7131CF2529F01D985
                                            SHA-256:3BA36DB3DBBB321F7186424C8ABA11661782DAB078E399C6F6F6E72C2ACD6941
                                            SHA-512:22C9E5CA1FBA55ADB5B5CB2E81124D750B3EA7AEA50EDEF1E2E1866BB670E789F6010CDD9BCD5EB848AD28ADC0DFA341B0496906EDB11558BF622D2A0FD9736E
                                            Malicious:false
                                            Preview:/* LEARN07.REX -- split birthday into month, day, and year */....SAY "Please enter your birth date in the form: mm/dd/yy"..PARSE PULL month '/' day '/' year..SAY "The month entered was" month..../* END LEARN07.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):198
                                            Entropy (8bit):4.7644227151305225
                                            Encrypted:false
                                            SSDEEP:6:U5VdsdVoH5pN0HLjCDstHom9goXKFOeRlds9:U5V+w5P0rjCDstioXKrfy
                                            MD5:F72176D61F181317F1AEBDF86583534F
                                            SHA1:4247AB03FF5B1D3D21D68BD28F25D86D273A104A
                                            SHA-256:34BEB51E3F0D6FA8C806F53F315049172FBFA59603D377FE5727B861097985D3
                                            SHA-512:36B25EEA84AE8ABAD34684A125E67BB50F260C59A408A1BF5434604B30745F9089AE7A2E9561F1BE929EEBEDCFEC6692815737F39B6BCDD3FFFB95EF6D86BBC3
                                            Malicious:false
                                            Preview:/* LEARN08.REX -- use compound variables as arrays */....array.1.1 = 5..array.1.2 = 10....i = 1; j = 2....SAY "array.1.1 =" array.1.1..SAY array.1.2 "=" array.i.j "Right?"..../* END LEARN08.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):435
                                            Entropy (8bit):5.064384015228786
                                            Encrypted:false
                                            SSDEEP:12:U5VhDw5I0W1sN4gTmPxiBmD+Nt1QnRJd89Ium0hr:+DwG0WBBiC+N3QnX0Ii
                                            MD5:4E448FBAA6AE1EFE67A101EFA73A23AA
                                            SHA1:E08566571806872273548DD2AF6B22982D564B6B
                                            SHA-256:912E1674877CA3533DECFEE416923B92111116D2ABCA7221DA4CB8EB92E8C43B
                                            SHA-512:289D9F2A3E9E094FE8162937B66D63EB5A76B3C20F6A764CC7F5AC4496032D928F2868728C0D6411F11091004FE6B12AC8822827FA95AFA195EE0CA90AB5B08E
                                            Malicious:false
                                            Preview:/* LEARN09.REX -- use compound variables to find area codes */....areacode. = "unknown"....areacode.ME=207; areacode.NH=603; areacode.VT=802; areacode.RI=401..areacode.CT=203; areacode.MA="east 617 and 508, west 413"..areacode.CA="408 for San Jose"....SAY "What state do you want the area code for?"..SAY "(Enter a two-character abbreviation) "..PULL state..SAY "The area code for" state "is" areacode.state..../* END LEARN09.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):523
                                            Entropy (8bit):3.5869347179621394
                                            Encrypted:false
                                            SSDEEP:12:U5KkQYu5puphukBfj8ZRRYtgkRqWgVeW94:+KHYu5pufukBrgbmdHs94
                                            MD5:67D10B17EF4EEDA0F61BE1A47BBAFCD6
                                            SHA1:60378D68175E25020147E0EE36793C05ABD064B6
                                            SHA-256:1DAA9C0A0623C9E0A96E7E1EDE18DDE526D5075D114C685DB380FF7EB26E9D9A
                                            SHA-512:5D358D9D0FDDEA1232A1C71867C7E8EC244A26669C2874219FAD8A55B40D1758999392DD1DAD557774F930F37F0CAB7BE3B5752F958E54336BCEFA8F873CC7EC
                                            Malicious:false
                                            Preview:/* LEARN10.REX -- demonstrate normal comparison operators */....SAY 2 = 2 /* equal */..SAY 2 = '02' /* equal */..SAY 2 = 2.0 /* equal */..SAY "TEST" <> "Test" /* not equal */..SAY 4 > 2 /* greater than */..SAY 1 < 2 /* less than */..SAY 4 >= 2 /* greater than or equal to */..SAY 1 <= 1 /* less than or equal to */..../* END LEARN10.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):160
                                            Entropy (8bit):5.012571552109016
                                            Encrypted:false
                                            SSDEEP:3:U5UE4F1sJ6VOWEvzwuPH/SiCeD/jFU4xYUxKKmLLL1FHc0LwKkE4Fr:U5JIRVOlvzRHaQrjFU8YULyLrHrp5Ir
                                            MD5:92931AC3B4501BEA6BD4C84FC2E87DAF
                                            SHA1:0FAE7CD357AE0E9954405853F04C388FA1E81017
                                            SHA-256:B3A6DFBD8587AE31F517266101E0F9FF56450F85645A9D83421A5EDE3809BDA9
                                            SHA-512:0F8138907F4657A8A8CF3C9BEACED26688F8106ED3FA0659A12F9EEA975E6A249F9D0E5813AC276E4C3E7541943D9B8736DA03269B40FBF72087E2966FB70E0B
                                            Malicious:false
                                            Preview:/* LEARN11.REX -- show simple IF construct */....SAY "Enter age: "..PULL age..IF age < 16 THEN SAY "Too young to drive."..SAY "Done."..../* END LEARN11.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):341
                                            Entropy (8bit):4.814814397902301
                                            Encrypted:false
                                            SSDEEP:6:U5k3nFSAjVFcFHam/1yNCCCQqL7zn5iCC5QOLnZH0UU3yD:U5eFSGVjyMNCJLRiCyZUg
                                            MD5:344C0DC31C1F6F41643AAE503FE2F54D
                                            SHA1:22C2D6A07FFC2977FED93AEBBA7339D2DD19B9AB
                                            SHA-256:5CE5C4A6828CB125A7D10A1757964E4C484673B1729482165D94A05693231AE1
                                            SHA-512:FC57361C8AAA8B82D956DEB4A76603CB43B7DF5ED0F2BA84DCEEFAB3527D1D32148079ABB8B2069EAF1E2C158A34C8B63F3E3F74DB425AE37CFF7714F4544CF9
                                            Malicious:false
                                            Preview:/* LEARN12.REX -- voter registration screening with nested IF's */..SAY "Enter age:"..PULL age....IF age >= 18 THEN DO.. status = " vote".. msg = "Please proceed to the registration desk.".. END..ELSE DO.. status = "not vote".. msg = "See you when you're 18".. END....SAY "You can"status..SAY msg..../* END LEARN12.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):608
                                            Entropy (8bit):4.7751212714162605
                                            Encrypted:false
                                            SSDEEP:12:U5nWGwPmbW1Q6kw0Eo5Iqg5kIml8cf/ZglVMcS67umRQbed/HS:+nWNPmOQ6kw03bdT8cfBcLtiqda
                                            MD5:78B33D936FDCF249DADF252C02920FC2
                                            SHA1:C89428D091614813B31FBE27936DA4C735CAFFDA
                                            SHA-256:593AFADF8B8750D8928AFCCB87B17E42BE34706B602B4081E61A77FF6D8A1345
                                            SHA-512:49BA43D80805CBD833A02A5653CA46DCF5E69C144132FEF5D56E86722E12221FC4975B5CB87E0204D83433E8969B4D95BF43858E2BEBC04A8A3165E70FD4A996
                                            Malicious:false
                                            Preview:/* LEARN13.REX -- use SELECT to find area codes */....NULL = ""....SAY "What New England state do you want the area code for?"..PULL state....SELECT.. WHEN state = "CT" THEN code = "203".. WHEN state = "MA" THEN code = "617, 508 or 413".. WHEN state = "ME" THEN code = "207".. WHEN state = "NH" THEN code = "603".. WHEN state = "VT" THEN code = "802".. WHEN state = "RI" THEN code = "401".. OTHERWISE.. code = NULL.. END....IF code <> NULL THEN.. SAY "The area code for" state "is" code..ELSE.. SAY "The New England states are ME, NH, VT, CT, RI, and MA"..../* END LEARN13.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):94
                                            Entropy (8bit):4.378373163157642
                                            Encrypted:false
                                            SSDEEP:3:U5UtQ1tZb2hDyuWFFDSA8olnvycKktQr:U52QDZb2hDyuWFecemQr
                                            MD5:0DD9DE927C7262B63DE9E8FC72A04319
                                            SHA1:54CB447132E45B37A171C417F4072B9784C86EE1
                                            SHA-256:EB04EFF67417D8384EF7BAC9522B105F0FDE31EE192BD2A6D875A911AD779166
                                            SHA-512:2E2E8D70577E842D3DED356A5EF5153BE71EC0EC4CE242735FE923D5984FC8B9A1EC6BDC37C22F1DB0877BE30795D6DF8D9D6A2C9BFF6473BCA522B769B8CE32
                                            Malicious:false
                                            Preview:/* LEARN14.REX -- simple DO loop */....DO 4.. SAY "hello".. END..../* END LEARN14.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):122
                                            Entropy (8bit):4.558972276952569
                                            Encrypted:false
                                            SSDEEP:3:U5U9IIbOasNbllK0Dy59FquCvF+kJm6ivycKk9PD:U5KOasbfK0DyEjv7mZekD
                                            MD5:CC7574D2440F0AE9FD85F2FCEA63E9C6
                                            SHA1:3506FD639D0F8FF41642DFA6C0CA307758D548EA
                                            SHA-256:5008476A32B4DDE87A9BFFD92E4430870894F43E62EAE8F84365B7FF543DAC91
                                            SHA-512:24A3B2C47DDD642336B550AE06FCAA5F365E56B99CAFF3C4684BC084911153DB08F4FD382669EE5B5DF224869C340F5043C176B10089B0BE9B919D4A5ED10CD7
                                            Malicious:false
                                            Preview:/* LEARN15.REX -- count to 10 with controlled loop */....DO ctrl = 1 TO 10.. SAY ctrl.. END..../* END LEARN15.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):388
                                            Entropy (8bit):4.0771466102864675
                                            Encrypted:false
                                            SSDEEP:6:U5QBzlGKgFmFUGB7IKDa2knjezCbFftiS/BezC7/TFScNrENiKlENpA4:U5yGKgU0KO2Lefb/oe7/JMiPR
                                            MD5:21AB47105C24420AB3F618C2B20FB731
                                            SHA1:7B3D8797166C05B5EE72D8765EF59CADB2311A5F
                                            SHA-256:34780FA5A3116F4F2B9B08C21074D2745CFF8EAF8DB5CFA975A65A00A89A4682
                                            SHA-512:25A42337599B5276E2A7F368A3D23228C2FB806BDD9E2BD286F3F92CBF875682A660BFB98D720E5D95ED6E0B2773E3DCF7FBA83F17934CDCAD7CCAF3A38A8311
                                            Malicious:false
                                            Preview:/* LEARN16.REX -- use nested controlled loops to write */../* a multiplication table to the screen */....limit = 3....DO x = 1 TO limit /* find multiples up to limit */.. DO y = 1 TO limit.. SAY x "x" y "=" x * y.. END y /* control variable */.. END x /* control variable */..../* END LEARN16.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):309
                                            Entropy (8bit):4.453565368052895
                                            Encrypted:false
                                            SSDEEP:6:U5/IRL7yo+n/eRWDsVsek7J9HlFC96FhJfNN1y7rF/7Ax/UVPDsVs9F/vevIPD:U5/IRv+/eRWDQkdlLXlNNW/7AZUVPDhV
                                            MD5:D07144BBFFE7BA13742DC87F75729777
                                            SHA1:036566B61ED994EFE7E3CBF1097EDAA435279CAE
                                            SHA-256:50B610BCA98C4A35CF46F1CCB823830B116AF9A1CBEEB3A19D0BDE925464C0CF
                                            SHA-512:0A225DF57DBAADE1D44C4139E0432076C056F0F6FCCCFEE07FD711C3345B99573FA0E183069DADCF716183BF70DDF58E5F3137E33AC5F9CBCC33CFCFE38731FD
                                            Malicious:false
                                            Preview:/* LEARN17.REX -- echo keyboard input to screen */....PARSE PULL text /* get first line of input */....DO WHILE text \== "" /* while input is not null */.. SAY text /* echo input to screen */.. PARSE PULL text /* get next line of input */.. END..../* END LEARN17.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):329
                                            Entropy (8bit):4.783499374252201
                                            Encrypted:false
                                            SSDEEP:6:U5i3uFML2LRASAeyTmQsTMoRHakKO2PB1X9Jw5aQpz9TMOvcHNbwJPOveS3o:U5i+FMQRAp2Qs406kKO2PPtBm9T3vcFK
                                            MD5:9747F91971B9392203EFF368453F46AA
                                            SHA1:AC4D3A3422CA207B951BAF3D877766B3A7D722DA
                                            SHA-256:E01DAFD825D2C303F19F5909CFD906AAA8D0A095DC6ACC289C2B573C9DCB7B73
                                            SHA-512:02CE32D192BB3B9F93E3CB186167759941CC2CFEEEB4A072990895C1AA8099B42EFAB889B168ED616A1089985A6205AE595C41991D1DECDDA9042A6D587D830B
                                            Malicious:false
                                            Preview:/* LEARN18.REX -- write even integers up to maximum */....MAXIMUM=10....SAY "Enter count:"..PULL count....DO i=1 TO count.. IF i > MAXIMUM THEN.. LEAVE.. IF \DataType(i/2,"Whole") THEN /* test for odd integer */.. ITERATE.. SAY i /* display if even */.. END..../* END LEARN18.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):159
                                            Entropy (8bit):4.835683721257266
                                            Encrypted:false
                                            SSDEEP:3:U5UXKqcqcuJgKR6gAoAWiFCk/ExwVtWLtEIAovDa7WLtEIAovycKkJ:U5xg8JWmyw+LthAouyLthAoap6
                                            MD5:B10D22EC168620BBA24071C6E9D83937
                                            SHA1:A047805D1CB868D8A66486764C05CD62BA922507
                                            SHA-256:87832432840687A2D7C84745032D4D59C030452586896D141EE5CC460CE11F6B
                                            SHA-512:CD9BF7D754FAF4657F775E38F7997D371EAC98AE5ABD4E25DCEA721F5ACFA9E5497A9FBE38F205CC4181DBE049C7D19A3F5E879B381625273B7E007636E88FB7
                                            Malicious:false
                                            Preview:/* LEARN19.REX -- break up a variable into words */....name = 'Ann Smith'..PARSE VAR name firstname lastname..SAY firstname lastname..../* END LEARN19.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):251
                                            Entropy (8bit):4.90586844766982
                                            Encrypted:false
                                            SSDEEP:6:U5XVLQ9IgWAFx42qk5FMBzQUj2hFAkkg9A4lzoFByUMnVLQ91D:U5FsTLF4kcsHkOCas9
                                            MD5:F20BFE69FF4E06A922CE937566E39309
                                            SHA1:10E7F818B51F00C79A53035318787033AEE67B5A
                                            SHA-256:A28AA3B264240A9E67049E68E17F361AD02EE91D5E85221CB6265572ED7E1686
                                            SHA-512:2126A5A19E2E52B9DABF42FE3C02807852FCD08095F25792B150701611AEC6D007B0BBCC4E08FE8717FCE5B8F81F149703D9B70A66FB48242B6ADC016AD5D02F
                                            Malicious:false
                                            Preview:/* LEARN20.REX -- break up file statistics */....taxinfo="NY 000-11-2222 Smith"....PARSE VAR taxinfo state id /* id gets '000-11-2222 Smith' */..SAY id....PARSE VAR id ss_num . /* period holds place */..SAY ss_num..../* END LEARN20.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):229
                                            Entropy (8bit):4.973425106455231
                                            Encrypted:false
                                            SSDEEP:6:U5XzQ1HCOXJEPtHqRoVpDYHIkzcsH6GEAjdwRnz9:U5jWCOZElKspMD6d9
                                            MD5:3C8F5442527E9C982FC55AF74406919D
                                            SHA1:FB4F69A95DB9A792079C4A06DE7D45616B0DD9E7
                                            SHA-256:192AF2C7A501D3D05B1FDE613F104FAFB837238562D309F3739F6A0179AD3837
                                            SHA-512:1B9A274E75622F948D276248D36E4EC8543E116FE0B0A95F003C80225EECD43F9EE9A80281C7583F49C35DDFF8BB677BCD290F158B119DDC89B9F466F6E90D7F
                                            Malicious:false
                                            Preview:/* LEARN21.REX -- break up variable using literal patterns */....SAY "Enter your name and address in the form"..SAY " Name, Address :Zip_code"..SAY ""..PARSE PULL name ',' address ':' zip..SAY address..../* END LEARN21.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):187
                                            Entropy (8bit):4.966902660480558
                                            Encrypted:false
                                            SSDEEP:3:U5XXLlIKqLE1HJgDZlFPDfLDKYWLSKFFFX4pXot+kxE9cFWMsUvYv2k8vYvycKnk:U5XXLF1HCdnW8KNX457kxWcFWcvYv2kj
                                            MD5:E6A919B1109E3428186118C5EBE8D4DC
                                            SHA1:6D82D7AFA8BCF29D2F7DCF44AC270A272DFA62EC
                                            SHA-256:20B2F18A8414A9E127E6E425D32DB774389EE5FD9FCF860CC53AB409B396E0DE
                                            SHA-512:9AA7B24F423B8755F4F92CEC001F8F84181FD8CA19BA3FB9FB6EDC6BD58941EBBF2BF5B083E4B89FCF9250A8C5C34A9136B74FA0A5BA5D17F1A9A1E1FC352E6C
                                            Malicious:false
                                            Preview:/* LEARN22.REX -- break up variable using column numbers */....info="Smith,A. 111-22-3333 203-555-1222"..PARSE VAR info name 16 ssn 31 phone..SAY phone..../* END LEARN22.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):469
                                            Entropy (8bit):5.109606766780292
                                            Encrypted:false
                                            SSDEEP:12:U51TZeoY42Q6WjbLZmrGpSsw/vO/pSswjmruW:+19qV+0CiW
                                            MD5:E97CE74510A2830D9E83FFFEE5F2F36C
                                            SHA1:5192DBEAB1C56B527CEFD438106420197D982D41
                                            SHA-256:DDD5C85CC223B75785C84661F04ACA9A5D1D0B0C572DC0A268BA91C966DA497B
                                            SHA-512:BB377DE8F31A4371E6B3FCAA3D2695B2069E92038791E94386AD601EBB1DEC79104579E84FE5D17E58037925BB9C298DF220BAE57DCD2056C241C5D22FE26D7A
                                            Malicious:false
                                            Preview:/* LEARN23.REX -- prompt user for title, display banner */....WIDTH=40..BORDER=4..BCHAR='*'..SPACE=' '....SAY "Enter title: "..PARSE PULL title....IF Length(title) > WIDTH-BORDER THEN.. SAY "Sorry, your title is too long"..ELSE DO.. SAY Copies(BCHAR, WIDTH).. SAY BCHAR Copies(SPACE, WIDTH-BORDER) BCHAR.. SAY BCHAR Center(title, WIDTH-BORDER) BCHAR.. SAY BCHAR Copies(SPACE, WIDTH-BORDER) BCHAR.. SAY Copies(BCHAR, WIDTH).. END..../* END LEARN23.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):682
                                            Entropy (8bit):4.997454527775191
                                            Encrypted:false
                                            SSDEEP:12:U5Bufw4No8eyfGu2W0Nj93QRZGGSONNv9rvUXrjGGS5ZwN2xo91ceU:+eNxGrW0L3qZGGSOv9LUbjGGS5KF1cD
                                            MD5:AF3729D889EE5F6531B1AE2703ECC2A2
                                            SHA1:F41A4F411DD6491428F90ACB56FFB14AD3725FFF
                                            SHA-256:A5D332F78BFE998BDE6C6F84CC28312675E72E13AEBE4CB681BC611E8CC21414
                                            SHA-512:98F14FE8F8702B1A5C2B32C79E0BDF1183E7CC6EB4F1F1C79330924D791ECA9272919D1B2C57ADFA6578985FD791E14CE89E41E24884378A85DB059C632EBD66
                                            Malicious:false
                                            Preview:/* LEARN24.REX -- general-purpose number base conversions */....SAY "Enter value to convert:"..PULL n..../* convert from ASCII if only one character was entered */..IF Length(n) = 1 THEN DO.. SAY '['n'] ASCII -> Decimal = ' C2d(n).. SAY '['n'] ASCII -> Hex = ' C2x(n).. END..../* convert from decimal if valid number was entered */..IF Datatype(n,'N') THEN DO.. SAY '['n'] Decimal -> ASCII = ' D2C(n).. SAY '['n'] Decimal -> Hex = ' D2x(n).. END..../* convert from hex if valid hex number was entered */..IF Datatype(n,'X') THEN DO.. SAY '['n'] Hex -> ASCII = ' X2C(n).. SAY '['n'] Hex -> Decimal = ' X2d(n).. END..../* END LEARN24.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):181
                                            Entropy (8bit):5.00628693992262
                                            Encrypted:false
                                            SSDEEP:3:U5XQD1IsJipg6pMIX+jAiobQt5ydBowrUHwmHmHViI7EuozyoUKnQDyD:U5X9g6D+0tQfHwwmEFuozyoRn9D
                                            MD5:EA751163F45DFD01C9BC9D7931CA4151
                                            SHA1:6773CCDCF83AE3FA09CC7D41D7A0A3C3FDC36DC5
                                            SHA-256:349F2751591CF1E32B865E6E15384D5E04B6AFD4B8D4E76A371245979F3E8786
                                            SHA-512:4A500B79969AC79CE00BB131E636DFF27A2002C7E23CB03D6B3129D849601A0AF3244EF8C34EA92ACE6143102687B0A4D17555B62FA99DD79BD881BD94B6E033
                                            Malicious:false
                                            Preview:/* LEARN25.REX -- show readable date and time */....PARSE VALUE Date() WITH day month year....SAY "It's" Time("C") "on" Date("W") Date("M") day"," year"."..../* END LEARN25.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):325
                                            Entropy (8bit):4.878889459907833
                                            Encrypted:false
                                            SSDEEP:6:U5XTLQ9RhiqLF+TYhTKRhpotBsZswjBdUFscRMvU6Qm9dvtKM5jzagxwuenTLQ99:U5XQ9RrF+TtFotojBdU6cW8KztKM5KgB
                                            MD5:B945119C73DBB05C00799B69F63F8B05
                                            SHA1:9EED356559D7AFEBBA19E2D8E0DDC8DDD8D78AAA
                                            SHA-256:60E0C60BF73D92880396CF11FF41A7D21CB676569D9CEFD09A8F92A45D531C7D
                                            SHA-512:766E8EFE8E4AB17A490AEF2A6D3C97E76A2CBB37062176095AE3B65CCC6175AC6DE657498EBA94017CE4BD204BC0B55CE7E2C801998E98D4C3B5A3492CE36218
                                            Malicious:false
                                            Preview:/* LEARN26.REX -- call subroutine and pass it an argument */....CALL FindArea 5..r = 50..CALL FindArea r....EXIT....FindArea:../* compute area of a circle from its radius */.. ARG radius.. area = 3.141592 * (radius)**2.. SAY "A circle with a radius of" radius "has an area of" area.. RETURN..../* END LEARN26.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):411
                                            Entropy (8bit):4.923771219817775
                                            Encrypted:false
                                            SSDEEP:12:U55hrFotkodU6s8ytKM5Kgx3wAodUKx7N84E1D:+n5akodUd2M51AAodUq5Q
                                            MD5:C2DDFF831C5D0189A6DE7BF10F881B17
                                            SHA1:4DBEA278179B72C0567EB8E8583E61CF84B7FB86
                                            SHA-256:5963FD98BE25DC7A23B141A8656025BFF29E83029ADEFF0924A0A5A6DD7DB7B1
                                            SHA-512:4D74FB02EB8A967A5C2C80914B4EDA153544D6FDBC5611FFF7AEDB8555CC8BAFCBE4EF8B28B971874E693803DA3E50029315F1DAF5D6CF2B00D6E9DD9AC29696
                                            Malicious:false
                                            Preview:/* LEARN27.REX -- have subroutine invoke function */....CALL FindArea 5..r = 50..CALL FindArea r....EXIT....FindArea:../* subroutine to display area of circle */.. ARG radius.. area = CalcArea(radius).. SAY "A circle with a radius of" radius "has an area of" area.. RETURN....CalcArea:../* function to compute area of circle */.. ARG radius.. RETURN 3.141592 * (radius)**2..../* END LEARN27.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):508
                                            Entropy (8bit):4.750433760101003
                                            Encrypted:false
                                            SSDEEP:12:U5N4c6vfqq0iDG9o9clRu9QCB2frOvax5RU:+NT6Xqq0iG1l6MRTU
                                            MD5:67BB10BBCAE3D52A908B9A7BD53BC3AD
                                            SHA1:BBE0AB21A84C107AE23591E0D69898AAA1DF5575
                                            SHA-256:42D82206D846C72E7FB014A355273009F2051D453A24AF6D81436EE1599AAC6F
                                            SHA-512:2E3302478C45D0BB1AE1D2488256C1CAE6FE6ACD9D28B9F77CBE6DF2EF28C04D3989EA224F9C75FE1203BED0D9C8A4DD2B5971C84BF613AB73853181B6B6F18B
                                            Malicious:false
                                            Preview:/* LEARN28.REX -- demonstrate REXX argument passing */....CALL Sum 1, 2 /* call as subroutine */..SAY "RESULT="RESULT /* special variable */....our_result = Sum(3, 4) /* call as function */..SAY "our_result="our_result....EXIT....Sum:.. ARG first, second.. SAY "Sum:".. SAY " Arguments passed=" Arg().. SAY " first =" first"," Arg(1).. SAY " second=" second"," Arg(2).. RETURN first + second /* return sum of arguments */..../* END LEARN28.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):628
                                            Entropy (8bit):5.06062797705183
                                            Encrypted:false
                                            SSDEEP:12:U5x1ZJOovXk3dvXiLLN1JvqoWVPHddT7O5vNpgxsX7z2KQ8LLKOJbx7xOr:+xTJOygyLLN1hqFfd2/0kzLLK01Or
                                            MD5:B34AFAD1525CF00C3BD3CCF635D46F02
                                            SHA1:96608BDE96EC9F8DBF7911708EE9685B597CE169
                                            SHA-256:BDD28256535063221356F0C3677D44209A54E83174BCC1E5C58D5F20E881B480
                                            SHA-512:00DA74676CC6E812A3EAA509D4EC6A08AE1BC41CF4C61EB6476BDFF7319E66D8995C4572299D1EFB7F728C678A04AD31F2DF1D1289B6EDF40811362B40065476
                                            Malicious:false
                                            Preview:/* LEARN29.REX -- demonstrate REXX variable scoping */....a=1..SAY "Main (j unassigned):"..CALL PrintVars....CALL Proc1 a..SAY "Main (j created, a changed):"..CALL PrintVars....CALL Proc2..SAY "Main (a changed, j restored):"..CALL PrintVars....EXIT....Proc1:../* everything is accessible */.. ARG j.. SAY "Proc1 (j created equal to a):".. CALL PrintVars.. a = 3.. RETURN....Proc2: PROCEDURE EXPOSE a../* a from main is accessible, j is local copy */.. SAY "Proc2 (a changed, j changed locally):".. a = 7; j = 10.. SAY "a="a "j="j.. RETURN....PrintVars:.. SAY "a="a "j="j.. RETURN..../* END LEARN29.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):648
                                            Entropy (8bit):4.811437811828752
                                            Encrypted:false
                                            SSDEEP:6:U56gxFMK2Vg1CFnif6EeaM2vtiFCJ0OoH/pfBW6qiMKQ5LgWEjNjiSzyHaphniZf:U56W6w22220OBSQYxj9xlCWjCVQeoJo
                                            MD5:086738C7914BB186C15AA36C2F4A5312
                                            SHA1:CD7676520424A5CB9809C218FBFCF3C39FD12059
                                            SHA-256:BC00227B69FB95578A5202A5DA8951BC5BEB18E242C9F27E89D1A8D60A4B9AFC
                                            SHA-512:5BE20643E862F8F166354A083C5D61A49B1615A92B7877A792ECD8B8D6B1BF0628678CCC6C44F9A34F2F4A26ED3509EA4464BA5D4D594CF171CE4297C3610CD1
                                            Malicious:false
                                            Preview:/* LEARN30.REX -- display DOS information using DOS commands */..../* If Environment is Windows, ask about quitting. */..Parse Source Environment Type ProgName..if Environment = "WIN" then do.. Question = "Under Windows DOS information commands execute correctly, but their output is lost when each DOS window ends, Continue?".. Answer = QuestionBox( Question, ProgName ).. if Upper(Answer) = "NO" then.. Exit.. End....'ver' /* DOS command to display DOS version */..'path' /* DOS command to display DOS path */..'vol' /* DOS command to display current volume name */..../* END LEARN30.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):449
                                            Entropy (8bit):4.466700411533483
                                            Encrypted:false
                                            SSDEEP:6:U54hVtW7FTb7IYWCom2r+mOLCk/LzFwHVZ/nMeKFXPzBTirsX7wLtWQPZ/vTAq62:U58+yqmO2kDJwn/1Et6DxfR/vTPec
                                            MD5:2C530AB000663EC34A5C27A6024FD09A
                                            SHA1:A6A8F66E6A14900DF1E9C01ACBAF264230CC0291
                                            SHA-256:A39547E41D9489D481D524CDC839EE8D618503FA98FEB73FBC105CC557D860CE
                                            SHA-512:5900E8217D9D85D657206600EAAA24A49795EBA316253EDF6C207F01947BD5F6ED3DA4F1D6CC8D57B0C114647B656C989E2AFA36E43712153AE651626C3A563C
                                            Malicious:false
                                            Preview:/* LEARN31.REX -- execute DOS command against list of files */....filelist = 'files.lst'....ARG command /* get user's command */....DO WHILE Lines(filelist) > 0 /* loop through file list */.. current_fileid = LineIn(filelist) /* get a filename */.. command current_fileid /* execute command against it */.. END....CALL LineOut filelist /* close file list */..../* END LEARN31.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):237
                                            Entropy (8bit):4.5697450318905295
                                            Encrypted:false
                                            SSDEEP:3:U5W0IIE3LQEmPcu4L4sdyo4RrJKG/OyfXTTTTTTTTTTTTTTTTTTTTTSSdyo46oKq:U5gEEI4Es0D/n2S72/nGIND
                                            MD5:74E0D49D63A31CDCCC3A71AF1D1D75A1
                                            SHA1:C6D28D6E562EE40F4581BF791EC6F7F4BDB9F3C1
                                            SHA-256:A6427AC226CDB52859A5F250EC3BC54792B3145C061BB2674AC2DE7BDA51ABBA
                                            SHA-512:A4B2C07645CC72AB10127ACC8D4B249077D106A2043001E5CB0BC3E7CF90EB07481199AB72CAEC847EA1943BA89C9F771A648F202D8A83DD78E16F4AD73689BE
                                            Malicious:false
                                            Preview:/* LEARN32.REX -- demonstrate REXX numeric operations */....NUMERIC DIGITS 30..SAY 5/3 /* writes 1.66666666666666666666666666667 */....NUMERIC DIGITS 10..SAY 5/3 /* writes 1.666666667 */..../* END LEARN32.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):149
                                            Entropy (8bit):4.594094770721171
                                            Encrypted:false
                                            SSDEEP:3:U5WV23OF/a37uP2PQano9QLd/d2FQlQxwae7vcKmL:U5h6K0AQyo9cl2FQSxwa2u
                                            MD5:41AA0B7B6F428429FFCADECE752F6188
                                            SHA1:092CD183940978F41B825E734428F129F9DFC29F
                                            SHA-256:7A5C1882306E322156F3943E9B3240F39DC50A1FE08DB0DA2A42DD791E3743FA
                                            SHA-512:6FD6BCD00BEBED5294836523338663BEB8386A4C8CEF41CB2DC4C3904AA6E3369414CB2671641F94AC041921952063A85DED8D9E69E1141BA8E36224EDA71EF5
                                            Malicious:false
                                            Preview:/* LEARN33.REX -- use TRACE to find bug */..../* TRACE ?R */....SAY Sum(1, 2)....EXIT....Sum:.. ARG i j.. RETURN i + j..../* END LEARN33.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):137
                                            Entropy (8bit):4.9031392700962515
                                            Encrypted:false
                                            SSDEEP:3:U5W2bVJqRZDaIfQ9pAov2TJqR/y5GgcgGQKR/yyKPFKm29:U5bArayQ9pNuFqN8GRMKNrKPM7
                                            MD5:81B7BEFB32B43B9BA94AB27F807CC12B
                                            SHA1:60E971BBAEA52B80C6DA6028BF89028A99ABF0CA
                                            SHA-256:3003AA8C715415ED0E6CE147C9E0DF4453FFBBA0286E3C45E0DECCDA2FCE7D6A
                                            SHA-512:25C8CCF453FA7846E295A317E8D41A671AEA8C444475EEEDC04107E6A961114DC9F15F4AF557C00CBCFEA153B61368C9B339BC712536CDB8F83592C22C6E9AB0
                                            Malicious:false
                                            Preview:/* LEARN34.REX -- calculate result from any REXX expression */....ARG calculation..INTERPRET "SAY" calculation..../* END LEARN34.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):203
                                            Entropy (8bit):4.833715995232883
                                            Encrypted:false
                                            SSDEEP:3:U5Wo4yIKQUJtWRE1eX49M+fvTAqbhx1wJRvTAqbhxt/EF5Kmo41D:U5Tu0WREEIK+zAqNxwAqNxrDyD
                                            MD5:2DAEC2483B8F85CFB29E9313A74C2504
                                            SHA1:88D9D01F5C2F313A0EDC5ABC5FA88860CCB6259E
                                            SHA-256:4FA9602C38AA2646A3FA2BDC812DB021ED8C43EF9E34B99F90874BE0D6CB730C
                                            SHA-512:C467F0486AFAB0AE4E666CE72A9D272AAA6D5F3F15721B2547E4B341451F575D77A8DEA98789A613F60D1F426DC7D4172A992822C9C504DF80AC8DE6F1294032
                                            Malicious:false
                                            Preview:/* LEARN35.REX -- write time-stamped note to disk file */....PARSE ARG newline..CALL LineOut "notes.txt", Date() Time() newline..CALL LineOut "notes.txt" /* close file */..../* END LEARN35.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):442
                                            Entropy (8bit):4.711000503219674
                                            Encrypted:false
                                            SSDEEP:12:U5Eg0/enS9Rz+0goFd0Q7D8JyDwQXYgqPYTovTPmuEkPYr/gr:+EgxC4M70QvuyDwfgvovw/gr
                                            MD5:9A66E5671AB87CFC65240DC41FAC89E9
                                            SHA1:D062F68F3AC334FA170131C9C41B30ABF775BE3D
                                            SHA-256:036DA8EBBC4D27A01A8F2563643BE96D4212F47D92D66087B6B443D909D8CE19
                                            SHA-512:8E29A77E2B972AECD027F3F83D8614633E6F061134B8CF977288221A2C1BF9BCB3B758E05C15F3EF86B6E37C1048987DED294CD4731E69DE635B0BDAFD34A445
                                            Malicious:false
                                            Preview:/* LEARN36.REX -- copy one ASCII file to another */....PARSE ARG inputname outputname..../* delete old output file so we don't append to it */..CALL DOSDel outputname....DO WHILE Lines(inputname) > 0 /* check for end-of-file */.. CALL LineOut outputname, LineIn(inputname) /* write line */.. END....CALL LineOut inputname /* close input file */..CALL LineOut outputname /* close output file */..../* END LEARN36.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):460
                                            Entropy (8bit):4.620446229091455
                                            Encrypted:false
                                            SSDEEP:12:U5O/Ad0+EQKDE6h5J4CJDdZGUGYQ0hTPFz7QgezJAAoBZPD:+uguDEgJ75dZGn0hFEVONBB
                                            MD5:E3C0986977770033AAE1BF719D4C83F0
                                            SHA1:1F13D643557125978CED35058F4E407F53522461
                                            SHA-256:ECD6E2DDD13E78DF93E5F1FD94B66DB26E15F3F3379DF6F23B9156C18F868C60
                                            SHA-512:AEE257244B1D0A3DDFE70BBF94A5C520A6091B3954FC48689BD9E3A4EC49E7CBACDEEEF3A842468847FE313C419892ABEC650E97E6231653C5EBD782D3810060
                                            Malicious:false
                                            Preview:/* LEARN37.REX -- list occurrences of string in file */....PARSE ARG fileid string....DO WHILE Lines(fileid) > 0.. newline = LineIn(fileid) /* read line */.. IF Pos(string,newline) \= 0 THEN DO /* search for string */.. SAY newline.. found = "yes".. END.. END....CALL LineOut fileid /* close the file */....IF found \= "yes" THEN.. SAY "String" string "was not found in" fileid..../* END LEARN37.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1067
                                            Entropy (8bit):4.902083782297034
                                            Encrypted:false
                                            SSDEEP:24:+myicU60hRhgo94wluS0iKSVoGgVwLKEsORf68BWD:+myicpchgolf0JT2sAf6N
                                            MD5:069093F4844A430E872ED26BC07BE393
                                            SHA1:0D5A963EBBDB2BD83AE6B43776F3C7FDC29B506D
                                            SHA-256:79FE8E37EC829AE4048A5136C5ED5F4C3328590F5B260DF8ECFC36EA6A69DECC
                                            SHA-512:783E041C11DA711EE9078F748369140CE3BE44B7F41E19891DE7E17DD0C334E308B0C6E3A3201DDD329F185DF005C894B65C8B68FB5AF31D6A8550757200B46C
                                            Malicious:false
                                            Preview:/* LEARN38.REX -- analyze host PC */..../* Check if Environment is WinREXX, if so.. | run the appropriate commands.. */..Parse Source Environment Type ProgName..if Environment = "WIN" then do /* Analyze Windows PC */.. DosMessage = "Under Windows PCROMDate(), PCRAM() and EMSMem() are *not* supported.".. WinMessage = "*Use* WinMem(), WinVersion() and GetREXXDirectory().".. Answer = MessageBox( DosMessage" "WinMessage, ProgName ).... SAY "".. SAY "DOS:" DOSVersion().. SAY "Windows:" WinVersion().. SAY "Memory Free:" WinMem() "bytes".. SAY "".. SAY "DRIVE:" DOSDrive()":".. SAY "PATH :" DOSCD().. SAY "REXX Directory :" GetREXXDirectory().. Say "Free space on" DOSDrive()":" DosDisk(F,DosDrive()) "bytes".. SAY "".. End..else DO /* Analyze DOS PC */....SAY "ROM Date :" PCROMDate()..SAY "DOS Version:" DOSVersion()..SAY ""..SAY "RAM:" PCRAM()..SAY "EMS:" EMSMem()..SAY ""..SAY "DRIVE :"
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1830
                                            Entropy (8bit):4.686159245567156
                                            Encrypted:false
                                            SSDEEP:48:+DiMVgWq0AYqYDun2qmNqb6tKPM8bdwKPwGU:+DiMVgW1AYPDbOb6tKPM8+KfU
                                            MD5:577C11E5079C15327F39A1D2621FD88A
                                            SHA1:6EECA2A5E74E09730C0785C5701214F50C7AD217
                                            SHA-256:4A697084852202C123A0FB64F3C2B4051FB946201AB583D54F84139E8708F004
                                            SHA-512:7E13475BD308B82A32B597A5C945D24A5DF21CFCB20C7FC33F81FC018CAE919ACB46FF6D066F6A56C52C47DC6AF89EBBE4FFEFDCDA415E1CCC98363DCD3EF568
                                            Malicious:false
                                            Preview:/* LEARN39.REX -- draw border, wait for user to hit key */..../* Check if Environment is Windows, if so quit. */..Parse Source Environment Type ProgName..if Environment = "WIN" then do.. Message = "Under Windows the SCRxxx functions are *not* supported.".. Answer = MessageBox( Message, ProgName ).. Exit.. End....CALL ScrClear /* clear the screen */..CALL Cursor 3,5 /* cursor in row 3 column 5 */....CALL Frame 1,1,25,80 /* draw the frame */....CALL InKey /* wait for user to hit key */..CALL ScrClear /* clear the screen */....EXIT....Frame: PROCEDURE../* draw border with IBM double-line extended characters */.... ARG urow, ucol, lrow, lcol /* upper left & lower right */.. /* coordinates of frame */.... horiz = D2C(205) /* ASCII 205: horizontal border */.. vert = D2C(186) /* ASCII 186: vertical border */.. tleft = D2C(201) /*
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):342
                                            Entropy (8bit):5.127374888847482
                                            Encrypted:false
                                            SSDEEP:6:U5RVoduQvHGEjHGfGLZyZm1uhIAwnRHBSAivmBiCou/jSmBi55IvmBiAemBifph6:U5R6Hv9mi1zAwnRhSdvmBhlbSmBNvmBr
                                            MD5:0C7FDF5A8FD8548C6513B3E659168C1E
                                            SHA1:A4E369674BAFB0FD3C0F1267FEED2FB5C4D4F14D
                                            SHA-256:6A9EC2169B04D6D44148AA2475EFA9A501EE357334171CCB7E48F904AE16CD29
                                            SHA-512:977AB0804EC06D1BE47AB490205ECA7EB5C3A30CB43E71DC294FA7DE8C5203592B9ECD78CC13494B6125A2C6DADC7D68E7FDC673E64EFE4272E7F956CA4544A3
                                            Malicious:false
                                            Preview:/* LEARN40.REX -- process file name using miscellaneous functions */....filename = "c:\WinREXX\WinREXX.EXE"....parsedname = ParseFn(filename)....SAY "Drive = " Upper(Word(parsedname, 1))..SAY "Path = " Lower(Word(parsedname, 2))..SAY "Base = " Lower(Word(parsedname, 3))..SAY "Exten = " Upper(Word(parsedname, 4))..../* END LEARN40.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):833
                                            Entropy (8bit):4.843271131551359
                                            Encrypted:false
                                            SSDEEP:24:+RwSzeyp1opI2hxFPr887Gr2nplnUY1ruVHGsGn5NaiR:+RdzeE4fTFjzNQnArR
                                            MD5:A00329639D4356688C1894DA6360D236
                                            SHA1:2F53617C226F5AAEBAA65ED5A44AAF7DEA7A4167
                                            SHA-256:154906C6334FFD58FD93A92206625DCE40FD49D106A43E8996B0054D4A9EC31C
                                            SHA-512:73C95CA530AA42035CF5EC8A91EE29AB49100E770FB4226C6E7FC0E15360FD58E7F9F04F8ABE260E0A343196F8576FA9A06D9B82D21E175CF080EBFB5B34A23C
                                            Malicious:false
                                            Preview:/* LEARN41.REX -- create menu of executable files and run one */....NULL = ""..top = 1....CALL BuildList "*.exe" /* find files */..CALL BuildList "*.com"....IF top = 1 THEN DO.. SAY "No executable files in current directory".. EXIT.. END....DO i=1 TO top-1 /* display menu */.. SAY Format(i,2)":" Left(dirlist.i, Length(dirlist.i)-4).. END....CALL CharOut , D2C(10)"Enter choice (Hit ENTER to leave):"..PULL choice /* get user's choice */....IF choice <> NULL THEN dirlist.choice /* issue command */....EXIT....BuildList: PROCEDURE EXPOSE NULL dirlist. top.. ARG filespec.. dirlist.top = DOSDir(filespec, "n").. DO WHILE dirlist.top <> NULL.. top = top + 1.. dirlist.top = DOSDir(, "n").. END.. RETURN..../* END LEARN41.REX */..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:MS Windows 3.1 help, Wed Jun 2 21:57:33 2004, 87270 bytes
                                            Category:dropped
                                            Size (bytes):87270
                                            Entropy (8bit):6.4105180064304745
                                            Encrypted:false
                                            SSDEEP:1536:37PAu/D4Ghy2iZ6dXV5FFY/ABDq9HgmZJlmbueLaobc9rWjU:LIu/D4GhygdF24Bq9Hp8KvobpjU
                                            MD5:573A86AF70BB4017C81ADA0444F2A35C
                                            SHA1:7213960410D47BCF8C1C41F8FD3D6202763C8F49
                                            SHA-256:746BF6DD4C320A4B9CE3DD852C322D5890DA5364C6E8F428E7F8D808D6142B1A
                                            SHA-512:AAB02C7A91BBFACED2B5D1D82A44C5678070E4E9015DB3874D2E5DD357B6E2C78DFCEF2F1D42F4F9C6EC9887075120732D196F069B491EAC2E137443AE67D71D
                                            Malicious:false
                                            Preview:?_..\........T..L...C....< ...0...."(.()*/,--../*:=aana.ndanyare...argumen.t.Psarray.asbebuil.t-inbyCA.LLcancha@racter.`s@clause.0spcomm[..@..p@arison..o.u..ncaten.ati..ntro.ldefault@differ..d@isplay.@s.DODOSENDQ..erE..pR.e.environ...examplee.xecutede.xpress`..p`sfile....r.stfollow.ingforfr@omfunc..F..@s.Pshave@Ifinin*.m.. inputin.stru4 I.p...lis$.sINT.ERPRETis.itlangua.geL..Z.gli.neloopmoE..a..otn..r.icof..ope.ratorsor.otherPAR@SEPars..p0rogr...0sP.ULLradiu.s..U..0..tur0nREX... 's.ro..e.@sSA.YscrV.siL.G.....@sub-@S..`ssy2.xteCz...that..T...HEN..nth...oTRACE ..u..value. .sV..abl...`.. swhichw.illwithy.ouYou..r.........$S!"""@)"*.",.."...."="'').',..'.'/'.':''[''].("('(),(.).(.)([).)))**),)..):):"**....0....(.-*+.+++p.'--..B>u.)/00..6...11...21...12221231.5161818..2203207...233.1415.9..35440...355/3505.08555660.36177880.29:":\;<.<>=">>=>.>>??"[\\.=]])],_`.`Aabbrev.i.#abilitRy..Ab..a.0o.veAccN.a.@...i....ordB.u..u..y..F.G.v!..tual.0ly.add..e..ij Ddd..advQ.e.dA.@. t..a..+..Z.fj.A..ag.ain
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):2963
                                            Entropy (8bit):4.407875912076701
                                            Encrypted:false
                                            SSDEEP:24:m2nBaIykM/LkJ/GLAn+VflJ9I4+RqWxDEG71uC5/V25HT4D0G3xwKkk2VRSsyxuf:HBhpM4J/a1jBIRxDn/kH/GsBS5uYm3f
                                            MD5:E3FC77C88216EBE27D6B12E2EEECA3FF
                                            SHA1:23FEB9CA91ECCF2B0AECFEE314334A09BE9A350D
                                            SHA-256:45C2BF0E7580073FFDEB615F93D87FC6D902782B97445E3B57B57820F698FACE
                                            SHA-512:C543082B3D74D8546B0D269A610553875B5F736F4952269E4E347D21A39F0DC60EABEB17E75C904DFCB270E97B8F013C8144B025F4EAF9B50FF3B140CF469561
                                            Malicious:false
                                            Preview:..---------------------------------------------------------------------------..1) HOW TO USE ZOCEVENT.ZRX..---------------------------------------------------------------------------.... The ZOCEVENT.ZRX file is called at certain points in ZOC (with the.. parameters identifying the event shown in the table below)..... The ZOCEVENT file can, for example, be used to turn off a fax program.. before ZOC will try to access the com port and turn fax receive mode .. back on when ZOC exits (OS/2's FaxWorks offers such a feature via the.. FXRCV.EXE program, as shown in the sample ZOCEVENT.ZRX file).........---------------------------------------------------------------------------..2) CALL PARAMETERS..---------------------------------------------------------------------------.... ---------------------------- ------------------------------------------.. EVENT PARAMETER(S).. ---------------------------- ------------------------------------------.. ZOC
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):2125
                                            Entropy (8bit):3.7197433400923225
                                            Encrypted:false
                                            SSDEEP:24:GFFfIhYtguCy4khEAL8jx/N/sMP/JsFtPp/XsF1p/ocsk3Sr:GFFghe4k6ALixVUES5El0Jr
                                            MD5:B3C2B96E3688F6F247BCD4DE7916E795
                                            SHA1:9DCF37EA6A816EB005E87581075CB8615FF61558
                                            SHA-256:5B58FA1990AEE3B559A4FE140FE780EF625B3D2C7CEC30167BDDB8619430121F
                                            SHA-512:92E0B7B3537784883A5393E3E38D20BA6BD73778B40CE13EB3C75EB95BBB8E64A8C650C568A34A2FB2F52371F5913CC7DDF077FD00680CDFB3EBBC1A9195BB0C
                                            Malicious:false
                                            Preview:/*********************************************************************** .... PLEASE SEE ZOCEVENT.DOC FOR A DESCRIPTION OF HOW TO USE THIS FILE....***********************************************************************/....../**********************************************************************/../* The line below exits at once -- remove it to make it all work */../**********************************************************************/....EXIT /* >>>>>>> to make it all work delete this line <<<<<<<<<<<<< */......../**********************************************************************/../* Parse the command line arguments */../**********************************************************************/..PARSE ARG Event " '" DeviceName "'" "'" DeviceOpts "'"......../**********************************************************************/../* Find out where FaxWorks is installed */../************************************
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):4167
                                            Entropy (8bit):4.561074898630256
                                            Encrypted:false
                                            SSDEEP:96:x5YwYBa8b5/aqyaH2iW7ySzM2qhiiL/GYcZhgzF57:0w78b5/aqyaH2itcM2kirZi
                                            MD5:7FF1DA6E7DBC2D80B92E6CC501094155
                                            SHA1:2E9646AA5AF2EF90F2DFB52D0BBF88AF696B9B90
                                            SHA-256:8AC184605CFC413CFAFEF467D4FCAD9DD95D678E848B4894A761EEAB7C558B1A
                                            SHA-512:7CDB06D2E5983302E2A8A317E9FCA4D2DAEA9426678FF44A8FBF464EDDC49DB72EF120C57D56440620FCF19819392277D5BCFF599549539BF2A8D8C4ACEAACE3
                                            Malicious:false
                                            Preview:..---------------------------------------------------------------------------..1) HOW TO USE ZOCXFER.ZRX..---------------------------------------------------------------------------.... The ZOCXFER.ZRX file is called before and after every file transfer... Parameters identify the type of event (see table below) at which .. ZOCXFER.ZRX is called. This lets you do things before and after file.. transfers according to your needs (see examples below).......---------------------------------------------------------------------------..2) CALL PARAMETERS..---------------------------------------------------------------------------.... ---------------------------- ------------------------------------------.. EVENT PARAMETER(S).. ---------------------------- ------------------------------------------.. Before upload 'PRE' 'UPLOAD' '<full filename>'.. Before download 'PRE' 'DOWNLOAD' '<full filename>'.. After upload
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):2211
                                            Entropy (8bit):3.35667516929533
                                            Encrypted:false
                                            SSDEEP:24:u0ggoo5KQrzhSzwl+LyvxH/Jd1/053o/05B+f/TG/053gY/05k:u0l7MqhSJ25
                                            MD5:433A15A30372D0E12AFA035CD8C60159
                                            SHA1:772D75D54E082C610AC16D2FEC2C7A2178FE5A60
                                            SHA-256:2300C62D7A9E90481D20AAD28246380E62AF41200BCDA8AB23EF653241E93EB3
                                            SHA-512:DD6AD5FD8BD07941B634AB27230D13CE72AC46DF021BDD778D8CB71BDC210F400036F3F76F95CE7CB26F28EE514B926C1EE165FD9D2509ABE7D5BBF1C5D2E99E
                                            Malicious:false
                                            Preview:/*********************************************************************** .... PLEASE SEE ZOCXFER.DOC FOR A DESCRIPTION OF HOW TO USE THIS FILE....***********************************************************************/..../* get the call parameters: PRE/POST UPLOAD/DOWNLOAD <filename> */..PARSE ARG WITH "'"prepost"' '"updownload"' '"file"'"..../* don't delete the following line !!! */..newfile= file..../* get filepath, filename and extension from file */..filepath= FILESPEC("Path", file);..filename= FILESPEC("Name", file);..PARSE VALUE filename WITH filestem"."fileext....SAY "ZOCXFER.CMD: "prepost"|"updownload"|"filepath"-"filestem"-"fileext ....IF prepost="PRE" THEN DO .. /******************************************************************/.. /* Before file transfers */.. /******************************************************************/.... IF updownload="UPLOAD" THEN DO .. /**********************************************
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):670
                                            Entropy (8bit):4.8859428969312235
                                            Encrypted:false
                                            SSDEEP:12:UySA9cgtk9wbE8hCdFDX2ENy8TW6MO++wUXBQLgJDpG/ePKocAxpQxRQj+WEov:bGwZhCzbk86O++wUXLCoKoxx6NWBv
                                            MD5:B0AAFBBAE8E6672004D1F62CFE6A53D4
                                            SHA1:E178D51314EE3EF94C46584AE584A3BC9F8B5933
                                            SHA-256:BCC8A8BF4BF7B117FE655A62696D126AECA60A025F4343B3288FAB94136F8EB8
                                            SHA-512:670CF739E99AB73D5126EA0D0E951E356D887ABBC91C42F7E4C9DE69DED1C9E2FF8E6064D2A85E1C9906BA98B1CDD7B7572F02BB449CCF1AFB4DFC191546AD22
                                            Malicious:false
                                            Preview:/* REXX */....cr= x2c(0d) /* Carriage Return, Hex 0D */..lf= x2c(0a) /* Line Feed, Hex 0A */..crlf= cr||lf /* Carriage Return plus Line Feed */....msg= "The buttons in this part of the ZOC window are examples"||crlf..msg= msg||"to demonstrate the User Button bar"||crlf||crlf..msg= msg||"They are part of a session profile and can be modified "||crlf..msg= msg||"from Options menu, Edit Session Profile or by clicking"||crlf..msg= msg||"the User Button Bar with the right mouse button."||crlf||crlf..msg= msg||"(To find out more about Session Profiles, please read"||crlf..msg= msg||"the help topic at the bottom of the Options menu.)"||crlf....Call ZocMsgBox msg..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:OS/2 REXX batch file, ISO-8859 text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):21777
                                            Entropy (8bit):4.714604012293766
                                            Encrypted:false
                                            SSDEEP:192:E47JUeBkp3pQXKuUXBqyZKpOrPP59CaGLfpSah9/QOhwCbUA5cTMVbMSRx0UFWWV:EXeBkp3phumopOrpkfpStgsq
                                            MD5:916910EA5F27F7E4356C84098FC4750D
                                            SHA1:F156A52A45E513A90A7B068DAAD4B1E17EDC960C
                                            SHA-256:BA467BB880580EA063AFBA3A06997FF896355AC0CB5686AC6EC9A5E7DB1581F9
                                            SHA-512:23B3CFA7CCD3EDA92EC93AEBBCCCBBD5900EACA9D31EF78319B8ABAFEC546F20D5C3AE8DA02D1B08279C788A0B3B5C48FB87EC39FD5040A21E52FBAC2CEAB0F5
                                            Malicious:false
                                            Preview:/*******************************************************************..* REXX program to simulate a simple host *..* *..* Features: *..* + Simple user list (see below) *..* + Two user levels (admin and normal) *..* + Change of directories (admin only) *..* + Up-/Downloads *..* *..* 09-13-2004 Edited by David Rife to speed text sending with *..* Zoc version 5. *..* *..*******************************************************************/.... /* uncomment the TRACE A command to debug this program */.... /* TRACE A */.....
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):631
                                            Entropy (8bit):5.019330612025214
                                            Encrypted:false
                                            SSDEEP:12:U2qFv8oG2Xr28EynXErP26/Wu7RGmaPZYfZxTXdAzxDuPp5VrdZlFpLroa:tQ8N2q8MrPJO6g/WfuzyvVrdZlXLrr
                                            MD5:D9B7591864B5B570C2D3174F74752E3F
                                            SHA1:59A49DFE2E7C2A7848E58FD50987EF4072A756B5
                                            SHA-256:4ACF3B72179F79F02D49463D6EF9FAE0FEA5D9029CE99217769680E3EBDE8628
                                            SHA-512:35C2AE0099E3F6DC58E2183E1429191219385F1B1F187478235EFF567CDF14132534F8ECB76E12D051318ED8056FDA464FE089A1476FEA346BF0F8C335520CAC
                                            Malicious:false
                                            Preview:/* REXX */../* ^^^^^^ REXX programs always begin with /* REXX */ on the first line */..../* clear the screen */..CALL ZocCls....SAY "This is a REXX scripting example."..SAY ....../* Ask user for his/her name */..who= ZocAsk("What is your name")..../* print some text to the ZOC window */../* (this time we're using REXX's internal SAY command) */..SAY "Hello "||WHO||"!"..SAY ..SAY "Thank you for using ZOC!"..SAY ..SAY "For more information about REXX scripting, please"..SAY "read the help topic at the bottom of the ZOC Script"..SAY "menu or the REXX information in your My Documents,"..SAY "ZOC Files, REXX folder."....EXIT....
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:OS/2 REXX batch file, ISO-8859 text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):20993
                                            Entropy (8bit):4.6667010304226935
                                            Encrypted:false
                                            SSDEEP:192:E49U7Bmp3pQXKusjBqyNlgpOdPP5vi0mLHpSahHK6TKJluKoBwiKkK1YKmpEz1VJ:Er7Bmp3phu68pOdpYHpSGEZsq
                                            MD5:3FA2364235C2679DEC169BF71ADAEF45
                                            SHA1:E68D500E6A1F2ED4141E369340B7B3B1072C41D6
                                            SHA-256:5C098D96F36DE565FEC209FA6E53CD6723D3EFA2895431E65262F3B3DC95BCA4
                                            SHA-512:EE7F4F4B720C029B2BCF5DFEE104C20DB53BAC377B03BCBF2E94E64E98E4C07947E96C64A54B38D1C5E263A7E7463CD64986E91E2457C84407189DEBF36C5A54
                                            Malicious:false
                                            Preview:/*******************************************************************..* REXX program to simulate a simple host *..* *..* Features: *..* + Simple user list (see below) *..* + Two user levels (admin and normal) *..* + Change of directories (admin only) *..* + Up-/Downloads *..* *..*******************************************************************/.... /* uncomment the TRACE A command to debug this program */.... /* TRACE A */...... /***********************************/.. /* below is the list of users */.. /***********************************/.... curdrive= "C:" /* Work drive for all users */.... user.1= "ADMIN"
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):684
                                            Entropy (8bit):5.27554706036504
                                            Encrypted:false
                                            SSDEEP:12:cBEzLG5bX3I7h9br5sdzMbMIzMrX4Ie+sG2ypkfScr9Yok3E2F9bM65J5SR4BBIJ:cyzq5bH4b1RMbX4JDMcr9YDZFDJ5SR4S
                                            MD5:66E7C0335E4512EF0058FD87D7A9DDD7
                                            SHA1:56C0D9A6CCCAF5338DC7CFD325A3F5E831340E2F
                                            SHA-256:0BF26CECEE9324DB3534577E1B3888FB4D7193E50191CB866EA883A4DB78AD17
                                            SHA-512:3721013BDC61713A4ED0D3FD71677AA066DD2F51C16CD7F4EFA2F1300ED66F41A21FB0E42BCF5DF61DFADE7140A21756E352AFBF6F953F73ED4D5F18CC0C0AF0
                                            Malicious:false
                                            Preview:AppName=ZOC..AppVersion=5.12..Expire=2009-03-01..AppRegistry=*..Distributor=compulab.cfg;CompuLab (Germany)|bmtmicro.cfg;BMT Micro (USA)..AppHelp.German=zoc.hlp|10600..AppHelp.English=zoc.hlp|10600..DefaultDistributor.English=bmtmicro.cfg..DefaultDistributor.German=compulab.cfg..WelcomeMsg.English=You are about to order ZOC.\r\rBefore ordering, please also check the Order-Info item in ZOC's Help menu.\r\rClick 'Next' to continue.....WelcomeMsg.German=Sie sind gerade dabei ZOC zu bestellen.\r\rBevor Sie bestellen, lesen Sie bitte auch den Punkt Bestell-Informationen im Hilfe-Men\xfc von ZOC.\r\rBitte klicken Sie auf 'Weiter'.....Amt0=1..Amt1=0..Amt2=0..Amt3=0..Amt4=0..Amt5=0..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):116152
                                            Entropy (8bit):6.214109707259487
                                            Encrypted:false
                                            SSDEEP:1536:7KeswrgGp6tNfam2vGt8LihNOJpYJL2cnX6+X5tIGpI88n4+Ybi:7L6jSLiuJiJ1nX6+X5tz2n1Ybi
                                            MD5:A6CBAC90B8A6A8A68507D72588206DFD
                                            SHA1:1D4C5A52AF0DB1E9BEE0813DD784C9F75542E828
                                            SHA-256:74D61C03197DCB019C0D10AEDFC04AAD2920238138503204B50B10EA43A2F764
                                            SHA-512:71627C1614C6249A2E2E2B40CCB8D3EFB310D4A959D457E73C3F4BC8BA78D794533947A9F015D71AAB32AF7498319FB009831B5B355C23A61B3E4AF03F48E0EE
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............A...A...A.$.A...A.$.A...A..A...A...A...A.$.A...A.$.A...A.$.A...ARich...A........PE..L...Qz.I............................q........ ....@..........................................................................@..<....p...J...........................!...............................;..@............ ..@............................text...J........................... ..`.rdata...'... ...0... ..............@..@.data........P.......P..............@....rsrc....J...p...P...`..............@..@........................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):73771
                                            Entropy (8bit):5.032482186650669
                                            Encrypted:false
                                            SSDEEP:768:efLYCoLTsC5OY+fd6tmIyOof10EeqbFUXL1ZwbZu44z:eECofxOY+fQAIod9ecqXLYb0rz
                                            MD5:82BDDA936AC6FF9E9CB9B2DC0C4315CF
                                            SHA1:020C9CEE03A606AFF9ACA5F91D251F93874B627B
                                            SHA-256:337A89A3543E7C1EDCFAD78699BA9890F7BAEC65D13E7C5867DB04900FABB0D6
                                            SHA-512:86B4BE01244780FC726ED7F597D33C779B33095C7BD1BA052D250C4877A14786798C4882839311A83393327C2C431B1A5106F0C85BB908530FC4258565B4428F
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........K...K...K...)...A...0...O...M...N......H...K.........O......H...RichK...........PE..L...V^5I...........!................................................................................................0...F....P...............................p.......................................................U...............................text............................... ..`.rdata..v........ ..................@..@.data...Pq....... ..................@....idata..A....P... ..................@....reloc.......p......................@..B................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):86064
                                            Entropy (8bit):4.975279205887081
                                            Encrypted:false
                                            SSDEEP:1536:jlDDd03Lt24k7iTUcqYh4ioLiCi3yzcdb73TGYaEsov+Gg:FDdN4k7Fc5oLiCi3yzcdb7jGYwovNg
                                            MD5:AA8B245347EBE573F9B4245254582C68
                                            SHA1:16739C52ACB3F398CD9007F70AB5333CD5B4857F
                                            SHA-256:EB2E94C34DC1C8528FB7ED2FD988E56CDBDC216D94C99423EA6240FDC55C0DAB
                                            SHA-512:F6EC1F517C88ACA652E22F9C0E22852DA946ABF14DD36525A7E28427DB88930D3132BB1E78E5263C2A62D9C7927D82E750EAC4A384EC192966E5606F89A89089
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 3%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d...7...7...7...7...7...7...7...7...7(..7...7...7...7T..7...7...7...7C..7...7...7...7C..7...7Rich...7........................PE..L...c^5I...........!.................f............p..........................P..................................................d.... ..p....................0..........................................................(............................text............................... ..`.rdata..Z........ ..................@..@.data............ ..................@....idata..............................@....rsrc...p.... ....... ..............@..@.reloc..&....0... ...0..............@..B................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ISO-8859 text, with very long lines (316), with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):945
                                            Entropy (8bit):4.816120057098652
                                            Encrypted:false
                                            SSDEEP:24:kUWJSELiTnam2f93rbivK5PpaNWTqyaeYLUkn:kUWJxm2f93r2upQ0CTn
                                            MD5:4D455C67B52A40D32AEBA2012941B1B4
                                            SHA1:709765E8B70C6C1F34EF11941CD1DA6812B77626
                                            SHA-256:4F86C2BB0F72392081BEEA4EA03A51511A74966A1AE3B84BE7A3BE1F91925C3D
                                            SHA-512:B50AFE0013F500A582798A4AA1744985769A16CC421503EAB005D4BF95B1E007552160CF170040474E81A872C48DB311CD5FB48987C4B6A92465685862B74E5A
                                            Malicious:false
                                            Preview:Product=PyroTrans....Teaser1.German=Suchen Sie ein Dateitransfer Tool?..Teaser2.German=Dann sollten Sie unbedingt unser Programm PyroTrans testen!..Description.German=PyroTrans dient dazu per Modem, ISDN oder Internet Dateien automatisiert (z.B. im Rahmen von Warenwirtschaftssystemen) oder manuell (z.B. Au.endienst) zu .bertragen.\r\n\r\nPyroTrans unterst.tzt automatische Kompression und Verschl.sselung der .bertragenen Daten. 30 Tage Testversion mit Support!..Url.German=http://www.emtec.com/pyrotrans/index.htm....Teaser1.English=Do you need a file transfer tool?..Teaser2.English=Then you should definitely test our product PyroTrans!..Description.English=PyroTrans is a program package that allows automated and manual file transfer over Modem, ISDN and the internet.\r\n\r\nIt is a great solution to transfer data between a company headquarter and branch offices or field staff...Url.English=http://www.emtec.com/pyrotrans/index.html..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ISO-8859 text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):4242
                                            Entropy (8bit):5.493963837193557
                                            Encrypted:false
                                            SSDEEP:96:Vyhx3JoX7i6IjmhgIqeXZ84Z1Clxh/7Sh:Vyh5qIjaqe/mxFi
                                            MD5:68C45D1D1E6AB31BB71BD8D6B2656CB7
                                            SHA1:E0906AB53D25C18054C2C970EA3E4BE07C0D528C
                                            SHA-256:7BFBE6CBD814C2F6A9EE211DEB8FD521DC224E1D34594465E033E015AB6520D2
                                            SHA-512:B27A6817B9A60939C4B4DA8F30AD82616CD01C28298F6A8AB9C1A2677D9E5A572EAB9959FB121750192115B609D6717D4C9FE67973D7DE8820A2B5E710CC4D71
                                            Malicious:false
                                            Preview://..// ZOC V5 install script..//..AppName=ZOC..AppVersion=5.12..Advertise=advertise_pyrotrans.cfg..IdIcon=100..IniKey=ZOC5....InstallPath=ZOC5..UninstallIcon=ZOC.exe..StartMenuUninstall=1....CopyToDest=Setup.exe||SetupEnglish.Dll|SetupGerman.Dll|lizenz.txt|license.txt....DeleteAfterExtract=Develop.doc|Versions.doc|Problems.doc|Isdn.doc|Register.doc|Features.doc|Readme.doc|..DeleteAfterExtract_2=emucept.dll|xfrcept.dll|xfrcis.dll|megadodo.dll....ProtectedFiles=*.zrx|*.zky|*.zfg|*.ztb|*.ztr|*.zoc|phonebk|standard.cfg|*.ini|newuserprofile/*....AskOverwrite=....//..// English..//..WelcomeMsg.English=You are about to install ZOC - a powerful terminal emulator for Windows...FinishMsg.English=Now please start ZOC from the start menu. After starting the program, select Quick Start Guides from the Help menu.....StartmenuName.English=ZOC Terminal 5.1..StartmenuOpts.English=ZOC V5;*Zoc.exe|Readme;Readme.txt|Order ZOC;Order.exe|..StartmenuOpts_2.English=Feature List;Features.txt|Order Info;Registe
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):352256
                                            Entropy (8bit):5.590182704315919
                                            Encrypted:false
                                            SSDEEP:3072:rKBBoF8GyN0ugGFzn3rGUmPv6a6iR1Vw67ZF7vBsuWloi23zTIbBDrRyZr:r+hmJGxK1J62wKxzTCi
                                            MD5:73D2820FDE6A97A6DE008099D670DE5C
                                            SHA1:DD96D80EEFEDFA18BAC33E2160220ACC3A68956A
                                            SHA-256:B995A01A1C0EDB4E6FF402BCDCCB4BE871C0433EABC0CD0C4CA0B395DA525641
                                            SHA-512:45559F6E29813448398FD78E88A6403AE2823C8B99A7CB75C594B1B02196E631C1AE5D38FDA8F848B44CDDBD20E83B3AA3FF37D42A1D109F69DB5B843438B063
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 2%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........7.R.Y.R.Y.R.Y.R.X.c.Y.0.J.Q.Y...S.E.Y...W.[.Y...R.P.Y..._.S.Y.RichR.Y.........................PE..L...b^5I...........!.....0... ...............@...............................`...............................................D..(....`.......................P.......................................................@...............................text....*.......0.................. ..`.rdata.......@.......@..............@..@.data........P.......P..............@....rsrc........`.......`..............@..@.reloc.......P.......P..............@..B........................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):127020
                                            Entropy (8bit):4.8387559460698855
                                            Encrypted:false
                                            SSDEEP:1536:YI7lY6OAGW9fFRh89KWW/7npmpVEGa8L6Wj3Muz96Dua8L6Wj3Muz96DT0:n7lY6OwlFKWdMEGa8U1ia8U1k
                                            MD5:4C65B83F9DB916B5BF17B985B669D6AF
                                            SHA1:8661FC66F622F6FF695A9E31697915B5634F486F
                                            SHA-256:BAE9EBBBF710DD55A5E8CE0C5CEB0C7DE70C0F1117052FAD3EA78C1532231515
                                            SHA-512:5C636D94BA6AF26AB78002066CA23394A3CE7DFDAE26C9FC77C5230499DD277F41D46489236C8F8CADDCFD709586FCE55DD7F427C72991BAA7D785EE07FD2571
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 2%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............._..._..._..._..._..._..._|.._..._..._..._..._..._..._..._..._.._G.._..._..._..._Rich..._........PE..L...c^5I...........!................5........................................P..........................................Z....`.......p.......................@.......................................................c...............................text...R........................... ..`.rdata..............................@..@.data....t....... ..................@....idata.......`......................@....rsrc........p......................@..@.reloc..:....@......................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 22050 Hz
                                            Category:dropped
                                            Size (bytes):42044
                                            Entropy (8bit):7.26208833033609
                                            Encrypted:false
                                            SSDEEP:768:+3yxIuPvUsUNZ93Pczrw9P3sN/nfBhhyrBikjFI6RjGnLlX:QaUZN8zrw9PO5ehC6R8BX
                                            MD5:1EDB666DB90FD25360679D364FB3CEA0
                                            SHA1:BB90B7F89A0D0D54E18D45F8705151FAE7C26D5F
                                            SHA-256:DEC7D894F9A3778F738159ABD2DF39ECA6848358A9B05FD37F74800F1DB6044E
                                            SHA-512:4F767A17E63A1D7C9E43F4D3B50A4E056468313314BFEDE481DF20C8D197F28523C1FD5D88D09BD2AE4901B514D16A96D301332D568DECC1CA15BF42652E6002
                                            Malicious:false
                                            Preview:RIFF4...WAVEfmt ........"V..D.......data....|.......~.u.p.r.z.y...s.j.h.p...~.x.x.z.|.....|.}.y.e.|.p.g.x.....m.......}.z...z.j.f.`.b.w.....w.r...}.[.f.....q.........y.d.|.o.........|.~.~.}.~.u...u.|...|.|...e.X.f.y.{...z.v.y.......|.....y...x.t.....u.k.........{.t.i.v.u.~...q.{.s.[.v.|...........t.q.......}...s.........|.t.n.s.....s.............m.q.....}.......r.}...x.y.........u.y.t.z.............{...............................~.............................w...............................~...........k.........}.|.d.{.....{.......{.[.z...{.{...u.~...y.W...........w...........".............D...,.}......@.............}.C.....:.....r...........B.....%.q...........7.............R.Z...y.............#.......d...&....=.3.|.:.......m...b.%...+.a.....`.........U.i.L.Z.n.S...J.".....+.......>.....8...e.,................M.N....... .........O.......b.F.t.......'.......%.+.....w...........p.......".....j.<.}....L..t.g.}.>..1...f.y................o.........h.i...!...P...x...}.....W...e...
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 11025 Hz
                                            Category:dropped
                                            Size (bytes):28660
                                            Entropy (8bit):6.966179955749021
                                            Encrypted:false
                                            SSDEEP:768:ay+o/ZrezCOAs8v75WZi5utFb3x58IqAgU1gt2ML3VeYK9j:ajoNY1AtUZistthChq02y3VeYKR
                                            MD5:08B2E91D036508D7B828EA9B610D8733
                                            SHA1:3E122436165634E0DC43FC95AAFB5D368702C154
                                            SHA-256:EDCD854EB01CF4013B61238055EBAC53A98198DEC2AFA0808ADD15395911C628
                                            SHA-512:D1147CA5A88DF1181277FBF1D6CB50B6CB13C5764DF5C983B6FF386FA50D93671C071DA3F8CF99CDE04FF6E1AD6B2B38F2F4F342869E015C4E6EBE822A7B0307
                                            Malicious:false
                                            Preview:RIFF.o..WAVEfmt .........+.."V......data.o......................................~.x.q.j.e.\.].^.Z.Y.V.V.S.N.M.J.E.@.>.C.B.E.G.F.H.O.Q.U.`.g.l.o.v.....................................................................|.x.l.m.d.Z.Z.W.R.R.T.S.R.R.P.N.S.O.J.H.J.C.@.@.E.H.J.O.S.].h.p.z...........................................................u.r.i.c.a.[.`.c.]._.`.`.g.d.a.d.Y.U.T.P.J.N.L.E.J.M.S.S.W.].b.f.n.s.s.w.|.........................................................~.}.|.x.q.k.e.\.T.T.L.F.A.>.@.@.>.@.C.B.F.O.P.O.S.Z.\._.b.a.d.f.m.q.r.{.}...............................................................y.r.i.d.`.].Z.X.Z.[.Z.S.T.Q.O.O.O.K.G.E.A.?.>.A.B.E.P.X.c.j.u.~.....................................................................l.Q.6.'...............o.N.9.%.+...............I...d...................)..........'.v.9.M...........U.U.Q.u."...V.Z...-...U...................=.V...V.... .". A...)...5.T.........n...?.....\............i..............M..............................R.-.l.i.s.
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
                                            Category:dropped
                                            Size (bytes):51844
                                            Entropy (8bit):6.2970672875462705
                                            Encrypted:false
                                            SSDEEP:1536:VaHtWYhgQ5EDWEzgDTkTM60Ao6ERFE506:VanHED4j6Y6ERa
                                            MD5:D2F8A0BE605DD99B9D9F3B9E103C4EC6
                                            SHA1:F0C0C0381A0FE394AE0DA8AE74853CF00AA16031
                                            SHA-256:1703443307B4DD8E2C3CFE8B97FC30D4C8C9ED38B15995623E256AD62A2D874A
                                            SHA-512:6A138A47D6CD23EBDEA11B7AD3CE9EEE8BB48C0D6BB363554B1BF4062284F1E4A5E0F0F988F0F655990CB12ADA867E9DBB29DFB91A8BC3851AB41DC83A20675F
                                            Malicious:false
                                            Preview:RIFF|...WAVEfmt ........D....X......dataX...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):5.458005410829246
                                            Encrypted:false
                                            SSDEEP:1536:kzo/SjbRojT0MEL1e0+yr7oqO8RioEkqECK:Crwsr7oqO+ioSEv
                                            MD5:F13E41B0AF9AE537B5D593216C1E81AC
                                            SHA1:EF586AEA2E946346DD4910EBC087D8DDCF698B47
                                            SHA-256:58ACB663D3D2377F71C928B1136B65D97BBBDE2F94DBEF69592CD76CDEB02324
                                            SHA-512:6EE1E93F776D99219EA03597515021422817F65D94F84AA458CCCD94AE903E4DDBAF6F5D1AC9E281E501B9DBE5FC3E72405C355E76DCF2C91AC8E7E5C29D91E1
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 2%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........C".."LM."LM."LM.>@M."LMJ>BM."LM!=FM."LM."MM."LM.=_M."LM!=GM."LMq$JM."LMRich."LM........................PE..L...d^5I.................`..........o".......p....@.........................................................................pv..<........Q...........................................................................p...............................text....].......`.................. ..`.rdata..D....p.......p..............@..@.data....-....... ..................@....rsrc....Q.......`..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):970803
                                            Entropy (8bit):6.247424026890006
                                            Encrypted:false
                                            SSDEEP:12288:5SEosu6j5Pf0bD4lyItfX4ASbVY6Io+pCiiD1L/bqh:526jZcbclyItfX/Sb6jp/iD1L/bqh
                                            MD5:28B99B73CEA225DE79B8F0A75F2B8E0B
                                            SHA1:6932C9EB4C3C02A05D1881DC3E6B17320155B68B
                                            SHA-256:DF2F15D2C67272F944E19D7E25661E8E407612B1CAAA57C3FF7AA2E8294A5BF8
                                            SHA-512:1B45B3A12E0BD2B5AD82B8853E8026D2F3B1EB15AB0EFBFFA3175CA00C08B4FA5D08E0B1C4BB080654F5C900D5321368CF93E65F01E99DA3155CA067284B7E29
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i...p...p...p...|...p...c...p..+z...p.g(t...p...~...p...q.2.p.p.z...p.p.t...p.Rich..p.........................PE..L...Z^5I...........!.....P...................`...............................@.......................................a..........................................`....`..................................................\............................text...PB.......P.................. ..`.rdata.......`.......`..............@..@.data........p.......p..............@....idata........... ..................@....reloc..1............0..............@..B........................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):5.3116807849891226
                                            Encrypted:false
                                            SSDEEP:768:93iTjD7qK4TdJlpjKNDCLV85u7omaMRio+jASXGWtVETMEu1K:hiTb4TdnpjKdUr7olMRioEkqECK
                                            MD5:310BF913306CB84845F896DFC04A4E93
                                            SHA1:3648C612239ED10D1234401682D99182FCCDF202
                                            SHA-256:F869D4D0964879F9086BEAB02270BD3F843DD82CF551C153802381567DA47A63
                                            SHA-512:01E93178A3894A4B19B0184E3B492EB697220BEDEB309848D01519D2ECBB0995CC9445E49196C73679C8AD1177B0C16D0D6F7AC5F359527B8A434A8B160B964F
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........]...3M..3M..3M..?M..3MP.=M..3M;.9M..3M..2M..3M.. M..3M;.8M..3Mk.5M..3MRich..3M........................PE..L...d^5I.................`...................p....@.........................................................................pv..<........Q...........................................................................p...............................text....Z.......`.................. ..`.rdata..D....p.......p..............@..@.data....*....... ..................@....rsrc....Q.......`..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:Generic INItialization configuration [TIP]
                                            Category:dropped
                                            Size (bytes):3630
                                            Entropy (8bit):4.600993811809027
                                            Encrypted:false
                                            SSDEEP:48:M6MSzeVpIib+YIm1iAeb7G4pV6FYDut63+hk0zUvV2LZsRtJMpslpUECgfDdEBh:3zeTrbv8O4f62p3+FzU4ZsrWpCprCBh
                                            MD5:A84703FADD0E9CC7497C4B1D6686D947
                                            SHA1:86BC1A3B3CEA6E0BAD29ABA7B389674774C74B3B
                                            SHA-256:215F7E1E29315E7680FA08B938E6503D7597EAA048B59817E4B789D6D1519D33
                                            SHA-512:E991570854E68989BBB7A39E940A901141BC1ACB4E80FB6ED2C223C5DCE9251E10B244ADEEC49FF70B4DF4BD60F2DE962A2E6D4344B290D73FD5768F9019BA5C
                                            Malicious:false
                                            Preview:....[TIP]..A click into the fields of the status bar will bring up the..corresponding configuration dialog (e.g. Devices or Emulation)..from the session profile.....[TIP]..There are various ways to quickly access your commonly used..host directory entries.....To do this, edit the host directory entry, go to the Shortcut..tab and select the options to either add the entry to the file ..menu or to the list of user buttons (below the toolbar) or to ..create an Icon on the Windows desktop.....[TIP]..With the Alt key pressed you can mark rectangular parts of the screen.....[TIP]..Did you notice that you can resize the host directory dialog?....[TIP]..If you are using Secure Shell (SSH) connections, you can transfer..files to and from the remote host by using the Zmodem file transfer..(see the help topic at the bottom of the Transfer menu).....[TIP]..You can disable devices and emulations which you do not need in..the Options, Program Settings, Subsystems dialog.....[TIP]..If you press Alt+C
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:Generic INItialization configuration [TIP]
                                            Category:dropped
                                            Size (bytes):4111
                                            Entropy (8bit):4.810490270525413
                                            Encrypted:false
                                            SSDEEP:96:dtbXSD2E7ITrsJiOEbTVwVU47aZMstLuvGK4SWjjlEM4Jlfh:dtbXSCyITrsJjTUiaZM0LuvGKijlEB
                                            MD5:25EE62102F465C9320F63940EF9E5EC5
                                            SHA1:EA3AEDB21E1FA8FF915FC59DA0E5FFB1433C619E
                                            SHA-256:CEAED39ACE911EA69D1099D35962414E22333CE3D4C91944D43D75E3CF99027F
                                            SHA-512:7C2C8B710BCEDE7179C4ABF354A1DA6BBF37243BD8FA02BC339A1992B69A4AFCFD7E10DC0DF567A91F9C31B4F220F7E5D4A764C183AB74E158158F4DE6AEB26A
                                            Malicious:false
                                            Preview:..[TIP]..Ein Klick auf die Informationsfelder in der Statuszeile .ffnet..den zugeh.rigen Konfigurationsdialog des Verbindungsprofils.....[TIP]..Es gibt einige M.glichkeiten um ohne Umweg auf Ihre h.ufig genutzen..Verbindungen zuzugreifen.....Dazu bearbeiten sie den Adressbucheintrag, gehen in das Register..Verkn.pfung und aktivieren die Optionen, um den Eintrag zum Dateimen.,..zur Leiste der Benutzerkn.pfe etc. zu erstellen.....[TIP]..Mit gedr.ckter Alt-Taste k.nnen Rechtecke am Bildschirm markiert werden.....[TIP]..Ist Ihnen aufgefallen, da. Sie die Gr..e des Adressbuchfensters..mit der Maus .ndern k.nnen?....[TIP]..Falls Sie mit Secure Shell (SSH) arbeiten, k.nnen Sie Dateien per Zmodem ..zwischen Ihrem Rechner und der Gegenstelle .bertragen. (Weitere Informationen..dazu im Hilfethema unten im Transfer-Men. des ZOC Fensters).....[TIP]..Sie k.nnen Kommunikationsmethoden (Devices) und Emulationen, die..Sie nicht ben.tigen unter Optionen, Programmeinstellungen, Subsysteme..deaktivieren
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):3514
                                            Entropy (8bit):3.8541350007044057
                                            Encrypted:false
                                            SSDEEP:96:WlzXcRCUa1nkSZJ66qecrewRK/eXSV/3/3txm:QclaVhNwew3Om
                                            MD5:12B9F511785AB1CC185EB7F34E212A98
                                            SHA1:E606E17C2D149368D39B03B6412943DDF4F92010
                                            SHA-256:2E454431B203D271129F6CFA12752D588C044152333EA8932D010196B066F58B
                                            SHA-512:50985E539D563A48FCBAA741E3FF29D1E51664F0D1EC528072D74472007D7F9EDBBBE2A1011606274D35A964D61C4E9AC47968D52FCB4FA18FBC654B626012F1
                                            Malicious:false
                                            Preview:00 = U+0000 ..01 = U+0001 ..02 = U+0002 ..03 = U+0003 ..04 = U+0004 ..05 = U+0005 ..06 = U+0006 ..07 = U+0007 ..08 = U+0008 ..09 = U+0009 ..0A = U+000A ..0B = U+000B ..0C = U+000C ..0D = U+000D ..0E = U+000E ..0F = U+000F ..10 = U+0010 ..11 = U+0011 ..12 = U+0012 ..13 = U+0013 ..14 = U+0014 ..15 = U+0015 ..16 = U+0016 ..17 = U+0017 ..18 = U+0018 ..19 = U+0019 ..1A = U+001A ..1B = U+001B ..1C = U+001C ..1D = U+001D ..1E = U+001E ..1F = U+001F ..20 = U+0020 ..21 = U+0021 ..22 = U+0022 ..23 = U+0023 ..24 = U+0024 ..25 = U+0025 ..26 = U+0026 ..27 = U+0027 ..28 = U+0028 ..29 = U+0029 ..2A = U+002A ..2B = U+002B ..2C = U+002C ..2D = U+002D ..2E = U+002E ..2F = U+002F ..30 = U+0030 ..31 = U+0031 ..32 = U+0032 ..33 = U+0033 ..34 = U+0034 ..35 = U+0035 ..36 = U+0036 ..37 = U+0037 ..38 = U+0038 ..39 = U+0039 ..3A = U+003A ..3B = U+003B ..3C = U+003C ..3D = U+003D ..3E = U+003E ..3F = U+003F ..40 = U+0040 ..41 = U+0041 ..42 = U+0042 ..43 = U+0043 ..44 = U+0044 ..45 = U+0045 ..46 = U+0046 ..47 = U
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):3570
                                            Entropy (8bit):3.8595554148402194
                                            Encrypted:false
                                            SSDEEP:96:WlzXcRCUa1nkSZJ66qecwaZp+RpRyzkK7K4pYYF:QclaVhNbaZEpn4L
                                            MD5:E0EF80BD2A19C0448C2D03F198E95394
                                            SHA1:F95C48738DB6CD1E638D7418541B1686F55810BE
                                            SHA-256:D5FA60E08163D7B92D7A26B169261EBEE1CB52E826B4BD76F9799E8399FCCE1C
                                            SHA-512:F004BEA45B81C6FDDB76D57AE40E912175B2134A3EEAC1B5E67B93DB0DE17369043DFD4020478AB8A5BDAE55990535CD1A5CD7A8AF9B45C926CAC6DC5EFE7931
                                            Malicious:false
                                            Preview:00 = U+0000 ..01 = U+0001 ..02 = U+0002 ..03 = U+0003 ..04 = U+0004 ..05 = U+0005 ..06 = U+0006 ..07 = U+0007 ..08 = U+0008 ..09 = U+0009 ..0A = U+000A ..0B = U+000B ..0C = U+000C ..0D = U+000D ..0E = U+000E ..0F = U+000F ..10 = U+0010 ..11 = U+0011 ..12 = U+0012 ..13 = U+0013 ..14 = U+0014 ..15 = U+0015 ..16 = U+0016 ..17 = U+0017 ..18 = U+0018 ..19 = U+0019 ..1A = U+001A ..1B = U+001B ..1C = U+001C ..1D = U+001D ..1E = U+001E ..1F = U+001F ..20 = U+0020 ..21 = U+0021 ..22 = U+0022 ..23 = U+0023 ..24 = U+0024 ..25 = U+0025 ..26 = U+0026 ..27 = U+0027 ..28 = U+0028 ..29 = U+0029 ..2A = U+002A ..2B = U+002B ..2C = U+002C ..2D = U+002D ..2E = U+002E ..2F = U+002F ..30 = U+0030 ..31 = U+0031 ..32 = U+0032 ..33 = U+0033 ..34 = U+0034 ..35 = U+0035 ..36 = U+0036 ..37 = U+0037 ..38 = U+0038 ..39 = U+0039 ..3A = U+003A ..3B = U+003B ..3C = U+003C ..3D = U+003D ..3E = U+003E ..3F = U+003F ..40 = U+0040 ..41 = U+0041 ..42 = U+0042 ..43 = U+0043 ..44 = U+0044 ..45 = U+0045 ..46 = U+0046 ..47 = U
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):3516
                                            Entropy (8bit):3.871423200808488
                                            Encrypted:false
                                            SSDEEP:96:skzXP3M1nkSZJ66qecsXnTwR1AH4XBc0+aH:9P8VhNfsOAN
                                            MD5:0D0778F6F5D2F8CD964D1DCFADEE9733
                                            SHA1:1DD1DC72FCC59A71C26D8689701B0FED9E409856
                                            SHA-256:91CFD135132341906777555684D3AD783E5C77A124DFE07834F8C56C88D1CBEB
                                            SHA-512:FBB2120626EAB7EE2FC3BD1989CC2DCD8567ED1F9995123D21C1ACCB03A435271CF6112C1994A407B94C9EE2154739AF578C0651D7454A5FB09AD861E0B4D22C
                                            Malicious:false
                                            Preview:00 = U+0020 ..01 = U+263A ..02 = U+263B ..03 = U+2665 ..04 = U+2666 ..05 = U+2660 ..06 = U+2663 ..07 = U+25CB ..08 = U+0008 ..09 = U+0009 ..0A = U+000A ..0B = U+000B ..0C = U+000C ..0D = U+000D ..0E = U+000E ..0F = U+000F ..10 = U+25BA ..11 = U+25C4 ..12 = U+2195 ..13 = U+203C ..14 = U+0014 ..15 = U+00A7 ..16 = U+2584 ..17 = U+21A8 ..18 = U+2191 ..19 = U+2193 ..1A = U+2192 ..1B = U+2190 ..1C = U+2514 ..1D = U+2194 ..1E = U+25B2 ..1F = U+25BC ....20 = U+0020 ..21 = U+0021 ..22 = U+0022 ..23 = U+0023 ..24 = U+0024 ..25 = U+0025 ..26 = U+0026 ..27 = U+0027 ..28 = U+0028 ..29 = U+0029 ..2A = U+002A ..2B = U+002B ..2C = U+002C ..2D = U+002D ..2E = U+002E ..2F = U+002F ..30 = U+0030 ..31 = U+0031 ..32 = U+0032 ..33 = U+0033 ..34 = U+0034 ..35 = U+0035 ..36 = U+0036 ..37 = U+0037 ..38 = U+0038 ..39 = U+0039 ..3A = U+003A ..3B = U+003B ..3C = U+003C ..3D = U+003D ..3E = U+003E ..3F = U+003F ..40 = U+0040 ..41 = U+0041 ..42 = U+0042 ..43 = U+0043 ..44 = U+0044 ..45 = U+0045 ..46 = U+0046 ..47 =
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):3346
                                            Entropy (8bit):3.871891137077453
                                            Encrypted:false
                                            SSDEEP:96:WlzXcRCUa1nkSZJ66qecsfCRhsTgMzl+GZwWy:QclaVhNfqqNBNG
                                            MD5:C23CA228AAFD6D1A155A80CB3E6D9754
                                            SHA1:E033ACB8878C651D4A52C35A04468419DA213D38
                                            SHA-256:E62C5FFFB38EBA68788E7974281884D88F28ED6EC2A68BEB8A8798BB136DC937
                                            SHA-512:346546DB4CD957F02BA1B5B4CFCAC73A3F1857E83CAE6C8353248C9C208C41C640C10DDD45106A521677FB332ECC6F5B305A4648987397772ED32AA4AF2889C9
                                            Malicious:false
                                            Preview:00 = U+0000 ..01 = U+0001 ..02 = U+0002 ..03 = U+0003 ..04 = U+0004 ..05 = U+0005 ..06 = U+0006 ..07 = U+0007 ..08 = U+0008 ..09 = U+0009 ..0A = U+000A ..0B = U+000B ..0C = U+000C ..0D = U+000D ..0E = U+000E ..0F = U+000F ..10 = U+0010 ..11 = U+0011 ..12 = U+0012 ..13 = U+0013 ..14 = U+0014 ..15 = U+0015 ..16 = U+0016 ..17 = U+0017 ..18 = U+0018 ..19 = U+0019 ..1A = U+001A ..1B = U+001B ..1C = U+001C ..1D = U+001D ..1E = U+001E ..1F = U+001F ..20 = U+0020 ..21 = U+0021 ..22 = U+0022 ..23 = U+0023 ..24 = U+0024 ..25 = U+0025 ..26 = U+0026 ..27 = U+0027 ..28 = U+0028 ..29 = U+0029 ..2A = U+002A ..2B = U+002B ..2C = U+002C ..2D = U+002D ..2E = U+002E ..2F = U+002F ..30 = U+0030 ..31 = U+0031 ..32 = U+0032 ..33 = U+0033 ..34 = U+0034 ..35 = U+0035 ..36 = U+0036 ..37 = U+0037 ..38 = U+0038 ..39 = U+0039 ..3A = U+003A ..3B = U+003B ..3C = U+003C ..3D = U+003D ..3E = U+003E ..3F = U+003F ..40 = U+0040 ..41 = U+0041 ..42 = U+0042 ..43 = U+0043 ..44 = U+0044 ..45 = U+0045 ..46 = U+0046 ..47 = U
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):3584
                                            Entropy (8bit):3.893517111310728
                                            Encrypted:false
                                            SSDEEP:96:WlzXcRCUa1nkSZJ66qec80u4xnLafeT4RHvuqKPLJ:QclaVhNx4ZsbpvufV
                                            MD5:091A27A96C313FFB7AF1099E40F13E5B
                                            SHA1:4038CBAF21CC3A8ABF05FCC80B8844468C11097F
                                            SHA-256:6FA8E1B0B6BC6BB1DDA32850BB00EEFAF87BFFF829BBDDD9A1989A8A5DA48A2D
                                            SHA-512:14C816A23CF363F513C1AC1E2DCEAB8872766A207F01926A0304E0E3737BF88BFFC03432E117611BBE69B3645692B34157596D618CD8CB79D29003EBEEC0EBEC
                                            Malicious:false
                                            Preview:00 = U+0000 ..01 = U+0001 ..02 = U+0002 ..03 = U+0003 ..04 = U+0004 ..05 = U+0005 ..06 = U+0006 ..07 = U+0007 ..08 = U+0008 ..09 = U+0009 ..0A = U+000A ..0B = U+000B ..0C = U+000C ..0D = U+000D ..0E = U+000E ..0F = U+000F ..10 = U+0010 ..11 = U+0011 ..12 = U+0012 ..13 = U+0013 ..14 = U+0014 ..15 = U+0015 ..16 = U+0016 ..17 = U+0017 ..18 = U+0018 ..19 = U+0019 ..1A = U+001A ..1B = U+001B ..1C = U+001C ..1D = U+001D ..1E = U+001E ..1F = U+001F ..20 = U+0020 ..21 = U+0021 ..22 = U+0022 ..23 = U+0023 ..24 = U+0024 ..25 = U+0025 ..26 = U+0026 ..27 = U+0027 ..28 = U+0028 ..29 = U+0029 ..2A = U+002A ..2B = U+002B ..2C = U+002C ..2D = U+002D ..2E = U+002E ..2F = U+002F ..30 = U+0030 ..31 = U+0031 ..32 = U+0032 ..33 = U+0033 ..34 = U+0034 ..35 = U+0035 ..36 = U+0036 ..37 = U+0037 ..38 = U+0038 ..39 = U+0039 ..3A = U+003A ..3B = U+003B ..3C = U+003C ..3D = U+003D ..3E = U+003E ..3F = U+003F ..40 = U+0040 ..41 = U+0041 ..42 = U+0042 ..43 = U+0043 ..44 = U+0044 ..45 = U+0045 ..46 = U+0046 ..47 = U
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):9875
                                            Entropy (8bit):4.726104058969953
                                            Encrypted:false
                                            SSDEEP:192:6K6zkmcIZ3h9Xhz3/y9Xfteq7/JrhNa/ZCzPOYJs1jt:47cU3bX13/2ftPJN8/PYa
                                            MD5:3EF08BF1102CE7D716F76ABF21B23A15
                                            SHA1:FEBF6E505706AADF89624398719B315B2A074D94
                                            SHA-256:B00B8F90682D829D0D3C2344F9AF3E685C9A82B0CAC2F38636F354FF7078A0A1
                                            SHA-512:4DD83532012413EBC5557ED4FFBEC96CABD20F70EF2947F0A25F6E2DC820B33186C63A64F55D42632CF3CD14F67E5CC4BC7875454461D8950B1F7F099E1CFC56
                                            Malicious:false
                                            Preview:// Microsoft Windows OEM Codepage : 737 (Greek)....00 = U+0000 : NULL..01 = U+0001 : START OF HEADING..02 = U+0002 : START OF TEXT..03 = U+0003 : END OF TEXT..04 = U+0004 : END OF TRANSMISSION..05 = U+0005 : ENQUIRY..06 = U+0006 : ACKNOWLEDGE..07 = U+0007 : BELL..08 = U+0008 : BACKSPACE..09 = U+0009 : HORIZONTAL TABULATION..0A = U+000A : LINE FEED..0B = U+000B : VERTICAL TABULATION..0C = U+000C : FORM FEED..0D = U+000D : CARRIAGE RETURN..0E = U+000E : SHIFT OUT..0F = U+000F : SHIFT IN..10 = U+0010 : DATA LINK ESCAPE..11 = U+0011 : DEVICE CONTROL ONE..12 = U+0012 : DEVICE CONTROL TWO..13 = U+0013 : DEVICE CONTROL THREE..14 = U+0014 : DEVICE CONTROL FOUR..15 = U+0015 : NEGATIVE ACKNOWLEDGE..16 = U+0016 : SYNCHRONOUS IDLE..17 = U+0017 : END OF TRANSMISSION BLOCK..18 = U+0018 : CANCEL..19 = U+0019 : END OF MEDIUM..1A = U+001A : SUBSTITUTE..1B = U+001B : ESCAPE..1C = U+001C : FILE SEPARATOR..1D = U+001D : GROUP SEPARATOR..1E = U+001E : RECORD SEPARATOR..1F = U+001F : UNIT SEPARATOR..20 = U+
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):10957
                                            Entropy (8bit):4.816792809535233
                                            Encrypted:false
                                            SSDEEP:96:pLsKiAOtZRoql8rBox2/ZW9ZnZ/kUpszwT/V192d/Wb8ZSfoHNkvj2MKddCXIcUb:SKiDZYiRZ1zppTdCnG9iaPphqX4k
                                            MD5:5328995808A4CE2222C03187AE4A4FC2
                                            SHA1:2C6AE631E1F57E15690F69E4E511CFFCD7DC1FEF
                                            SHA-256:BED56B0FBC91965284B743C1EE1CBA15015CCAE1E338374D17BA6DA3FA18C19D
                                            SHA-512:931C2398964A12AC4A8553853842A5761C644A8B8A2ABDEBDA6D8027C909A96331ADDE3119159117EECE71BDB3572C8275118EC24FA823DD1F17C324F961D5A6
                                            Malicious:false
                                            Preview:00 = U+0000 : NULL<br>..01 = U+0001 : START OF HEADING<br>..02 = U+0002 : START OF TEXT<br>..03 = U+0003 : END OF TEXT<br>..04 = U+0004 : END OF TRANSMISSION<br>..05 = U+0005 : ENQUIRY<br>..06 = U+0006 : ACKNOWLEDGE<br>..07 = U+0007 : BELL<br>..08 = U+0008 : BACKSPACE<br>..09 = U+0009 : HORIZONTAL TABULATION<br>..0A = U+000A : LINE FEED<br>..0B = U+000B : VERTICAL TABULATION<br>..0C = U+000C : FORM FEED<br>..0D = U+000D : CARRIAGE RETURN<br>..0E = U+000E : SHIFT OUT<br>..0F = U+000F : SHIFT IN<br>..10 = U+0010 : DATA LINK ESCAPE<br>..11 = U+0011 : DEVICE CONTROL ONE<br>..12 = U+0012 : DEVICE CONTROL TWO<br>..13 = U+0013 : DEVICE CONTROL THREE<br>..14 = U+0014 : DEVICE CONTROL FOUR<br>..15 = U+0015 : NEGATIVE ACKNOWLEDGE<br>..16 = U+0016 : SYNCHRONOUS IDLE<br>..17 = U+0017 : END OF TRANSMISSION BLOCK<br>..18 = U+0018 : CANCEL<br>..19 = U+0019 : END OF MEDIUM<br>..1A = U+001A : SUBSTITUTE<br>..1B = U+001B : ESCAPE<br>..1C = U+001C : FILE SEPARATOR<br>..1D = U+001D : GROUP SEPARATOR<br>..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):9789
                                            Entropy (8bit):4.720534418441563
                                            Encrypted:false
                                            SSDEEP:192:VK6zkmcIZ3h9Xhz3/l8EUX4JrhNa/ZCzPMJy:J7cU3bX13/lTJN8/rJy
                                            MD5:6C1E007E838269CA78EA5D60177086DD
                                            SHA1:5E484799619C710E15FD26BA2B0370871A231C0F
                                            SHA-256:36F921F6C8CB8E0C1BA76F8FBA5E641764B01A4CF9FABAAC476ECA3633D57582
                                            SHA-512:5908A1AAFEDAF737FD4282B065006CBDC8BBFA0AFF7FE52C9ADA93FE011AA8A0E31078CC1910BF5AF3A5992AA9C2CF76EE56F381432056F3720FA234099545B2
                                            Malicious:false
                                            Preview:// Microsoft Windows OEM Codepage : 866 (Russian)</h2>....00 = U+0000 : NULL..01 = U+0001 : START OF HEADING..02 = U+0002 : START OF TEXT..03 = U+0003 : END OF TEXT..04 = U+0004 : END OF TRANSMISSION..05 = U+0005 : ENQUIRY..06 = U+0006 : ACKNOWLEDGE..07 = U+0007 : BELL..08 = U+0008 : BACKSPACE..09 = U+0009 : HORIZONTAL TABULATION..0A = U+000A : LINE FEED..0B = U+000B : VERTICAL TABULATION..0C = U+000C : FORM FEED..0D = U+000D : CARRIAGE RETURN..0E = U+000E : SHIFT OUT..0F = U+000F : SHIFT IN..10 = U+0010 : DATA LINK ESCAPE..11 = U+0011 : DEVICE CONTROL ONE..12 = U+0012 : DEVICE CONTROL TWO..13 = U+0013 : DEVICE CONTROL THREE..14 = U+0014 : DEVICE CONTROL FOUR..15 = U+0015 : NEGATIVE ACKNOWLEDGE..16 = U+0016 : SYNCHRONOUS IDLE..17 = U+0017 : END OF TRANSMISSION BLOCK..18 = U+0018 : CANCEL..19 = U+0019 : END OF MEDIUM..1A = U+001A : SUBSTITUTE..1B = U+001B : ESCAPE..1C = U+001C : FILE SEPARATOR..1D = U+001D : GROUP SEPARATOR..1E = U+001E : RECORD SEPARATOR..1F = U+001F : UNIT SEPARATOR..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):45102
                                            Entropy (8bit):3.4832637065587106
                                            Encrypted:false
                                            SSDEEP:384:RP6hm2D1b3G94Ths//tCGbfECslNCXkBEzwZoUr6:etD1C9DP0cUmwZoUr6
                                            MD5:29E303CA575C688CEA7603E35E0DCA93
                                            SHA1:BD6530D9FF511B0BCE6CC3F7F3B4441E50E01E4D
                                            SHA-256:D959C3BA4F84897B263B755A24C25AF0C6702CE7FA4135589A39A3A747750D82
                                            SHA-512:A913EC2785726D285D794A7013818C0AFB46E7D53EAF55923138FD33C6D81353023B50657BD7DDD6224CE58347F7D314086EF5C4FFEB8B6BE27DF0640AEB8372
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 2%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.X...6...6...6.x.:...6.a.%...6...<...6...2...6...7. .6...=...6...0...6...2...6.Rich..6.................PE..L...`^5I...........!.....P...P.......B.......`.......................................................................a..t.......x.......I............................`.................................................|............................text...0D.......P.................. ..`.rdata..T....`.......`..............@..@.data...|....p.......p..............@....idata..............................@....rsrc...I...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):45108
                                            Entropy (8bit):3.6480363262967668
                                            Encrypted:false
                                            SSDEEP:384:LkE+UcvSzoNfOr6DLd/Rl9NqzUUuQ2XkBUFflzos+zK:L0UcvDNWr6Dbl9UznunkB4sB2
                                            MD5:7079D6CB2CDC274F0C2F514AE039C780
                                            SHA1:46C2741917D613EAD7246A99DF35230EA6DA8A09
                                            SHA-256:7767E1AE7F5C12B27CD25ADB6BAC8424DF7245AEE7E0341D2EDD815DCDE1E676
                                            SHA-512:8309C0139E88FC49E545E677C91E8E9578A479FACF6B4FAEF2C15B71C24F209EAC1DA39C88390CD37E205AE2E08BB04BDAD53544FF16694DB8BC8F80A49FCB8C
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 2%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............e...e...e...z..e...y..e..xy..e...F...e...E...e...e...e...z...e..Cc...e...z...e..Rich.e..........................PE..L...a^5I...........!.....P...`.......>.......`.......................................................................a..x.......d....................................`...............................................................................text....@.......P.................. ..`.rdata..X....`.......`..............@..@.data...`....p.......p..............@....idata..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):65580
                                            Entropy (8bit):4.668020247244705
                                            Encrypted:false
                                            SSDEEP:768:HYSZ+iOMJXDTr2iiTvCjXizWu7UbEjdmVObNhBpA+n7NX5:PZyIavCjS17UbrObNhBpA+n5p
                                            MD5:C75D57916A02C9229FEC61ACCEE07BAC
                                            SHA1:9A6906A44A79B0E899416130D37465F3031A3F2E
                                            SHA-256:DD3B59BBF6083AAD48AA5532A122479DCC1FAC738FFEC684618B6F8C099F8A2D
                                            SHA-512:31E976D4D5FE2C3DF85FF5E8C6B59303ED2B5700AE9A750BD4B3A466BD3F38D0E12A2109DB9D49EB28A9C850C564FFA846061FBBF41259F997FA6C53C493BAB7
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$................................0............L............[.............[......Rich....................PE..L...a^5I...........!................5z.......................................0..........................................s.......d.......9.................... ..h....................................................................................text....{.......................... ..`.rdata..S...........................@..@.data....I....... ..................@....idata..............................@....rsrc...9........ ..................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):286720
                                            Entropy (8bit):6.560323791094061
                                            Encrypted:false
                                            SSDEEP:6144:1VtILNxAC/UveJ7Cp6b555kUnEwjWp/anXX:14LNyC/UCU6b55yUnE1RaX
                                            MD5:D32EED4AAB334A215B2AD11FA067F0C2
                                            SHA1:BA69464CFC72A44C7EFD98A911967F5B201E0276
                                            SHA-256:86E9DCF2B8DC7CD40B23112A75A9EBA3EB8CCF7781836FFE76E45E3BC55BF60F
                                            SHA-512:2B2835ED612A8C725CF26C32837165A90DB9F824321FF4790872A58F7E7C47860CC85E8AD9AC4A2B74BE9D679B210245AB4AE9B67AE5E2BC40CAAF737547B535
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6..r..r..r.....p.....b.....u..r..h....u..t..v..r..]....q....a....|....s..Richr..................PE..L...tW!I...........!.................c.......................................................................................................................`...)...................................................................................text............................... ..`.rdata...).......0..................@..@.data...d........P..................@....reloc...0...`...@... ..............@..B................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):193976
                                            Entropy (8bit):5.053087055174888
                                            Encrypted:false
                                            SSDEEP:3072:ZGa8U1ia8U1rQP54cV+PgZ5a8U1w+24oqNvjiJH3D2n1YN:BDLDcP5SDw+24oqNGJH3Dp
                                            MD5:509F8FB9D88C297B45F8B8DFF664FF87
                                            SHA1:CBAD39989790CF2233E526790EBCC2B75756BC9A
                                            SHA-256:9180FFF5B288505046BB88526723DB0FA978DAC3A2ECC57913C9B0825ED50A21
                                            SHA-512:29220F72B64328544B7266DE957084EE559E300C696CB7EE659E9D592E83AD155B16841EFEFE02DF42721CCB09B706EA69710E2E1B4BD4785873D5EB7BC11AAD
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................................h...................................S.......Rich............PE..L...g^5I..................................... ....@..................................c...............@....................... ..d....@............................................................................... ..t............................text...|........................... ..`.rdata....... ....... ..............@..@.data...<....0.......0..............@....rsrc........@.......@..............@..@................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):2240549
                                            Entropy (8bit):5.452693957934987
                                            Encrypted:false
                                            SSDEEP:49152:3XumpHM+yDFPZnSgp8Iz5d5doXYR7f2r/gj4DUT35T:3+mpHM+yDdp8Iz5d5doXYR7f2r/gj441
                                            MD5:99AD2698701C8AC1320867F304C00CE6
                                            SHA1:ED8F982439ADF8D9783F2D65C6A992FA887222DD
                                            SHA-256:D38D7E7A7F124AA2387977C6874632883A4C51D576BD6E3A73DF6EA8EE9CD2F7
                                            SHA-512:1F36D02EEF90C4C77FBC685877006B54F78248D47FECD9FC4275F6561901A6602E01EB6277354648F7F79B162FCBB5EE328590EEDF5E193FC71082D1DCDAC134
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......X.`..m...m...m...m...m..gq...m..~r...m..q...m...N..bm...M...m...m..o...r..+m..k...m...r...m..Rich.m..........................PE..L...f^5I...........!......... ...............................................0#.....................................0...v............ ...+...................P".....................................................4...0............................text...M........................... ..`.rdata..............................@..@.data...H...........................@....idata...l.......p..................@....rsrc....+... ...0... ..............@..@.reloc..;....P"......P!.............@..B................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):145
                                            Entropy (8bit):5.12116922861803
                                            Encrypted:false
                                            SSDEEP:3:ezEzmWXkRL405mOAL4rYQJIADFXHiLpvZR6YfwSV5w0n:e2/XkRL405mJ4r9JfDFXIvZRr95w0n
                                            MD5:48696193DC0EE3ED4980633C17E2BCD6
                                            SHA1:BD360013F10CC3CF40B1B5BCC800A2B295BBB23C
                                            SHA-256:F7F91D3DD3821F2D65C2013ADF7CD711BF6007C650B8F5CF77813D746518EBD8
                                            SHA-512:183C39DDB0E1901285F4F1E95524BC4A124C0C37983E5C5907F582E1278D86C60E08E9970B03C4EBC19CFA6BAAC1ACF4BF98B6569F4392DEEB02CB2DAAAD2024
                                            Malicious:false
                                            Preview:[FE].Name=ZOC Installation.ZipSize=3036850.Exec=.\setup.exe.DefaultPath=$temp$\~emtec~354033.Intro=.URL=.Author=..AutoExtract=1.Delete=1.NoGUI=1.
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):195
                                            Entropy (8bit):5.0515146867470575
                                            Encrypted:false
                                            SSDEEP:3:mbXsW2BoKGLT0GKIiEJYMQ5KdDA22c2xHV+P/3BAIJhyIFovpKhV6PIiceVAWcv:EcW2BXGvCoJMQTPZtjpypSpir2v
                                            MD5:1A069926B914F82F11423FAD97B14CC0
                                            SHA1:6ABDF40E4E77A79C9E4FA4EAAB73ED1A813692FD
                                            SHA-256:11078408D33EC708C18A8D346D3CF9779C830B119F223534752A67B0A13830DF
                                            SHA-512:2D86ECEFE54CA66F1D4C3742E479C17C97C877AECA7A1D73A79AE16DB2A2B06CE5EA03E56502CA5B96FDDB53CCC680A8EA9FFC47FFF760F76E3B349008443305
                                            Malicious:false
                                            Preview:ZOC 5.0 - 32bit Telnet, SSH, Modem and ISDN..comm. application for Windows 9x/ME/NT/2000/XP...Outstanding GUI, solid VT220 and Zmodem, powerful ..scripting, countless options and many features...
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
                                            File Type:ISO-8859 text, with very long lines (316), with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):945
                                            Entropy (8bit):4.816120057098652
                                            Encrypted:false
                                            SSDEEP:24:kUWJSELiTnam2f93rbivK5PpaNWTqyaeYLUkn:kUWJxm2f93r2upQ0CTn
                                            MD5:4D455C67B52A40D32AEBA2012941B1B4
                                            SHA1:709765E8B70C6C1F34EF11941CD1DA6812B77626
                                            SHA-256:4F86C2BB0F72392081BEEA4EA03A51511A74966A1AE3B84BE7A3BE1F91925C3D
                                            SHA-512:B50AFE0013F500A582798A4AA1744985769A16CC421503EAB005D4BF95B1E007552160CF170040474E81A872C48DB311CD5FB48987C4B6A92465685862B74E5A
                                            Malicious:false
                                            Preview:Product=PyroTrans....Teaser1.German=Suchen Sie ein Dateitransfer Tool?..Teaser2.German=Dann sollten Sie unbedingt unser Programm PyroTrans testen!..Description.German=PyroTrans dient dazu per Modem, ISDN oder Internet Dateien automatisiert (z.B. im Rahmen von Warenwirtschaftssystemen) oder manuell (z.B. Au.endienst) zu .bertragen.\r\n\r\nPyroTrans unterst.tzt automatische Kompression und Verschl.sselung der .bertragenen Daten. 30 Tage Testversion mit Support!..Url.German=http://www.emtec.com/pyrotrans/index.htm....Teaser1.English=Do you need a file transfer tool?..Teaser2.English=Then you should definitely test our product PyroTrans!..Description.English=PyroTrans is a program package that allows automated and manual file transfer over Modem, ISDN and the internet.\r\n\r\nIt is a great solution to transfer data between a company headquarter and branch offices or field staff...Url.English=http://www.emtec.com/pyrotrans/index.html..
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):13
                                            Entropy (8bit):3.2389012566026314
                                            Encrypted:false
                                            SSDEEP:3:d2pcn:d2pcn
                                            MD5:42D25632DD6D3DC322823A52E533958C
                                            SHA1:7F63A6C3A2AC5B2971F64F127C769D7E5EE2C236
                                            SHA-256:3192442BC78F91C7ABAA7AB84DDBEBA9F35FC197001886FFEB58A4712EBA938E
                                            SHA-512:5E6ACEDFCEB06D38316074AB62ACCA28A5D400F46337E0904D99E828B9AF713F38268AF2F59D40382CA824EE331B20FD437D7D83B4E18913140A939DFDDC8680
                                            Malicious:false
                                            Preview:/LANG:ENGL ..
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
                                            File Type:ISO-8859 text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):4242
                                            Entropy (8bit):5.493963837193557
                                            Encrypted:false
                                            SSDEEP:96:Vyhx3JoX7i6IjmhgIqeXZ84Z1Clxh/7Sh:Vyh5qIjaqe/mxFi
                                            MD5:68C45D1D1E6AB31BB71BD8D6B2656CB7
                                            SHA1:E0906AB53D25C18054C2C970EA3E4BE07C0D528C
                                            SHA-256:7BFBE6CBD814C2F6A9EE211DEB8FD521DC224E1D34594465E033E015AB6520D2
                                            SHA-512:B27A6817B9A60939C4B4DA8F30AD82616CD01C28298F6A8AB9C1A2677D9E5A572EAB9959FB121750192115B609D6717D4C9FE67973D7DE8820A2B5E710CC4D71
                                            Malicious:false
                                            Preview://..// ZOC V5 install script..//..AppName=ZOC..AppVersion=5.12..Advertise=advertise_pyrotrans.cfg..IdIcon=100..IniKey=ZOC5....InstallPath=ZOC5..UninstallIcon=ZOC.exe..StartMenuUninstall=1....CopyToDest=Setup.exe||SetupEnglish.Dll|SetupGerman.Dll|lizenz.txt|license.txt....DeleteAfterExtract=Develop.doc|Versions.doc|Problems.doc|Isdn.doc|Register.doc|Features.doc|Readme.doc|..DeleteAfterExtract_2=emucept.dll|xfrcept.dll|xfrcis.dll|megadodo.dll....ProtectedFiles=*.zrx|*.zky|*.zfg|*.ztb|*.ztr|*.zoc|phonebk|standard.cfg|*.ini|newuserprofile/*....AskOverwrite=....//..// English..//..WelcomeMsg.English=You are about to install ZOC - a powerful terminal emulator for Windows...FinishMsg.English=Now please start ZOC from the start menu. After starting the program, select Quick Start Guides from the Help menu.....StartmenuName.English=ZOC Terminal 5.1..StartmenuOpts.English=ZOC V5;*Zoc.exe|Readme;Readme.txt|Order ZOC;Order.exe|..StartmenuOpts_2.English=Feature List;Features.txt|Order Info;Registe
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):632248
                                            Entropy (8bit):6.449097954904934
                                            Encrypted:false
                                            SSDEEP:6144:1AnAlC5W1ZUfb3OZFpMwDZi2aZW2ENFsypo4xhTGjL1bEfNMDUqTWlpb225NPaoz:1uw8b3OZ3zloWTHgNgFM6b2eUA/
                                            MD5:51F4C23DB5D7F30E4F2B50AED1851339
                                            SHA1:43D30BB2CB683CED13BDE7B95976F0562EDF77AC
                                            SHA-256:9EC8FD7D1C01783F653A49BFA885B0A2DC9882BD068FD5F4A8489A0216635F11
                                            SHA-512:9E04389378D34E87CAB0C5FC67E719BC45C991CF02AD149C908FD3B816CE235D0AC6AC5E2E493671D1F60000B6FC3D4D03DA5740F7D9A4600EB4F884CD6A58FF
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 2%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........<...RQ..RQ..RQ.(/Q..RQV..Q..RQ.*,Q..RQV.2Q..RQ..SQ..RQV..Q..RQ.(?Q\.RQ.(<Q..RQ.(.Q..RQ.(*Q..RQRich..RQ........................PE..L......I.................0...........f.......@....@..................................r...............................................@..............................pE...............................B..@............@..t............................text...!%.......0.................. ..`.rdata...x...@.......@..............@..@.data....{.......@..................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
                                            File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                            Category:dropped
                                            Size (bytes):2675963
                                            Entropy (8bit):7.997487616975496
                                            Encrypted:true
                                            SSDEEP:49152:2h++BnIgUSaW2QVRoAKfpxxjTmgl8GS55UnxM5cZaYAEgtUfIFzHAIhyIpg2ikJg:2gKIA8Q/RKfpXTB8J5inxM5E+5WIhyII
                                            MD5:FFE4ECFAC22C616DAC175E77CF4FF9F2
                                            SHA1:527E616306C4948929EF9F57B082C622FBF70F80
                                            SHA-256:D2E26BEF94580AD8A32284B598B69624148B5ECB69D91066F12D07CD6C8B64BA
                                            SHA-512:CA06DB3A0E587CE806428C606CB2109C8A9D8A94FFAEBF629B5F901EA15DC42050D8AA99461B4963261DB4EF93A70B228DD452101CD4C6A91B30A86DFDA2BDA8
                                            Malicious:false
                                            Preview:PK...........9oE.+D...........admin$$$.ini.V]o.9.}...`!E...l.}..C6$J.A...]...x..`OmO...{.....m7..x|.|.9...EfM......uB.km..N....Z.u....w..+.aW.r.Z.,hk.F......]:..^...2...,K.....5.-._I.r....../*..z..~?......#_.B6...;[...I....=.\..V.l...8...R..t&..u.P@...re.....uUY...*Xb..y...2A.?:..[.q.........Lt...c..-s.z}..N......L.....ty..<.~j7.h....:.=..~.=N.r..H...a'.6..>.k#.........Dg...\A..F..N......].q...`I.p&.s..06.......MY.B.@.)I8J.GD.Fm((pa.5..J...A.u.... ......X(.LFQ.A...{.t..@.l<3i(.S..........kY.9#aP......a.X.H0?.o,.(.t.@D.S.Q.......E>.Mw.-a...-9.w.....l....<.....|P...o@... l...j..v.8....`cJ..%.]..t..@T..y..........-..9[.}Z.....(..)P.n..,H.M..7.j?...G0..m..O.$..I<...........%q.u..yR:.T/RhO.SJs....8..`......D%PY9..5.>.. ..K'.)K.....Q....Q9.&,.B...s..,....Xbs[.. r..h........C.....!.C...H.,...s..t..j...N.3..p.....Y......i...u....O..?.yp).r...\..B.t....x..y...-.;...x-.?.vOl..c.f....D../.0.h....@...RcCQ..a.W.d)Br5...^...$..~._l.....#.O.Ib..!.4.W.
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):98304
                                            Entropy (8bit):4.596786790402431
                                            Encrypted:false
                                            SSDEEP:1536:FnoitMmU499/Mh9muec5Dnz9hwY3JbScGPaVLHO4:p7tO4WmYzbwY3FnGPaU4
                                            MD5:0AD002F80572C02A9F746E8420D8084F
                                            SHA1:AF1921A44FDBE9A2E640782B38CF49B4B19C6B5A
                                            SHA-256:5D3A66975C924437CFCFD75F4D5129C17BFAC8917BD58D5620D92718F556B662
                                            SHA-512:38AC70A30AA67948CC59B0B0410056F59FDA18E3928A1BB6A9CE5197ACE30B31C10228F7F138B3632825C2F3B4F01B912C4C572A6DEAE884EFBB65BD5571A00E
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........-T.L:..L:..L:...F..L:...B..L:.Rich.L:.........PE..L....z.I...........!.........p...........................................................................................................^...................p.......................................................................................rsrc....^.......`..................@..@.reloc.......p.......p..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):102400
                                            Entropy (8bit):4.445942285482228
                                            Encrypted:false
                                            SSDEEP:3072:u+7tO4R3odQuMV/ejSX7p99mymYzbwY3FnGPhREP7jdIMrbMKiwssMSIcrqQGvX5:xpbp1T31GP
                                            MD5:360E58DD2B63F5C097E228268272349C
                                            SHA1:A1EA8CECC3155227B89B0001D3EB8730D2906A64
                                            SHA-256:F1A99F390734DE85EF6FF7ED8A50A6BB268BA7A07D781E837743883695B36226
                                            SHA-512:465084056F9F08F0589D11D1A7A1F92D580CF84A582F7F39DFD2D7321124C4F7349DDB319BD9747AC7ACC13644D6C35A5CA2076D994494B1784BE647D273A7E0
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........-T.L:..L:..L:...F..L:...B..L:.Rich.L:.........PE..L....z.I...........!....................................................................................................................x`...........................................................................................................rsrc...x`.......p..................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Tue Apr 23 19:27:09 2024, mtime=Tue Apr 23 19:27:09 2024, atime=Tue Dec 2 14:12:32 2008, length=1443, window=hide
                                            Category:dropped
                                            Size (bytes):1113
                                            Entropy (8bit):4.60053670214484
                                            Encrypted:false
                                            SSDEEP:24:8vzhEEHdOEfKkju3qtsAuiAwM9xdtS3OdtFoUUnqrqygm:8vzdHdOWjueruV9xdtS3OdtF9Cyg
                                            MD5:80736754FA7D4A8383B8BC321DC8769A
                                            SHA1:74056A0CB2FD9CAFB8A265E7C0385AEF8437A0F4
                                            SHA-256:4163684A66D8CC9C8CFEEB5F2709BCE7138824C0841F0846F7E9F247121C1EBE
                                            SHA-512:1EB8C6E8F21E5BC3FCB0FBB258315FEB6BEDB10962A78E7F5F01C6C16ADE2EB4FF5B5DA58ECA08CC93B8EC56DD103992473426416406EE2EA357AC7C48D0E316
                                            Malicious:false
                                            Preview:L..................F.... ....F......V..........e.T..........................w....P.O. .:i.....+00.../C:\.....................1......Xe...PROGRA~2.........O.I.Xe.....................V.....B.*.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....N.1......Xg...ZOC5..:......Xe..Xg...........................p2..Z.O.C.5.....b.2......9.y .Develop.txt.H......Xe..Xe.....H.........................D.e.v.e.l.o.p...t.x.t.......V...............-.......U............2.[.....C:\Program Files (x86)\ZOC5\Develop.txt....D.e.v.e.l.o.p.e.r.s. .R.e.a.d.m.e.?.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.\.D.e.v.e.l.o.p...t.x.t...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.........*................@Z|...K.J.........`.......X.......549163...........hT..CrF.f4... ..2=.b...,...W..hT..CrF.f4... ..2=.b...,...W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Tue Apr 23 19:27:11 2024, mtime=Tue Apr 23 19:27:11 2024, atime=Tue Dec 2 14:12:32 2008, length=2241, window=hide
                                            Category:dropped
                                            Size (bytes):1110
                                            Entropy (8bit):4.6034484806113944
                                            Encrypted:false
                                            SSDEEP:24:8Vk4/khhEEHdOEfKkjPyA7dqdthLdtFoUUnqDqygm:8VkykhdHdOWjPR7dqdt9dtF9ayg
                                            MD5:B0783BED4BF6F194DE61C4C5908E2E40
                                            SHA1:6E82B648065BDAF5F93AE293A87C304D75E1F13F
                                            SHA-256:DD7F0702426D927C9B74536E781D9D3ED8D83852C487D99B60CD2733F60B48EF
                                            SHA-512:DFC970B15D6BBABC87E22E0E6ADDA295B66737BD608D4CBD31E18FD55F83E18A1FEE9D6D406D8BF0B18658D9A93E64E94A401565BEBF335C05D3200175823CB9
                                            Malicious:false
                                            Preview:L..................F.... ..................e.T..........................{....P.O. .:i.....+00.../C:\.....................1......Xe...PROGRA~2.........O.I.Xe.....................V.....B.*.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....N.1......Xg...ZOC5..:......Xe..Xg...........................p2..Z.O.C.5.....f.2......9.y .Features.txt..J......Xf..Xf...............................F.e.a.t.u.r.e.s...t.x.t.......W...............-.......V............2.[.....C:\Program Files (x86)\ZOC5\Features.txt....F.e.a.t.u.r.e. .L.i.s.t.@.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.\.F.e.a.t.u.r.e.s...t.x.t...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.........*................@Z|...K.J.........`.......X.......549163...........hT..CrF.f4... ..2=.b...,...W..hT..CrF.f4... ..2=.b...,...W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:Generic INItialization configuration [InternetShortcut]
                                            Category:dropped
                                            Size (bytes):110
                                            Entropy (8bit):4.673677798013546
                                            Encrypted:false
                                            SSDEEP:3:J25YdimVVG/VClAWMtqRAbABGQEZag0S4jAGyGyn:J254vVG/4xtOFJQgr48Gynn
                                            MD5:6CB3E336D452A00ED1EE66A8886AAB21
                                            SHA1:96AD0F7E342A722E9AE3749DA30B995F0D6BACBA
                                            SHA-256:C130FC959C7B75B2D84BD4C5DC7CFC340DB4F5E9DCD1792513B17D7178A0783F
                                            SHA-512:F2BAE454150217334E1566D15C46D849EF55DCFAE3B50FEF6BD42AF8EFA4F8B1005E4E8579D4EC020FDB85D8D99BADF1F865E4E7F0C39EDB15C92B73AC5E7B31
                                            Malicious:false
                                            Preview:[{000214A0-0000-0000-C000-000000000046}]..Prop3=19,2..[InternetShortcut]..IDList=..URL=http://www.emtec.com/..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:Generic INItialization configuration [InternetShortcut]
                                            Category:dropped
                                            Size (bytes):124
                                            Entropy (8bit):4.835334506388458
                                            Encrypted:false
                                            SSDEEP:3:J25YdimVVG/VClAWMtqRAbABGQEZag0S4jAGyGO/vn:J254vVG/4xtOFJQgr48Gyh/v
                                            MD5:FA75E6151DC036CFD990FC017EF0455F
                                            SHA1:2CC2510A963C07688D5B27778AF8CC435CDD39F2
                                            SHA-256:E6FADD46EEEED71D8742881A7DFD53489C0EF3869AEA87246A3BA45755663D2F
                                            SHA-512:9BA6E444964A307A5ACA017FA23E8B27D39E928C1623CA879B652A62AE2E7294FFCF1E44499C6463BE2D97F4E057ED02E69783D86BBC369941EC740A81EC4985
                                            Malicious:false
                                            Preview:[{000214A0-0000-0000-C000-000000000046}]..Prop3=19,2..[InternetShortcut]..IDList=..URL=http://www.emtec.com/zoc/index.html..
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Tue Apr 23 19:27:12 2024, mtime=Tue Apr 23 19:27:12 2024, atime=Tue Dec 2 14:12:32 2008, length=1989, window=hide
                                            Category:dropped
                                            Size (bytes):1106
                                            Entropy (8bit):4.601181314073569
                                            Encrypted:false
                                            SSDEEP:24:83hEEHdOEfKkjSXjjyA7dX2DJdtTPdtFoUUnqXqygm:83dHdOWjkPR7V2DJdtzdtF9+yg
                                            MD5:8EBC3AC48A8DD3BACBD8126350D21D57
                                            SHA1:3D8B588223C3EBCD33D610F6FB5BFA3BEE81FA38
                                            SHA-256:FBB635938939F6BC519B2D2093E30DBA9BB38EE5D031A84BD3E3303EDFFDBD29
                                            SHA-512:3DA5A7E1FCB3FC06728123C7730469EEA8BF083EF7A47C9163218312C0E003BF5C581A777E243C3A55FFE489B457F1A941CF652CDFFCBB6B22D1D640FDF1B92E
                                            Malicious:false
                                            Preview:L..................F.... ..._.S....._.S........e.T..........................{....P.O. .:i.....+00.../C:\.....................1......Xe...PROGRA~2.........O.I.Xe.....................V.....B.*.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....N.1......Xg...ZOC5..:......Xe..Xg...........................p2..Z.O.C.5.....f.2......9.y .Register.txt..J......Xg..Xg......B........................R.e.g.i.s.t.e.r...t.x.t.......W...............-.......V............2.[.....C:\Program Files (x86)\ZOC5\Register.txt....O.r.d.e.r. .I.n.f.o.@.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.\.R.e.g.i.s.t.e.r...t.x.t...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.........*................@Z|...K.J.........`.......X.......549163...........hT..CrF.f4... ..2=.b...,...W..hT..CrF.f4... ..2=.b...,...W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Tue Apr 23 19:27:11 2024, mtime=Tue Apr 23 19:27:11 2024, atime=Tue Dec 2 14:12:32 2008, length=116152, window=hide
                                            Category:dropped
                                            Size (bytes):1085
                                            Entropy (8bit):4.56615611481461
                                            Encrypted:false
                                            SSDEEP:24:87z/hEEHdOEfKkjVA69MidtsdtFoUUnqrqygm:8P/dHdOWj+69BdtsdtF9Syg
                                            MD5:E3C8441A37459AC8E6D638D619A575A6
                                            SHA1:A690F4778E751E99E07B3068813F107052DC5956
                                            SHA-256:198C3C59B337D23D5BDF499228AFBCBF9FC8C3F25832D2A05D2F24713F1E6EAB
                                            SHA-512:6AB327436CB2C9E5C06D99E4ADCCB44E4F0C5012F8A5C117BF951FA7634EE229E523D7D7BF595D66B10B5E8DE589D32A419E5A785A39DCE23F64136528BF1B16
                                            Malicious:false
                                            Preview:L..................F.... ...7.L.....7.L........e.T..........................q....P.O. .:i.....+00.../C:\.....................1......Xe...PROGRA~2.........O.I.Xe.....................V.....B.*.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....N.1......Xg...ZOC5..:......Xe..Xg...........................p2..Z.O.C.5.....\.2......9.y .order.exe.D......Xf..Xf......B........................o.r.d.e.r...e.x.e.......T...............-.......S............2.[.....C:\Program Files (x86)\ZOC5\order.exe....O.r.d.e.r. .Z.O.C.=.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.\.o.r.d.e.r...e.x.e...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.........*................@Z|...K.J.........`.......X.......549163...........hT..CrF.f4... ..2=.b...,...W..hT..CrF.f4... ..2=.b...,...W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Tue Apr 23 19:27:12 2024, mtime=Tue Apr 23 19:27:12 2024, atime=Tue Dec 2 14:12:32 2008, length=4520, window=hide
                                            Category:dropped
                                            Size (bytes):1086
                                            Entropy (8bit):4.603264787045148
                                            Encrypted:false
                                            SSDEEP:24:8GhEEHdOEfKkjSnaA5ddtVKdtFoUUnqXoiqygm:8GdHdOWjSnJ5ddtodtF9+yg
                                            MD5:FAA57185FE438991FC4C5E6F68229A99
                                            SHA1:2C9B0E5118E3EFC1AB9A638C36ADA1928077C46A
                                            SHA-256:B2237F2CC834A691877CC09DB028FBD96E6633F477F0F4C6658A863204E5CD7B
                                            SHA-512:28BAEEEB8626B5AE533EFBCB0FFDD17D3893FC451D88EBEFFE7A163DF11AED4D4A05537686B13EFF394F06C73F8A17661D0ECBB869D9C718A797B6BEFB2F623B
                                            Malicious:false
                                            Preview:L..................F.... ..._.S....._.S........e.T..........................u....P.O. .:i.....+00.../C:\.....................1......Xe...PROGRA~2.........O.I.Xe.....................V.....B.*.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....N.1......Xg...ZOC5..:......Xe..Xg...........................p2..Z.O.C.5.....`.2......9.y .Readme.txt..F......Xg..Xg......B........................R.e.a.d.m.e...t.x.t.......U...............-.......T............2.[.....C:\Program Files (x86)\ZOC5\Readme.txt....R.e.a.d.m.e.>.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.\.R.e.a.d.m.e...t.x.t...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.........*................@Z|...K.J.........`.......X.......549163...........hT..CrF.f4... ..2=.b...,...W..hT..CrF.f4... ..2=.b...,...W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=1, Archive, ctime=Tue Apr 23 19:27:12 2024, mtime=Tue Apr 23 19:27:12 2024, atime=Tue Apr 23 19:27:12 2024, length=632248, window=hide
                                            Category:dropped
                                            Size (bytes):1983
                                            Entropy (8bit):3.2872853130828465
                                            Encrypted:false
                                            SSDEEP:24:8SQ/hEEHdOEfKkjRA69XRidttdtDedt8Et88UUnqHqygm:8l/dHdOWji69XEdttdtDedt8Et8pOyg
                                            MD5:F7E031B599F1EEC042DFC4BECDC02EC6
                                            SHA1:11D265E73C1959B9CBF679EE73CDAE54F9059794
                                            SHA-256:F0D48E817BFDAE85D833D9744FF29E23B6448CFE098B41CF3E0F72DA13CD7ADE
                                            SHA-512:0387FE68E37BD7C4C065242D8D3DBAD75D743A12209240736DCD8A81DC7C8679B9C66E3750F75FB08D65DD260F898A7A3646FC37B138D23E757B5F09642CD65E
                                            Malicious:false
                                            Preview:L..................F.@.. ....E.......E.......E..............................q....P.O. .:i.....+00.../C:\.....................1......Xe...PROGRA~2.........O.I.Xe.....................V.....B.*.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....N.1......Xg...ZOC5..:......Xe..Xg...........................p2..Z.O.C.5.....\.2......Xg. .Setup.exe.D......Xg..Xg.....*.........................S.e.t.u.p...e.x.e.......T...............-.......S............2.[.....C:\Program Files (x86)\ZOC5\Setup.exe....U.n.i.n.s.t.a.l.l. .Z.O.C.=.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.\.S.e.t.u.p...e.x.e...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5...-.r.e.m.o.v.e. .Z.O.C.5.%.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.\.s.e.t.u.p...e.x.e.........%ProgramFiles%\ZOC5\setup.exe..........................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Tue Apr 23 19:27:12 2024, mtime=Tue Apr 23 19:27:12 2024, atime=Tue Dec 2 14:12:32 2008, length=24806, window=hide
                                            Category:dropped
                                            Size (bytes):1116
                                            Entropy (8bit):4.606505189576835
                                            Encrypted:false
                                            SSDEEP:24:82wD3hEEHdOEfKkjv9yA7SMdtdRdtFoUUnqnqygm:82wbdHdOWjv9R7SMdtdRdtF9Oyg
                                            MD5:49FF351E0706C1EE67FE3E0FFC5E8574
                                            SHA1:7042BB5360FE5BEE677B739650C7A7956C3D371D
                                            SHA-256:B7150957E313D74CEB9BA34ED9E9D13CFF63F6B696E6441433446559C12009D5
                                            SHA-512:E6FC386827C5C2FE92BB71E175DAB6BCABE2D360B275F61DA6F886FC1F5E2C0A2C84F1F63C6CF7133EFA69EC5DDF3CD4CF5DFCB285B3265BB47868E11657E140
                                            Malicious:false
                                            Preview:L..................F.... .....y.......y........e.T...`......................{....P.O. .:i.....+00.../C:\.....................1......Xe...PROGRA~2.........O.I.Xe.....................V.....B.*.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....N.1......Xg...ZOC5..:......Xe..Xg...........................p2..Z.O.C.5.....f.2..`...9.y .Versions.txt..J......Xg..Xg......B........................V.e.r.s.i.o.n.s...t.x.t.......W...............-.......V............2.[.....C:\Program Files (x86)\ZOC5\Versions.txt....V.e.r.s.i.o.n. .H.i.s.t.o.r.y.@.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.\.V.e.r.s.i.o.n.s...t.x.t...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.........*................@Z|...K.J.........`.......X.......549163...........hT..CrF.f4... ..2=.b...,...W..hT..CrF.f4... ..2=.b...,...W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=23, Archive, ctime=Sat Dec 7 08:10:00 2019, mtime=Tue Apr 23 19:27:23 2024, atime=Sat Dec 7 08:10:00 2019, length=16384, window=hide
                                            Category:dropped
                                            Size (bytes):1986
                                            Entropy (8bit):3.2943549112386434
                                            Encrypted:false
                                            SSDEEP:24:8Tt/ei05jEQAhhb/QH+/8dtpMHpbNdtRbtE4qzqygm:8TZPznbszdt8bNdtRbt9yg
                                            MD5:4758C395286C395F9CA645B1569B1B91
                                            SHA1:D9DB398E3780DA0C4B1E15B37EFBCB890FE6D148
                                            SHA-256:4652A57F6F2D8EF3BD93A0871DB0B421D9E8133971D60952F816AF16C7DE97A9
                                            SHA-512:1426B0CBD1E24B3E65527C9B0C4B4D95E27A6CB7B6C7B68A446D437541B0AC630807B1ACEC737AF31021DFD821368608E756EE2B0C88A20CCDA390A6590DDF19
                                            Malicious:false
                                            Preview:L..................F.@.. .....}......,.......}.....@......................3....P.O. .:i.....+00.../C:\...................V.1.....DW.r..Windows.@......OwH.XY.....3......................`.W.i.n.d.o.w.s.....Z.1......XW...System32..B......OwH.XY...............................S.y.s.t.e.m.3.2.....T.2..@...OAI .hh.exe..>......OAI.Xl...../...........|.........zF..h.h...e.x.e.......I...............-.......H............2.[.....C:\Windows\System32\hh.exe....Z.O.C. .C.o.m.m.a.n.d. .L.i.n.e. .P.a.r.a.m.e.t.e.r.s.2.....\.....\.....\.....\.....\.....\.....\.....\.....\.W.i.n.d.o.w.s.\.S.y.s.t.e.m.3.2.\.h.h...e.x.e...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.-.m.k.:.@.M.S.I.T.S.t.o.r.e.:.z.o.c...c.h.m.:.:./.h.t.m.l./.t.o.p.i.c.-.1.0.2.4.0...h.t.m.l.'.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.\.s.h.e.l.l.3.2...d.l.l.........%ProgramFiles%\ZOC5\shell32.dll.....................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=23, Archive, ctime=Sat Dec 7 08:10:00 2019, mtime=Tue Apr 23 19:27:23 2024, atime=Sat Dec 7 08:10:00 2019, length=16384, window=hide
                                            Category:dropped
                                            Size (bytes):1882
                                            Entropy (8bit):3.241858879090757
                                            Encrypted:false
                                            SSDEEP:24:8TT/ei05jEQAhhPw7+/8dtWqdtRbtE4qzqygm:8TzPznbwdtWqdtRbt9yg
                                            MD5:6E3034811BBE95108B717484047212C0
                                            SHA1:6164E5A4C58559170E032AF2B81A6A7A6CA384E2
                                            SHA-256:0E436169A90352790960B7FCC68B4EE8ADF0F7C5648A15383AFE1C56DB823A9B
                                            SHA-512:E960A285EBC9047A05E7B29DB1F3AFD42D57F95B40DADB9B6893F5C509EF959C084C52769514F16243779E5CD54F1BBA1802F9209E062D3321067B1EA73C4536
                                            Malicious:false
                                            Preview:L..................F.@.. .....}....n.".......}.....@......................3....P.O. .:i.....+00.../C:\...................V.1.....DW.r..Windows.@......OwH.XY.....3......................`.W.i.n.d.o.w.s.....Z.1......XW...System32..B......OwH.XY...............................S.y.s.t.e.m.3.2.....T.2..@...OAI .hh.exe..>......OAI.Xl...../...........|.........zF..h.h...e.x.e.......I...............-.......H............2.[.....C:\Windows\System32\hh.exe....Z.O.C. .H.e.l.p. .F.i.l.e.2.....\.....\.....\.....\.....\.....\.....\.....\.....\.W.i.n.d.o.w.s.\.S.y.s.t.e.m.3.2.\.h.h...e.x.e...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5...z.o.c...c.h.m.'.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.\.s.h.e.l.l.3.2...d.l.l.........%ProgramFiles%\ZOC5\shell32.dll.............................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=23, Archive, ctime=Sat Dec 7 08:10:00 2019, mtime=Tue Apr 23 19:27:23 2024, atime=Sat Dec 7 08:10:00 2019, length=16384, window=hide
                                            Category:dropped
                                            Size (bytes):1976
                                            Entropy (8bit):3.2984006456132944
                                            Encrypted:false
                                            SSDEEP:24:8Tt/ei05jEQAhhjQ+/8dtpMHpbLdtRbtE4qzqygm:8TZPznbj8dt8bLdtRbt9yg
                                            MD5:69642849C5C1C2B8646878A51356D2FB
                                            SHA1:79A32046240CE158D488538EB2B910CCB252B5F6
                                            SHA-256:778FE7B9A1C75D8E5534C0DBD02F60E795AE36E401EB0533A439D71E29B7C018
                                            SHA-512:DD767793BB6CDE03AF5CE7CA1615EA8550347030E95ABD59473A71851729C0BB13EC963B73E4404F8D2306ED408A7D27DA08B2BCCF36EF39902E28B2E930DC6A
                                            Malicious:false
                                            Preview:L..................F.@.. .....}......,.......}.....@......................3....P.O. .:i.....+00.../C:\...................V.1.....DW.r..Windows.@......OwH.XY.....3......................`.W.i.n.d.o.w.s.....Z.1......XW...System32..B......OwH.XY...............................S.y.s.t.e.m.3.2.....T.2..@...OAI .hh.exe..>......OAI.Xl...../...........|.........zF..h.h...e.x.e.......I...............-.......H............2.[.....C:\Windows\System32\hh.exe....Z.O.C. .Q.u.i.c.k. .S.t.a.r.t. .G.u.i.d.e.s.2.....\.....\.....\.....\.....\.....\.....\.....\.....\.W.i.n.d.o.w.s.\.S.y.s.t.e.m.3.2.\.h.h...e.x.e...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.-.m.k.:.@.M.S.I.T.S.t.o.r.e.:.z.o.c...c.h.m.:.:./.h.t.m.l./.t.o.p.i.c.-.1.0.2.2.0...h.t.m.l.'.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.\.s.h.e.l.l.3.2...d.l.l.........%ProgramFiles%\ZOC5\shell32.dll...............................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Tue Apr 23 19:27:12 2024, mtime=Tue Apr 23 19:27:12 2024, atime=Tue Dec 2 14:12:46 2008, length=193976, window=hide
                                            Category:dropped
                                            Size (bytes):1067
                                            Entropy (8bit):4.619991148111069
                                            Encrypted:false
                                            SSDEEP:24:8gAhEEHdOEfKWU7A6DZdtUdtFoUUnqTqygm:83dHdO8t69dtUdtF96yg
                                            MD5:434000FA03D8F6ADEF8306FD35550E36
                                            SHA1:6B497967BEA844F7392C1396E81384B0CB634A81
                                            SHA-256:A73B6CA1E09CB7B3DB82507C2883BFFFB0143C8E12E06605FDC07531DF981B2B
                                            SHA-512:999CF4C942A41691548ECDBF32CC181ECA8CAE52D7B7706F54991F49E9ED4339C648D36EDDB66CFE7481378E41A85581200B88748E32633D210A0E5E22E85C62
                                            Malicious:false
                                            Preview:L..................F.... ...?3......?3.......+Wn.T..........................k....P.O. .:i.....+00.../C:\.....................1......Xe...PROGRA~2.........O.I.Xe.....................V.....B.*.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....N.1......Xg...ZOC5..:......Xe..Xg...............................Z.O.C.5.....V.2......9.y .zoc.exe.@......Xg..Xg......B........................z.o.c...e.x.e.......R...............-.......Q............2.[.....C:\Program Files (x86)\ZOC5\zoc.exe....Z.O.C. .V.5.;.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.\.z.o.c...e.x.e...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.Z.O.C.5.........*................@Z|...K.J.........`.......X.......549163...........hT..CrF.f4... ..2=.b...,...W..hT..CrF.f4... ..2=.b...,...W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.......
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):7.994205663318143
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
                                            File size:3'113'216 bytes
                                            MD5:a3bd864b819f0dc53482b5e06ffef509
                                            SHA1:9a2594c8af8a053d698c1d96bf828286846cc066
                                            SHA256:a7b222438781b93d33725b049c45112df2f76e267af62406098613e635dc3c31
                                            SHA512:d303221365f16077306f125b74205c556f966f1012987ccea51af5e271d09cd8cd20ff72ec87fcda8109e03c73694225914d5669e2faa246ccdb975ae1bc1a85
                                            SSDEEP:49152:6c/aaEhWJZDGBYUI/xz2jKDdRYm0lGK85unKygx2Uv6/t90eQpQgi1+D+IaeIBF/:6Gaa9JZDiKYjKD/YZG7Yncx274eQyPHR
                                            TLSH:3BE533885633ED7AD15141333098EFB617F1EF1518AAC88EBB244929DF572EE13E6348
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........b..............<q......<b.....y.Q.........;....<a......<p......<t.....Rich............PE..L...Wz.I...........................
                                            Icon Hash:274f191311591130
                                            Entrypoint:0x402877
                                            Entrypoint Section:.text
                                            Digitally signed:true
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:
                                            Time Stamp:0x492E7A57 [Thu Nov 27 10:45:43 2008 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:213fe6a5665e289e7aca3924945b347c
                                            Signature Valid:true
                                            Signature Issuer:CN=Thawte Code Signing CA, O=Thawte Consulting (Pty) Ltd., C=ZA
                                            Signature Validation Error:The operation completed successfully
                                            Error Number:0
                                            Not Before, Not After
                                            • 07/07/2008 02:00:00 25/08/2010 01:59:59
                                            Subject Chain
                                            • CN=Markus Schmidt, OU=SECURE APPLICATION DEVELOPMENT, O=Markus Schmidt, L=Nuernberg, S=Bayern, C=DE
                                            Version:3
                                            Thumbprint MD5:ECBB447782CBBD6DC5A773BD2056A187
                                            Thumbprint SHA-1:0FD932F6AC4D3E4581ADBB4232A8EC271F23726E
                                            Thumbprint SHA-256:905ECE5619EFD348A08ED6E460695A3642482924585BFF3DCC36A195C2732F24
                                            Serial:6DA9806F04CEC108C0A2D73642DC4A1F
                                            Instruction
                                            push ebp
                                            mov ebp, esp
                                            sub esp, 44h
                                            push esi
                                            call dword ptr [0040B0A0h]
                                            mov esi, eax
                                            mov al, byte ptr [esi]
                                            cmp al, 22h
                                            jne 00007FA360B6B913h
                                            cmp al, 22h
                                            je 00007FA360B6B91Fh
                                            inc esi
                                            mov al, byte ptr [esi]
                                            test al, al
                                            jne 00007FA360B6B8F7h
                                            cmp al, 22h
                                            jne 00007FA360B6B915h
                                            jmp 00007FA360B6B912h
                                            cmp al, 20h
                                            jle 00007FA360B6B90Fh
                                            inc esi
                                            cmp byte ptr [esi], 00000020h
                                            jnle 00007FA360B6B8FCh
                                            jmp 00007FA360B6B907h
                                            cmp al, 20h
                                            jnle 00007FA360B6B909h
                                            inc esi
                                            mov al, byte ptr [esi]
                                            test al, al
                                            jne 00007FA360B6B8F7h
                                            and dword ptr [ebp-18h], 00000000h
                                            lea eax, dword ptr [ebp-44h]
                                            push eax
                                            call dword ptr [0040B09Ch]
                                            test byte ptr [ebp-18h], 00000001h
                                            je 00007FA360B6B908h
                                            movzx eax, word ptr [ebp-14h]
                                            jmp 00007FA360B6B905h
                                            push 0000000Ah
                                            pop eax
                                            push eax
                                            push esi
                                            push 00000000h
                                            push 00000000h
                                            call dword ptr [0040B098h]
                                            push eax
                                            call 00007FA360B6B7D8h
                                            int3
                                            mov eax, dword ptr [esp+04h]
                                            and dword ptr [eax], 00000000h
                                            and dword ptr [eax+04h], 00000000h
                                            ret
                                            push esi
                                            push 00000004h
                                            push 00001000h
                                            push 00000104h
                                            push 00000000h
                                            call dword ptr [0040B018h]
                                            mov esi, eax
                                            test esi, esi
                                            jne 00007FA360B6B904h
                                            pop esi
                                            ret
                                            push dword ptr [esp+0Ch]
                                            push esi
                                            call dword ptr [0040B024h]
                                            mov eax, dword ptr [esp+08h]
                                            mov ecx, dword ptr [eax]
                                            test ecx, ecx
                                            jne 00007FA360B6B90Ah
                                            and dword ptr [esi+00000100h], ecx
                                            jmp 00007FA360B6B908h
                                            mov dword ptr [esi+00000100h], ecx
                                            inc dword ptr [eax+04h]
                                            mov dword ptr [eax], esi
                                            xor eax, eax
                                            inc eax
                                            pop esi
                                            ret
                                            mov eax, dword ptr [esp+04h]
                                            Programming Language:
                                            • [ASM] VS2005 build 50727
                                            • [C++] VS2005 build 50727
                                            • [ C ] VS2005 build 50727
                                            • [RES] VS2005 build 50727
                                            • [LNK] VS2005 build 50727
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xd2040x64.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x170000x2250.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x2f6b480x15b8
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xb1d00x1c.rdata
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xceb00x40.rdata
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0xb0000x184.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x9c640x9e00f7b84c3f1dc25d7e22c666f6548ad36dFalse0.6220579509493671data6.61047516640524IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0xb0000x2a8a0x2c0015f0cfe6a55e16bab3d0c93e8dd75f29False0.4401633522727273data5.6882335066903105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0xe0000x84a40x22004de969b913bd695cf78bb6a0fc0f6aacFalse0.22633272058823528data2.5090067713654047IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x170000x22500x2400a437ead2b0a8b525663cba45f271624fFalse0.5009765625data4.937794448544168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0x173000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.5676972281449894
                                            RT_ICON0x181a80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.7193140794223827
                                            RT_ICON0x18a500x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.2073699421965318
                                            RT_DIALOG0x171900x16adata0.5939226519337016
                                            RT_GROUP_ICON0x18fb80x30data0.875
                                            RT_MANIFEST0x18fe80x261XML 1.0 document, ASCII text, with CRLF line terminators0.5697865353037767
                                            DLLImport
                                            COMCTL32.dll
                                            KERNEL32.dllVirtualAlloc, lstrlenA, VirtualFree, lstrcpyA, lstrcmpA, GetFileAttributesA, lstrcatA, GetSystemDirectoryA, GetTempPathA, GetCurrentDirectoryA, ExpandEnvironmentStringsA, CreateDirectoryA, GetFullPathNameA, ReadFile, SetFilePointer, CreateFileA, DeleteFileA, RemoveDirectoryA, Sleep, SetFileTime, LocalFileTimeToFileTime, DosDateTimeToFileTime, WriteFile, GetPrivateProfileStringA, GetLastError, GetTempFileNameA, GetModuleFileNameA, GetCurrentProcess, CreateThread, WaitForSingleObject, CreateProcessA, SetCurrentDirectoryA, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, FormatMessageA, CloseHandle, ExitProcess, GetPrivateProfileIntA, EnterCriticalSection, LeaveCriticalSection, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetStdHandle, DeleteCriticalSection, HeapFree, RtlUnwind, GetProcAddress, TlsGetValue, TlsSetValue, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, MultiByteToWideChar, InitializeCriticalSection, HeapAlloc, HeapReAlloc, SetStdHandle, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, LoadLibraryA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA
                                            USER32.dllDialogBoxParamA, EndDialog, SetWindowTextA, ShowWindow, GetDlgItem, SetDlgItemTextA, SendMessageA, PostMessageA, wsprintfA, MessageBoxA, DestroyWindow
                                            ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegQueryValueExA
                                            No network behavior found

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:22:26:54
                                            Start date:23/04/2024
                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.suspected.of.Win32.PhishingPE.Heur.10337.17085.exe"
                                            Imagebase:0x400000
                                            File size:3'113'216 bytes
                                            MD5 hash:A3BD864B819F0DC53482B5E06FFEF509
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:false

                                            Target ID:2
                                            Start time:22:26:57
                                            Start date:23/04/2024
                                            Path:C:\Users\user\AppData\Local\Temp\~emtec~354033\setup.exe
                                            Wow64 process (32bit):true
                                            Commandline:.\setup.exe
                                            Imagebase:0x400000
                                            File size:632'248 bytes
                                            MD5 hash:51F4C23DB5D7F30E4F2B50AED1851339
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 2%, ReversingLabs
                                            Reputation:low
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:16.2%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:12.8%
                                              Total number of Nodes:1289
                                              Total number of Limit Nodes:13
                                              execution_graph 5666 40a060 5667 406324 __amsg_exit 67 API calls 5666->5667 5668 40a067 5667->5668 5953 4069a0 InitializeCriticalSection 5669 408d61 5670 408d64 5669->5670 5673 40a4c0 5670->5673 5674 40a4e5 5673->5674 5675 40a4ec 5673->5675 5677 408b35 __amsg_exit 67 API calls 5674->5677 5685 408daa 5675->5685 5677->5675 5680 40a5ab 5709 4064f0 5680->5709 5681 40a4fd _memset 5681->5680 5683 40a580 SetUnhandledExceptionFilter UnhandledExceptionFilter 5681->5683 5683->5680 5686 4067b2 ___crtInitCritSecAndSpinCount 67 API calls 5685->5686 5687 408db5 5686->5687 5687->5681 5688 408db7 5687->5688 5691 408dc3 __locking 5688->5691 5689 408e1f 5690 408e00 5689->5690 5695 408e2e 5689->5695 5694 4067b2 ___crtInitCritSecAndSpinCount 67 API calls 5690->5694 5691->5689 5691->5690 5692 408dea 5691->5692 5697 408de6 5691->5697 5693 406911 _raise 67 API calls 5692->5693 5698 408def _siglookup 5693->5698 5694->5698 5696 405a1d __dosmaperr 67 API calls 5695->5696 5699 408e33 5696->5699 5697->5692 5697->5695 5701 4064f0 _raise 67 API calls 5698->5701 5702 408e95 5698->5702 5708 408df8 __locking 5698->5708 5700 4059be __locking 67 API calls 5699->5700 5700->5708 5701->5702 5703 4065d9 __lock 67 API calls 5702->5703 5704 408ea0 5702->5704 5703->5704 5705 4067a9 _raise 67 API calls 5704->5705 5706 408ed5 5704->5706 5705->5706 5712 408f2b 5706->5712 5708->5681 5717 40640e 5709->5717 5711 4064fd 5713 408f31 5712->5713 5714 408f38 5712->5714 5716 406501 LeaveCriticalSection 5713->5716 5714->5708 5716->5714 5718 40641a __locking 5717->5718 5719 4065d9 __lock 67 API calls 5718->5719 5720 406421 5719->5720 5723 4067b2 ___crtInitCritSecAndSpinCount 67 API calls 5720->5723 5730 406490 _raise 5720->5730 5725 406450 5723->5725 5724 4064d8 __locking 5724->5711 5727 4067b2 ___crtInitCritSecAndSpinCount 67 API calls 5725->5727 5731 40645e 5727->5731 5728 4064cf 5729 40636e __mtinitlocknum 3 API calls 5728->5729 5729->5724 5734 4064db 5730->5734 5731->5730 5732 4067a9 _raise 67 API calls 5731->5732 5733 4067b2 ___crtInitCritSecAndSpinCount 67 API calls 5731->5733 5732->5731 5733->5731 5735 4064e1 5734->5735 5736 4064bc 5734->5736 5739 406501 LeaveCriticalSection 5735->5739 5736->5724 5738 406501 LeaveCriticalSection 5736->5738 5738->5728 5739->5736 4911 4084c7 4914 406501 LeaveCriticalSection 4911->4914 4913 4084ce 4914->4913 5763 40a787 5764 40a7a0 5763->5764 5765 40a798 5763->5765 5767 40a7b2 5764->5767 5768 40a7af CloseHandle 5764->5768 5765->5764 5766 40a79d CloseHandle 5765->5766 5766->5764 5768->5767 5954 405529 5955 405536 5954->5955 5956 40623d __calloc_crt 67 API calls 5955->5956 5957 405550 5956->5957 5958 40623d __calloc_crt 67 API calls 5957->5958 5959 405569 5957->5959 5958->5959 4915 407ccc RtlUnwind 4916 406a4d 4917 406a59 SetLastError 4916->4917 4918 406a61 __locking 4916->4918 4917->4918 5769 40818d 5779 408113 5769->5779 5772 4081b6 setSBCS 5773 405320 ___ansicp 5 API calls 5772->5773 5775 408364 5773->5775 5774 4081fa IsValidCodePage 5774->5772 5776 40820c GetCPInfo 5774->5776 5776->5772 5778 40821f _memset 5776->5778 5786 407ee5 GetCPInfo 5778->5786 5780 40617b _LocaleUpdate::_LocaleUpdate 77 API calls 5779->5780 5781 408125 5780->5781 5782 408130 GetOEMCP 5781->5782 5783 40814e 5781->5783 5785 408140 5782->5785 5784 408153 GetACP 5783->5784 5783->5785 5784->5785 5785->5772 5785->5774 5785->5778 5787 407f1c _memset 5786->5787 5788 407fc5 5786->5788 5796 409ba9 5787->5796 5792 405320 ___ansicp 5 API calls 5788->5792 5794 408067 5792->5794 5794->5778 5795 4099ae ___crtLCMapStringA 102 API calls 5795->5788 5797 40617b _LocaleUpdate::_LocaleUpdate 77 API calls 5796->5797 5798 409bba 5797->5798 5806 4099f1 5798->5806 5801 4099ae 5802 40617b _LocaleUpdate::_LocaleUpdate 77 API calls 5801->5802 5803 4099bf 5802->5803 5891 40960c 5803->5891 5807 409a10 GetStringTypeW 5806->5807 5808 409a3b 5806->5808 5809 409a30 GetLastError 5807->5809 5810 409a28 5807->5810 5808->5810 5811 409b22 5808->5811 5809->5808 5812 409a74 MultiByteToWideChar 5810->5812 5819 409b1c 5810->5819 5834 40a7b4 GetLocaleInfoA 5811->5834 5814 409aa1 5812->5814 5812->5819 5821 408954 _malloc 67 API calls 5814->5821 5825 409ab6 _memset __alloca_probe_16 5814->5825 5815 405320 ___ansicp 5 API calls 5816 407f80 5815->5816 5816->5801 5817 409b73 GetStringTypeA 5817->5819 5820 409b8e 5817->5820 5819->5815 5824 405c86 ___free_lc_time 67 API calls 5820->5824 5821->5825 5823 409aef MultiByteToWideChar 5827 409b05 GetStringTypeW 5823->5827 5828 409b16 5823->5828 5824->5819 5825->5819 5825->5823 5827->5828 5830 4095f1 5828->5830 5831 4095f9 5830->5831 5833 40960a 5830->5833 5832 405c86 ___free_lc_time 67 API calls 5831->5832 5831->5833 5832->5833 5833->5819 5835 40a7e0 5834->5835 5836 40a7e5 5834->5836 5838 405320 ___ansicp 5 API calls 5835->5838 5865 40a9dc 5836->5865 5839 409b46 5838->5839 5839->5817 5839->5819 5840 40a7fb 5839->5840 5841 40a839 GetCPInfo 5840->5841 5845 40a8c3 5840->5845 5842 40a850 5841->5842 5843 40a8ae MultiByteToWideChar 5841->5843 5842->5843 5846 40a856 GetCPInfo 5842->5846 5843->5845 5849 40a869 _strlen 5843->5849 5844 405320 ___ansicp 5 API calls 5847 409b67 5844->5847 5845->5844 5846->5843 5848 40a863 5846->5848 5847->5817 5847->5819 5848->5843 5848->5849 5850 408954 _malloc 67 API calls 5849->5850 5851 40a89b _memset __alloca_probe_16 5849->5851 5850->5851 5851->5845 5852 40a8f8 MultiByteToWideChar 5851->5852 5853 40a910 5852->5853 5854 40a92f 5852->5854 5855 40a934 5853->5855 5856 40a917 WideCharToMultiByte 5853->5856 5857 4095f1 __freea 67 API calls 5854->5857 5858 40a953 5855->5858 5859 40a93f WideCharToMultiByte 5855->5859 5856->5854 5857->5845 5860 40623d __calloc_crt 67 API calls 5858->5860 5859->5854 5859->5858 5861 40a95b 5860->5861 5861->5854 5862 40a964 WideCharToMultiByte 5861->5862 5862->5854 5863 40a976 5862->5863 5864 405c86 ___free_lc_time 67 API calls 5863->5864 5864->5854 5868 40a294 5865->5868 5869 40a2ab 5868->5869 5872 40a069 5869->5872 5873 40617b _LocaleUpdate::_LocaleUpdate 77 API calls 5872->5873 5876 40a07c 5873->5876 5874 40a08e 5875 405a1d __dosmaperr 67 API calls 5874->5875 5877 40a093 5875->5877 5876->5874 5880 40a0cb 5876->5880 5878 4059be __locking 67 API calls 5877->5878 5883 40a0a3 5878->5883 5881 40a110 5880->5881 5884 40a9ed 5880->5884 5882 405a1d __dosmaperr 67 API calls 5881->5882 5881->5883 5882->5883 5883->5835 5885 40617b _LocaleUpdate::_LocaleUpdate 77 API calls 5884->5885 5886 40a9ff 5885->5886 5887 408824 __isleadbyte_l 77 API calls 5886->5887 5890 40aa0c 5886->5890 5888 40aa34 5887->5888 5889 409ba9 ___crtGetStringTypeA 91 API calls 5888->5889 5889->5890 5890->5880 5892 40962b LCMapStringW 5891->5892 5895 409646 5891->5895 5893 40964e GetLastError 5892->5893 5892->5895 5893->5895 5894 409843 5897 40a7b4 ___ansicp 91 API calls 5894->5897 5895->5894 5896 4096a0 5895->5896 5898 4096b9 MultiByteToWideChar 5896->5898 5921 40983a 5896->5921 5900 40986b 5897->5900 5905 4096e6 5898->5905 5898->5921 5899 405320 ___ansicp 5 API calls 5901 407fa0 5899->5901 5902 409884 5900->5902 5903 40995f LCMapStringA 5900->5903 5900->5921 5901->5795 5907 40a7fb ___convertcp 74 API calls 5902->5907 5906 4098bb 5903->5906 5904 409737 MultiByteToWideChar 5908 409750 LCMapStringW 5904->5908 5909 409831 5904->5909 5911 408954 _malloc 67 API calls 5905->5911 5918 4096ff __alloca_probe_16 5905->5918 5910 409986 5906->5910 5914 405c86 ___free_lc_time 67 API calls 5906->5914 5912 409896 5907->5912 5908->5909 5913 409771 5908->5913 5916 4095f1 __freea 67 API calls 5909->5916 5919 405c86 ___free_lc_time 67 API calls 5910->5919 5910->5921 5911->5918 5915 4098a0 LCMapStringA 5912->5915 5912->5921 5917 409779 5913->5917 5924 4097a2 5913->5924 5914->5910 5915->5906 5922 4098c2 5915->5922 5916->5921 5917->5909 5920 40978b LCMapStringW 5917->5920 5918->5904 5918->5921 5919->5921 5920->5909 5921->5899 5925 4098d3 _memset __alloca_probe_16 5922->5925 5926 408954 _malloc 67 API calls 5922->5926 5923 4097f1 LCMapStringW 5927 409809 WideCharToMultiByte 5923->5927 5928 40982b 5923->5928 5929 4097bd __alloca_probe_16 5924->5929 5930 408954 _malloc 67 API calls 5924->5930 5925->5906 5932 409911 LCMapStringA 5925->5932 5926->5925 5927->5928 5931 4095f1 __freea 67 API calls 5928->5931 5929->5909 5929->5923 5930->5929 5931->5909 5934 409931 5932->5934 5935 40992d 5932->5935 5936 40a7fb ___convertcp 74 API calls 5934->5936 5937 4095f1 __freea 67 API calls 5935->5937 5936->5935 5937->5906 4910 40530e VirtualFree 5938 408d0e 5939 40623d __calloc_crt 67 API calls 5938->5939 5940 408d18 5939->5940 5941 40673b ___crtInitCritSecAndSpinCount 67 API calls 5940->5941 5942 408d20 5941->5942 5744 405af0 5745 405b28 5744->5745 5746 405b1b 5744->5746 5748 405320 ___ansicp 5 API calls 5745->5748 5747 405320 ___ansicp 5 API calls 5746->5747 5747->5745 5750 405b38 __except_handler4 5748->5750 5749 405bbf 5750->5749 5751 405b94 __except_handler4 5750->5751 5757 405bd5 __except_handler4 5750->5757 5751->5749 5752 405baf 5751->5752 5753 405320 ___ansicp 5 API calls 5751->5753 5754 405320 ___ansicp 5 API calls 5752->5754 5753->5752 5754->5749 5756 405c14 __except_handler4 5758 405c4b 5756->5758 5759 405320 ___ansicp 5 API calls 5756->5759 5762 40614a RtlUnwind 5757->5762 5760 405320 ___ansicp 5 API calls 5758->5760 5759->5758 5761 405c5b __except_handler4 5760->5761 5762->5756 4455 4052f4 VirtualAlloc 4456 402877 GetCommandLineA 4457 40288c 4456->4457 4457->4457 4458 4028b4 GetStartupInfoA 4457->4458 4459 4028c8 GetModuleHandleA 4458->4459 4463 4027b6 #17 4459->4463 4464 4027dc 4463->4464 4482 401e6c 4464->4482 4469 40280b DialogBoxParamA 4471 402847 4469->4471 4472 40283b WaitForSingleObject CloseHandle 4469->4472 4473 402850 WaitForSingleObject CloseHandle 4471->4473 4474 40285c 4471->4474 4472->4471 4473->4474 4476 402871 4474->4476 4477 402865 WaitForSingleObject CloseHandle 4474->4477 4538 401000 4476->4538 4477->4476 4478 402801 4528 401039 GetLastError 4478->4528 4483 401ea8 _memset 4482->4483 4484 401eca 7 API calls 4483->4484 4485 401f8d ReadFile 4484->4485 4486 401fa7 4485->4486 4487 401f4c 4485->4487 4490 401039 9 API calls 4486->4490 4488 401f70 SetFilePointer 4487->4488 4492 401fb1 4487->4492 4488->4485 4489 40231b 4488->4489 4490->4492 4491 401ffa ReadFile 4491->4486 4491->4492 4492->4491 4493 401fdd SetFilePointer 4492->4493 4494 402016 6 API calls 4492->4494 4493->4489 4493->4491 4494->4486 4495 4020b8 14 API calls 4494->4495 4497 402227 4495->4497 4496 402261 lstrlenA 4498 402277 lstrcpyA 4496->4498 4499 40228e 4496->4499 4497->4496 4498->4499 4545 40142e 4499->4545 4505 401957 9 API calls 4506 4022c1 lstrcpyA 4505->4506 4507 4022d4 4506->4507 4508 4022e4 VirtualFree DeleteFileA 4507->4508 4590 405320 4508->4590 4510 402313 4511 4013bb GetFileAttributesA 4510->4511 4512 4013ca 4511->4512 4512->4469 4513 401813 4512->4513 4514 40184c _memset 4513->4514 4515 401860 GetFullPathNameA lstrcatA 4514->4515 4526 4018db 4515->4526 4516 4012eb 3 API calls 4517 401901 lstrlenA 4516->4517 4518 401916 4517->4518 4519 40188c lstrlenA 4517->4519 4522 405320 ___ansicp 5 API calls 4518->4522 4520 4018a7 lstrcpyA 4519->4520 4521 4018af lstrcatA 4519->4521 4524 4018b1 lstrcatA GetFullPathNameA 4520->4524 4521->4524 4523 401929 4522->4523 4523->4469 4523->4478 4525 4013bb GetFileAttributesA 4524->4525 4525->4526 4526->4516 4527 4018e0 CreateDirectoryA 4526->4527 4527->4526 4529 401087 wsprintfA MessageBoxA 4528->4529 4530 401067 GetLastError FormatMessageA 4528->4530 4531 401000 4529->4531 4530->4529 4532 401010 DestroyWindow 4531->4532 4533 401013 4531->4533 4532->4533 4534 40101c DestroyWindow 4533->4534 4535 40101f 4533->4535 4534->4535 4536 401030 ExitProcess 4535->4536 4537 401029 CloseHandle 4535->4537 4537->4536 4539 401010 DestroyWindow 4538->4539 4540 401013 4538->4540 4539->4540 4541 40101c DestroyWindow 4540->4541 4542 40101f 4540->4542 4541->4542 4543 401030 ExitProcess 4542->4543 4544 401029 CloseHandle 4542->4544 4544->4543 4546 40146a _memset 4545->4546 4547 40147e VirtualAlloc 4546->4547 4598 4010be VirtualAlloc 4547->4598 4550 4014b3 lstrcatA 4551 4014aa 4550->4551 4600 4010fc 4551->4600 4553 4014f9 ExpandEnvironmentStringsA 4611 4012eb lstrlenA 4553->4611 4556 4014ca 4556->4553 4558 4010fc lstrlenA 4556->4558 4603 4011f0 lstrlenA lstrlenA lstrcmpA 4556->4603 4557 4017af lstrcpyA 4571 401510 _memset 4557->4571 4558->4556 4559 4017d7 4560 4017f8 4559->4560 4561 4017dd lstrlenA 4559->4561 4563 405320 ___ansicp 5 API calls 4560->4563 4562 4010be VirtualAlloc 4561->4562 4564 4017f0 lstrcpyA 4562->4564 4565 40180b lstrcpyA lstrcpyA lstrcpyA 4563->4565 4564->4560 4581 401957 4565->4581 4566 4013d7 RegOpenKeyExA RegQueryValueExA RegCloseKey 4566->4571 4567 40177e lstrcpyA 4568 401795 lstrcatA 4567->4568 4569 4012eb 3 API calls 4568->4569 4569->4557 4570 401639 GetCurrentDirectoryA 4570->4571 4571->4557 4571->4559 4571->4566 4571->4567 4571->4570 4572 4016f1 lstrcpyA RegOpenKeyExA 4571->4572 4577 4013bb GetFileAttributesA 4571->4577 4578 401785 lstrcatA 4571->4578 4579 401769 GetSystemDirectoryA 4571->4579 4580 4016c7 GetTempPathA 4571->4580 4619 4013d7 RegOpenKeyExA 4571->4619 4572->4571 4574 40171e RegQueryValueExA RegCloseKey 4572->4574 4574->4571 4576 4016a0 lstrcatA 4576->4571 4577->4571 4578->4568 4579->4571 4580->4571 4582 401973 4581->4582 4583 4010fc lstrlenA 4582->4583 4587 401989 4583->4587 4584 4019b1 4586 4019c0 lstrcpyA 4584->4586 4588 4011f0 8 API calls 4584->4588 4585 4011f0 8 API calls 4585->4587 4586->4505 4587->4584 4587->4585 4589 4010fc lstrlenA 4587->4589 4588->4586 4589->4587 4591 405328 4590->4591 4592 40532a IsDebuggerPresent 4590->4592 4591->4510 4626 40660a 4592->4626 4595 40578f SetUnhandledExceptionFilter UnhandledExceptionFilter 4596 4057b4 GetCurrentProcess TerminateProcess 4595->4596 4597 4057ac __invoke_watson 4595->4597 4596->4510 4597->4596 4599 4010dc 4598->4599 4599->4550 4599->4551 4601 401108 4600->4601 4602 40110c lstrlenA 4600->4602 4601->4556 4602->4601 4604 40121f 4603->4604 4606 40125d 4603->4606 4605 401233 lstrlenA 4604->4605 4604->4606 4605->4606 4607 401244 VirtualAlloc 4605->4607 4606->4556 4607->4606 4608 401261 lstrcpyA 4607->4608 4609 401270 lstrcpyA VirtualFree 4608->4609 4609->4606 4612 401303 4611->4612 4613 40130a 4611->4613 4612->4571 4613->4612 4614 401323 4613->4614 4615 4010fc lstrlenA 4613->4615 4616 4010fc lstrlenA 4614->4616 4615->4613 4617 40132a 4616->4617 4617->4612 4622 40117d 4617->4622 4620 40142c lstrlenA 4619->4620 4621 4013fc RegQueryValueExA RegCloseKey 4619->4621 4620->4571 4620->4576 4621->4620 4623 401187 4622->4623 4624 4010be VirtualAlloc 4623->4624 4625 401197 4624->4625 4625->4612 4626->4595 5960 4060b8 5961 4060ca 5960->5961 5963 4060d8 @_EH4_CallFilterFunc@8 5960->5963 5962 405320 ___ansicp 5 API calls 5961->5962 5962->5963 4919 40a75a SetUnhandledExceptionFilter 4920 4055da 4927 40601f 4920->4927 4923 4055ed 4940 405c86 4923->4940 4926 4055f8 4953 405f45 4927->4953 4929 4055df 4929->4923 4930 406285 4929->4930 4931 406291 __locking 4930->4931 4932 4065d9 __lock 67 API calls 4931->4932 4934 40629d 4932->4934 4933 406306 5355 40631b 4933->5355 4934->4933 4938 4062db DeleteCriticalSection 4934->4938 5342 4054ad 4934->5342 4936 406312 __locking 4936->4923 4939 405c86 ___free_lc_time 67 API calls 4938->4939 4939->4934 4941 405c92 __locking 4940->4941 4942 405cd1 4941->4942 4944 4065d9 __lock 65 API calls 4941->4944 4948 405d0b __locking __dosmaperr 4941->4948 4943 405ce6 HeapFree 4942->4943 4942->4948 4945 405cf8 4943->4945 4943->4948 4950 405ca9 ___sbh_find_block 4944->4950 4946 405a1d __dosmaperr 65 API calls 4945->4946 4947 405cfd GetLastError 4946->4947 4947->4948 4948->4926 4949 405cc3 5658 405cdc 4949->5658 4950->4949 5651 406be6 4950->5651 4954 405f51 __locking 4953->4954 4963 4065d9 4954->4963 4956 405ff8 4978 406016 4956->4978 4959 406004 __locking 4959->4929 4961 405f60 4961->4956 4962 405f03 105 API calls _flsall 4961->4962 4970 405636 4961->4970 4975 405fe7 4961->4975 4962->4961 4964 4065ec 4963->4964 4965 4065ff EnterCriticalSection 4963->4965 4981 406516 4964->4981 4965->4961 4967 4065f2 4967->4965 5007 406324 4967->5007 4971 405655 EnterCriticalSection 4970->4971 4972 40563f 4970->4972 4971->4961 4973 4065d9 __lock 67 API calls 4972->4973 4974 405648 4973->4974 4974->4961 5335 40569a 4975->5335 4977 405ff5 4977->4961 5341 406501 LeaveCriticalSection 4978->5341 4980 40601d 4980->4959 4982 406522 __locking 4981->4982 4983 406548 4982->4983 5014 408cd5 4982->5014 4991 406558 __locking 4983->4991 5060 4061fd 4983->5060 4989 406579 4995 4065d9 __lock 67 API calls 4989->4995 4990 40656a 5065 405a1d 4990->5065 4991->4967 4996 406580 4995->4996 4997 4065b4 4996->4997 4998 406588 4996->4998 4999 405c86 ___free_lc_time 67 API calls 4997->4999 5068 4069b0 4998->5068 5001 4065a5 4999->5001 5081 4065d0 5001->5081 5002 406593 5002->5001 5003 405c86 ___free_lc_time 67 API calls 5002->5003 5005 40659f 5003->5005 5006 405a1d __dosmaperr 67 API calls 5005->5006 5006->5001 5008 408cd5 __FF_MSGBANNER 67 API calls 5007->5008 5009 406329 5008->5009 5010 408b35 __amsg_exit 67 API calls 5009->5010 5011 406332 5010->5011 5012 4067b2 ___crtInitCritSecAndSpinCount 67 API calls 5011->5012 5013 40633d 5012->5013 5013->4965 5084 40a47a 5014->5084 5016 408cdc 5017 40a47a __FF_MSGBANNER 67 API calls 5016->5017 5021 408ce9 5016->5021 5017->5021 5018 408b35 __amsg_exit 67 API calls 5019 408d01 5018->5019 5022 408b35 __amsg_exit 67 API calls 5019->5022 5020 406537 5023 408b35 5020->5023 5021->5018 5021->5020 5022->5020 5024 408b41 5023->5024 5025 40a47a __FF_MSGBANNER 64 API calls 5024->5025 5056 40653e 5024->5056 5026 408b61 5025->5026 5027 408c9c GetStdHandle 5026->5027 5028 40a47a __FF_MSGBANNER 64 API calls 5026->5028 5029 408caa _strlen 5027->5029 5027->5056 5030 408b72 5028->5030 5032 408cc4 WriteFile 5029->5032 5029->5056 5030->5027 5031 408b84 5030->5031 5031->5056 5116 409fb9 5031->5116 5032->5056 5035 408bba GetModuleFileNameA 5037 408bd8 5035->5037 5042 408bfb _strlen 5035->5042 5039 409fb9 _strcpy_s 64 API calls 5037->5039 5040 408be8 5039->5040 5041 4058c2 __invoke_watson 10 API calls 5040->5041 5040->5042 5041->5042 5043 408c3e 5042->5043 5132 409f06 5042->5132 5141 409e42 5043->5141 5047 408c62 5050 409e42 _strcat_s 64 API calls 5047->5050 5049 4058c2 __invoke_watson 10 API calls 5049->5047 5051 408c73 5050->5051 5053 408c84 5051->5053 5054 4058c2 __invoke_watson 10 API calls 5051->5054 5052 4058c2 __invoke_watson 10 API calls 5052->5043 5150 40a2bd 5053->5150 5054->5053 5057 40636e 5056->5057 5209 406348 GetModuleHandleA 5057->5209 5062 406201 5060->5062 5063 406238 5062->5063 5064 406219 Sleep 5062->5064 5212 408954 5062->5212 5063->4989 5063->4990 5064->5062 5262 406911 GetLastError 5065->5262 5067 405a22 5067->4991 5069 4069bc __locking 5068->5069 5070 4067b2 ___crtInitCritSecAndSpinCount 65 API calls 5069->5070 5071 4069cc 5070->5071 5072 40639b ___crtInitCritSecAndSpinCount 65 API calls 5071->5072 5078 406a20 __locking 5071->5078 5073 4069dc 5072->5073 5074 4069eb 5073->5074 5075 4058c2 __invoke_watson 10 API calls 5073->5075 5076 4069f4 GetModuleHandleA 5074->5076 5077 406a15 5074->5077 5075->5074 5076->5077 5079 406a03 GetProcAddress 5076->5079 5080 40673b ___crtInitCritSecAndSpinCount 65 API calls 5077->5080 5078->5002 5079->5077 5080->5078 5334 406501 LeaveCriticalSection 5081->5334 5083 4065d7 5083->4991 5085 40a485 5084->5085 5086 40a48f 5085->5086 5087 405a1d __dosmaperr 67 API calls 5085->5087 5086->5016 5088 40a4a8 5087->5088 5091 4059be 5088->5091 5094 4067b2 TlsGetValue 5091->5094 5093 4059cc __invoke_watson 5095 4067c5 5094->5095 5096 4067e6 GetModuleHandleA 5094->5096 5095->5096 5097 4067cf TlsGetValue 5095->5097 5098 4067f7 5096->5098 5099 4067de 5096->5099 5101 4067da 5097->5101 5104 4066cf 5098->5104 5099->5093 5101->5096 5101->5099 5102 4067fc 5102->5099 5103 406800 GetProcAddress 5102->5103 5103->5099 5109 4063d2 5104->5109 5106 4066ea 5107 4066f1 ___crtInitCritSecAndSpinCount 5106->5107 5108 4066f5 GetModuleHandleA 5106->5108 5107->5102 5108->5107 5110 4063dd 5109->5110 5111 405a1d __dosmaperr 67 API calls 5110->5111 5112 406402 5110->5112 5113 4063e2 5111->5113 5112->5106 5114 4059be __locking 67 API calls 5113->5114 5115 4063f2 5114->5115 5115->5106 5117 409fc6 5116->5117 5118 409fce 5116->5118 5117->5118 5123 409ff5 5117->5123 5119 405a1d __dosmaperr 67 API calls 5118->5119 5120 409fd3 5119->5120 5121 4059be __locking 67 API calls 5120->5121 5122 408ba6 5121->5122 5122->5035 5125 4058c2 5122->5125 5123->5122 5124 405a1d __dosmaperr 67 API calls 5123->5124 5124->5120 5187 405330 5125->5187 5127 405953 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 5128 405996 GetCurrentProcess TerminateProcess 5127->5128 5129 40598a __invoke_watson 5127->5129 5130 405320 ___ansicp 5 API calls 5128->5130 5129->5128 5131 4059b6 5130->5131 5131->5035 5136 409f16 5132->5136 5133 409f1a 5134 405a1d __dosmaperr 67 API calls 5133->5134 5135 408c2b 5133->5135 5140 409f36 5134->5140 5135->5043 5135->5052 5136->5133 5136->5135 5138 409f60 5136->5138 5137 4059be __locking 67 API calls 5137->5135 5138->5135 5139 405a1d __dosmaperr 67 API calls 5138->5139 5139->5140 5140->5137 5142 409e57 5141->5142 5145 409e4f 5141->5145 5143 405a1d __dosmaperr 67 API calls 5142->5143 5144 409e5c 5143->5144 5146 4059be __locking 67 API calls 5144->5146 5145->5142 5148 409e8c 5145->5148 5147 408c51 5146->5147 5147->5047 5147->5049 5148->5147 5149 405a1d __dosmaperr 67 API calls 5148->5149 5149->5144 5189 4067a9 5150->5189 5153 40a2e5 LoadLibraryA 5154 40a45e 5153->5154 5155 40a2fa GetProcAddress 5153->5155 5154->5056 5155->5154 5158 40a310 5155->5158 5156 40a418 5161 4067b2 ___crtInitCritSecAndSpinCount 61 API calls 5156->5161 5177 40a3fd 5156->5177 5157 40a38d 5157->5156 5159 4067b2 ___crtInitCritSecAndSpinCount 61 API calls 5157->5159 5192 40673b TlsGetValue 5158->5192 5163 40a3ad 5159->5163 5160 4067b2 ___crtInitCritSecAndSpinCount 61 API calls 5160->5154 5171 40a428 5161->5171 5165 4067b2 ___crtInitCritSecAndSpinCount 61 API calls 5163->5165 5173 40a3ba 5165->5173 5166 40673b ___crtInitCritSecAndSpinCount 61 API calls 5167 40a32b GetProcAddress 5166->5167 5168 40673b ___crtInitCritSecAndSpinCount 61 API calls 5167->5168 5169 40a340 5168->5169 5202 40639b 5169->5202 5174 4067b2 ___crtInitCritSecAndSpinCount 61 API calls 5171->5174 5171->5177 5172 40a34e 5175 40a35e 5172->5175 5178 4058c2 __invoke_watson 10 API calls 5172->5178 5173->5156 5176 40a3e5 5173->5176 5174->5177 5175->5157 5179 40a367 GetProcAddress 5175->5179 5180 4063d2 __amsg_exit 61 API calls 5176->5180 5177->5160 5178->5175 5181 40673b ___crtInitCritSecAndSpinCount 61 API calls 5179->5181 5182 40a3ee 5180->5182 5183 40a375 5181->5183 5182->5177 5184 4058c2 __invoke_watson 10 API calls 5182->5184 5183->5157 5185 40a37f GetProcAddress 5183->5185 5184->5177 5186 40673b ___crtInitCritSecAndSpinCount 61 API calls 5185->5186 5186->5157 5188 40533c __VEC_memzero 5187->5188 5188->5127 5190 40673b ___crtInitCritSecAndSpinCount 67 API calls 5189->5190 5191 4067b0 5190->5191 5191->5153 5191->5157 5193 40674e 5192->5193 5194 40676f GetModuleHandleA 5192->5194 5193->5194 5195 406758 TlsGetValue 5193->5195 5196 406780 5194->5196 5201 406767 GetProcAddress 5194->5201 5198 406763 5195->5198 5197 4066cf ___crtInitCritSecAndSpinCount 63 API calls 5196->5197 5199 406785 5197->5199 5198->5194 5198->5201 5200 406789 GetProcAddress 5199->5200 5199->5201 5200->5201 5201->5166 5203 4063a6 5202->5203 5204 4063cc 5203->5204 5205 405a1d __dosmaperr 67 API calls 5203->5205 5204->5172 5206 4063ab 5205->5206 5207 4059be __locking 67 API calls 5206->5207 5208 4063bb 5207->5208 5208->5172 5210 406357 GetProcAddress 5209->5210 5211 406367 ExitProcess 5209->5211 5210->5211 5213 408a01 5212->5213 5218 408962 5212->5218 5214 408f67 _malloc 66 API calls 5213->5214 5215 408a07 5214->5215 5217 405a1d __dosmaperr 66 API calls 5215->5217 5216 408cd5 __FF_MSGBANNER 66 API calls 5216->5218 5219 408a0d 5217->5219 5218->5216 5221 408b35 __amsg_exit 66 API calls 5218->5221 5222 4089c5 HeapAlloc 5218->5222 5223 40636e __mtinitlocknum 3 API calls 5218->5223 5224 4089ec 5218->5224 5227 4089ea 5218->5227 5229 4089f8 5218->5229 5230 408905 5218->5230 5238 408f67 5218->5238 5219->5062 5221->5218 5222->5218 5223->5218 5226 405a1d __dosmaperr 66 API calls 5224->5226 5226->5227 5228 405a1d __dosmaperr 66 API calls 5227->5228 5228->5229 5229->5062 5231 408911 __locking 5230->5231 5232 408942 __locking 5231->5232 5233 4065d9 __lock 67 API calls 5231->5233 5232->5218 5234 408927 5233->5234 5241 4070b0 5234->5241 5239 4067b2 ___crtInitCritSecAndSpinCount 67 API calls 5238->5239 5240 408f72 5239->5240 5240->5218 5244 4070dc 5241->5244 5242 407175 5246 40717e 5242->5246 5257 406faa 5242->5257 5244->5242 5244->5246 5250 406efa 5244->5250 5247 40894b 5246->5247 5261 406501 LeaveCriticalSection 5247->5261 5249 408952 5249->5232 5251 406f41 HeapAlloc 5250->5251 5252 406f0d HeapReAlloc 5250->5252 5254 406f64 VirtualAlloc 5251->5254 5255 406f2b 5251->5255 5253 406f2f 5252->5253 5252->5255 5253->5251 5254->5255 5256 406f7e HeapFree 5254->5256 5255->5242 5256->5255 5258 406fbf VirtualAlloc 5257->5258 5260 407006 5258->5260 5260->5246 5261->5249 5276 406820 TlsGetValue 5262->5276 5265 40697c SetLastError 5265->5067 5268 4067b2 ___crtInitCritSecAndSpinCount 64 API calls 5269 406954 5268->5269 5270 406973 5269->5270 5271 40695b 5269->5271 5273 405c86 ___free_lc_time 64 API calls 5270->5273 5286 406852 5271->5286 5275 406979 5273->5275 5274 406963 GetCurrentThreadId 5274->5265 5275->5265 5277 406833 5276->5277 5278 40684e 5276->5278 5279 4067b2 ___crtInitCritSecAndSpinCount 65 API calls 5277->5279 5278->5265 5281 40623d 5278->5281 5280 40683e TlsSetValue 5279->5280 5280->5278 5284 406241 5281->5284 5283 406280 5283->5265 5283->5268 5284->5283 5285 406261 Sleep 5284->5285 5300 408a17 5284->5300 5285->5284 5317 405a90 5286->5317 5288 40685e GetModuleHandleA 5289 406880 5288->5289 5290 4068af InterlockedIncrement 5288->5290 5291 4066cf ___crtInitCritSecAndSpinCount 63 API calls 5289->5291 5292 4065d9 __lock 63 API calls 5290->5292 5293 406885 5291->5293 5294 4068d6 5292->5294 5293->5290 5295 406889 GetProcAddress GetProcAddress 5293->5295 5318 40865e InterlockedIncrement 5294->5318 5295->5290 5297 4068f5 5330 406908 5297->5330 5299 406902 __locking 5299->5274 5301 408a23 __locking 5300->5301 5302 408a3b 5301->5302 5312 408a5a _memset 5301->5312 5303 405a1d __dosmaperr 66 API calls 5302->5303 5304 408a40 5303->5304 5305 4059be __locking 66 API calls 5304->5305 5309 408a50 __locking 5305->5309 5306 408acc HeapAlloc 5306->5312 5307 408f67 _malloc 66 API calls 5307->5312 5308 4065d9 __lock 66 API calls 5308->5312 5309->5284 5310 4070b0 ___sbh_alloc_block 5 API calls 5310->5312 5312->5306 5312->5307 5312->5308 5312->5309 5312->5310 5313 408b13 5312->5313 5316 406501 LeaveCriticalSection 5313->5316 5315 408b1a 5315->5312 5316->5315 5317->5288 5319 408679 InterlockedIncrement 5318->5319 5320 40867c 5318->5320 5319->5320 5321 408686 InterlockedIncrement 5320->5321 5322 408689 5320->5322 5321->5322 5323 408693 InterlockedIncrement 5322->5323 5324 408696 5322->5324 5323->5324 5325 4086a0 InterlockedIncrement 5324->5325 5327 4086a3 5324->5327 5325->5327 5326 4086b8 InterlockedIncrement 5326->5327 5327->5326 5328 4086c8 InterlockedIncrement 5327->5328 5329 4086d1 InterlockedIncrement 5327->5329 5328->5327 5329->5297 5333 406501 LeaveCriticalSection 5330->5333 5332 40690f 5332->5299 5333->5332 5334->5083 5336 4056a7 5335->5336 5337 4056b9 LeaveCriticalSection 5335->5337 5340 406501 LeaveCriticalSection 5336->5340 5337->4977 5339 4056b7 5339->4977 5340->5339 5341->4980 5343 4054b9 __locking 5342->5343 5344 4054ea 5343->5344 5345 4054cd 5343->5345 5353 4054e2 __locking 5344->5353 5358 4055fa 5344->5358 5346 405a1d __dosmaperr 67 API calls 5345->5346 5347 4054d2 5346->5347 5349 4059be __locking 67 API calls 5347->5349 5349->5353 5350 405502 5364 40543b 5350->5364 5353->4934 5650 406501 LeaveCriticalSection 5355->5650 5357 406322 5357->4936 5359 405608 5358->5359 5360 40562a EnterCriticalSection 5358->5360 5359->5360 5361 405610 5359->5361 5360->5350 5362 4065d9 __lock 67 API calls 5361->5362 5363 405620 5362->5363 5363->5350 5365 405467 5364->5365 5366 40544b 5364->5366 5372 405460 5365->5372 5383 405ea1 5365->5383 5367 405a1d __dosmaperr 67 API calls 5366->5367 5368 405450 5367->5368 5370 4059be __locking 67 API calls 5368->5370 5370->5372 5380 405521 5372->5380 5376 405481 5400 405da8 5376->5400 5378 405487 5378->5372 5379 405c86 ___free_lc_time 67 API calls 5378->5379 5379->5372 5643 405664 5380->5643 5382 405527 5382->5353 5384 405473 5383->5384 5385 405eb6 5383->5385 5389 405e75 5384->5389 5385->5384 5386 405a61 __flush 67 API calls 5385->5386 5387 405ed0 5386->5387 5423 407b0d 5387->5423 5390 405e81 5389->5390 5391 40547b 5389->5391 5390->5391 5392 405c86 ___free_lc_time 67 API calls 5390->5392 5393 405a61 5391->5393 5392->5391 5394 405a89 5393->5394 5395 405a6c 5393->5395 5394->5376 5396 405a1d __dosmaperr 67 API calls 5395->5396 5397 405a71 5396->5397 5398 4059be __locking 67 API calls 5397->5398 5399 405a81 5398->5399 5399->5376 5401 405db4 __locking 5400->5401 5402 405dd7 5401->5402 5403 405dbc 5401->5403 5405 405de5 5402->5405 5409 405e26 5402->5409 5404 405a30 __dosmaperr 67 API calls 5403->5404 5407 405dc1 5404->5407 5406 405a30 __dosmaperr 67 API calls 5405->5406 5408 405dea 5406->5408 5410 405a1d __dosmaperr 67 API calls 5407->5410 5411 405a1d __dosmaperr 67 API calls 5408->5411 5412 407485 __locking 68 API calls 5409->5412 5413 405dc9 __locking 5410->5413 5414 405df1 5411->5414 5415 405e2c 5412->5415 5413->5378 5416 4059be __locking 67 API calls 5414->5416 5417 405e47 5415->5417 5418 405e39 5415->5418 5416->5413 5420 405a1d __dosmaperr 67 API calls 5417->5420 5615 405d14 5418->5615 5421 405e41 5420->5421 5630 405e6b 5421->5630 5424 407b19 __locking 5423->5424 5425 407b21 5424->5425 5426 407b3c 5424->5426 5448 405a30 5425->5448 5428 407b4a 5426->5428 5432 407b8b 5426->5432 5429 405a30 __dosmaperr 67 API calls 5428->5429 5431 407b4f 5429->5431 5434 405a1d __dosmaperr 67 API calls 5431->5434 5451 407485 5432->5451 5433 405a1d __dosmaperr 67 API calls 5441 407b2e __locking 5433->5441 5436 407b56 5434->5436 5438 4059be __locking 67 API calls 5436->5438 5437 407b91 5439 407bb4 5437->5439 5440 407b9e 5437->5440 5438->5441 5443 405a1d __dosmaperr 67 API calls 5439->5443 5461 407547 5440->5461 5441->5384 5445 407bb9 5443->5445 5444 407bac 5518 407bdf 5444->5518 5446 405a30 __dosmaperr 67 API calls 5445->5446 5446->5444 5449 406911 _raise 67 API calls 5448->5449 5450 405a35 5449->5450 5450->5433 5452 407491 __locking 5451->5452 5453 4074ec 5452->5453 5456 4065d9 __lock 67 API calls 5452->5456 5454 4074f1 EnterCriticalSection 5453->5454 5455 40750e __locking 5453->5455 5454->5455 5455->5437 5457 4074bd 5456->5457 5458 4069b0 ___crtInitCritSecAndSpinCount 67 API calls 5457->5458 5460 4074d4 5457->5460 5458->5460 5521 40751c 5460->5521 5462 407583 5461->5462 5492 40757c 5461->5492 5463 407587 5462->5463 5464 4075ae 5462->5464 5466 405a30 __dosmaperr 67 API calls 5463->5466 5469 407618 5464->5469 5470 4075f2 5464->5470 5465 405320 ___ansicp 5 API calls 5468 407b05 5465->5468 5467 40758c 5466->5467 5472 405a1d __dosmaperr 67 API calls 5467->5472 5468->5444 5471 40762a 5469->5471 5525 409018 5469->5525 5473 405a30 __dosmaperr 67 API calls 5470->5473 5535 407e03 5471->5535 5475 407593 5472->5475 5477 4075f7 5473->5477 5478 4059be __locking 67 API calls 5475->5478 5480 405a1d __dosmaperr 67 API calls 5477->5480 5478->5492 5479 407633 5481 407832 5479->5481 5545 406988 5479->5545 5482 407600 5480->5482 5483 407840 5481->5483 5484 407a65 WriteFile 5481->5484 5485 4059be __locking 67 API calls 5482->5485 5486 4078e3 5483->5486 5493 407852 5483->5493 5487 407a8c GetLastError 5484->5487 5497 40782d 5484->5497 5485->5492 5499 4078ed 5486->5499 5507 40798a 5486->5507 5487->5497 5489 407ac6 5489->5492 5495 405a1d __dosmaperr 67 API calls 5489->5495 5491 407672 5491->5481 5496 407680 GetConsoleCP 5491->5496 5492->5465 5493->5489 5494 40789d WriteFile 5493->5494 5493->5497 5494->5487 5494->5493 5500 407ab3 5495->5500 5496->5497 5514 4076a0 5496->5514 5497->5489 5497->5492 5502 407aa6 5497->5502 5498 407940 WriteFile 5498->5487 5498->5499 5499->5489 5499->5497 5499->5498 5509 405a30 __dosmaperr 67 API calls 5500->5509 5501 4079e0 WideCharToMultiByte 5501->5487 5503 407a13 WriteFile 5501->5503 5504 407abb 5502->5504 5505 407aae 5502->5505 5506 407a41 GetLastError 5503->5506 5503->5507 5553 405a43 5504->5553 5510 405a1d __dosmaperr 67 API calls 5505->5510 5506->5507 5507->5489 5507->5497 5507->5501 5507->5503 5509->5492 5510->5500 5512 4095da 79 API calls __write_nolock 5512->5514 5513 407718 WideCharToMultiByte 5513->5497 5515 407746 WriteFile 5513->5515 5514->5487 5514->5497 5514->5512 5514->5513 5516 409405 11 API calls __putwch_nolock 5514->5516 5517 40777f WriteFile 5514->5517 5550 40885a 5514->5550 5515->5487 5515->5514 5516->5514 5517->5487 5517->5514 5614 407525 LeaveCriticalSection 5518->5614 5520 407be7 5520->5441 5524 406501 LeaveCriticalSection 5521->5524 5523 407523 5523->5453 5524->5523 5558 407414 5525->5558 5527 409034 5528 40903c 5527->5528 5529 40904d SetFilePointer 5527->5529 5530 405a1d __dosmaperr 67 API calls 5528->5530 5531 409065 GetLastError 5529->5531 5532 409041 5529->5532 5530->5532 5531->5532 5533 40906f 5531->5533 5532->5471 5534 405a43 __dosmaperr 67 API calls 5533->5534 5534->5532 5536 407e1a 5535->5536 5537 407e0c 5535->5537 5540 407e45 5536->5540 5541 405a1d __dosmaperr 67 API calls 5536->5541 5538 405a1d __dosmaperr 67 API calls 5537->5538 5539 407e11 5538->5539 5539->5479 5540->5479 5542 407e2e 5541->5542 5543 4059be __locking 67 API calls 5542->5543 5544 407e3e 5543->5544 5544->5479 5546 406911 _raise 67 API calls 5545->5546 5547 40698e 5546->5547 5548 406324 __amsg_exit 67 API calls 5547->5548 5549 40699b GetConsoleMode 5547->5549 5548->5549 5549->5481 5549->5491 5572 408824 5550->5572 5554 405a30 __dosmaperr 67 API calls 5553->5554 5555 405a49 __dosmaperr 5554->5555 5556 405a1d __dosmaperr 67 API calls 5555->5556 5557 405a5d 5556->5557 5557->5492 5559 407434 5558->5559 5560 40741d 5558->5560 5563 405a30 __dosmaperr 67 API calls 5559->5563 5565 407481 5559->5565 5561 405a30 __dosmaperr 67 API calls 5560->5561 5562 407422 5561->5562 5564 405a1d __dosmaperr 67 API calls 5562->5564 5566 407462 5563->5566 5567 40742a 5564->5567 5565->5527 5568 405a1d __dosmaperr 67 API calls 5566->5568 5567->5527 5569 407469 5568->5569 5570 4059be __locking 67 API calls 5569->5570 5571 407479 5570->5571 5571->5527 5575 40617b 5572->5575 5576 40618a 5575->5576 5582 4061d7 5575->5582 5577 406988 __write_nolock 67 API calls 5576->5577 5578 40618f 5577->5578 5579 4061b7 5578->5579 5583 4087ae 5578->5583 5579->5582 5598 40806f 5579->5598 5582->5514 5584 4087ba __locking 5583->5584 5585 406988 __write_nolock 67 API calls 5584->5585 5586 4087bf 5585->5586 5587 4087ed 5586->5587 5588 4087d1 5586->5588 5589 4065d9 __lock 67 API calls 5587->5589 5590 406988 __write_nolock 67 API calls 5588->5590 5591 4087f4 5589->5591 5592 4087d6 5590->5592 5593 408770 _LocaleUpdate::_LocaleUpdate 75 API calls 5591->5593 5595 4087e4 __locking 5592->5595 5597 406324 __amsg_exit 67 API calls 5592->5597 5594 408807 5593->5594 5596 408818 _LocaleUpdate::_LocaleUpdate LeaveCriticalSection 5594->5596 5595->5579 5596->5592 5597->5595 5599 40807b __locking 5598->5599 5600 406988 __write_nolock 67 API calls 5599->5600 5601 408080 5600->5601 5602 4065d9 __lock 67 API calls 5601->5602 5606 408092 5601->5606 5603 4080b0 5602->5603 5604 4080f9 5603->5604 5607 4080e1 InterlockedIncrement 5603->5607 5608 4080c7 InterlockedDecrement 5603->5608 5609 40810a _LocaleUpdate::_LocaleUpdate LeaveCriticalSection 5604->5609 5605 4080a0 __locking 5605->5582 5606->5605 5610 406324 __amsg_exit 67 API calls 5606->5610 5607->5604 5608->5607 5611 4080d2 5608->5611 5609->5606 5610->5605 5611->5607 5612 405c86 ___free_lc_time 67 API calls 5611->5612 5613 4080e0 5612->5613 5613->5607 5614->5520 5616 407414 __lseeki64_nolock 67 API calls 5615->5616 5619 405d20 5616->5619 5617 405d73 5633 407393 5617->5633 5619->5617 5622 407414 __lseeki64_nolock 67 API calls 5619->5622 5629 405d51 5619->5629 5620 407414 __lseeki64_nolock 67 API calls 5623 405d5d CloseHandle 5620->5623 5624 405d48 5622->5624 5623->5617 5625 405d69 GetLastError 5623->5625 5627 407414 __lseeki64_nolock 67 API calls 5624->5627 5625->5617 5626 405a43 __dosmaperr 67 API calls 5628 405d9d 5626->5628 5627->5629 5628->5421 5629->5617 5629->5620 5642 407525 LeaveCriticalSection 5630->5642 5632 405e73 5632->5413 5634 4073fb 5633->5634 5635 4073a0 5633->5635 5636 405a1d __dosmaperr 67 API calls 5634->5636 5635->5634 5640 4073cb 5635->5640 5637 407400 5636->5637 5638 405a30 __dosmaperr 67 API calls 5637->5638 5639 405d7b 5638->5639 5639->5626 5639->5628 5640->5639 5641 4073eb SetStdHandle 5640->5641 5641->5639 5642->5632 5644 405671 5643->5644 5645 40568f LeaveCriticalSection 5643->5645 5644->5645 5646 405678 5644->5646 5645->5382 5649 406501 LeaveCriticalSection 5646->5649 5648 40568d 5648->5382 5649->5648 5650->5357 5652 406c23 5651->5652 5657 406ec5 5651->5657 5653 406e0f VirtualFree 5652->5653 5652->5657 5654 406e73 5653->5654 5655 406e82 VirtualFree HeapFree 5654->5655 5654->5657 5661 4090a0 5655->5661 5657->4949 5665 406501 LeaveCriticalSection 5658->5665 5660 405ce3 5660->4942 5662 4090b8 5661->5662 5663 4090df __VEC_memcpy 5662->5663 5664 4090e7 5662->5664 5663->5664 5664->5657 5665->5660 4627 40269d 4628 402797 PostMessageA 4627->4628 4629 4026ac 4627->4629 4631 4026da 4628->4631 4629->4628 4630 4026b4 4629->4630 4632 40275a SetWindowTextA PostMessageA ShowWindow 4630->4632 4633 4026bf 4630->4633 4632->4631 4633->4631 4634 4026cb 4633->4634 4635 40273e CreateThread 4633->4635 4636 4026d0 4634->4636 4637 402725 EndDialog 4634->4637 4635->4631 4658 402325 lstrcatA GetFullPathNameA 4635->4658 4638 402706 CreateThread 4636->4638 4639 4026d7 4636->4639 4637->4631 4638->4631 4641 402516 lstrlenA 4638->4641 4639->4631 4640 4026e1 EndDialog 4639->4640 4640->4631 4642 402666 4641->4642 4647 402549 _memset 4641->4647 4643 402686 4642->4643 4644 40266e CreateThread 4642->4644 4645 405320 ___ansicp 5 API calls 4643->4645 4644->4643 4682 4019cb GetDlgItem 4644->4682 4646 402695 4645->4646 4648 401957 9 API calls 4647->4648 4649 402595 GetCurrentDirectoryA SetCurrentDirectoryA 4648->4649 4650 40142e 38 API calls 4649->4650 4651 4025b9 lstrcpyA 4650->4651 4652 401957 9 API calls 4651->4652 4653 4025d4 CreateProcessA 4652->4653 4654 4025f5 ShowWindow WaitForSingleObject CloseHandle CloseHandle 4653->4654 4655 40261f _memset 4653->4655 4656 40265c SetCurrentDirectoryA 4654->4656 4657 402631 wsprintfA MessageBoxA 4655->4657 4656->4642 4657->4656 4713 405049 CreateFileA 4658->4713 4661 402399 4662 4023a9 GetDlgItem SendMessageA 4661->4662 4663 40239f 4661->4663 4665 4023e0 4662->4665 4666 4024a2 4662->4666 4664 401039 9 API calls 4663->4664 4664->4662 4665->4666 4674 402502 4665->4674 4675 40241e wsprintfA SetDlgItemTextA Sleep 4665->4675 4680 402483 SendMessageA 4665->4680 4737 404bf9 4665->4737 4771 4028f0 VirtualAlloc 4665->4771 4775 404c5f 4665->4775 4779 404fcd 4666->4779 4671 4024b2 4672 4024ea 4671->4672 4673 4024be SendMessageA Sleep PostMessageA 4671->4673 4676 405320 ___ansicp 5 API calls 4672->4676 4673->4672 4740 401bdd 4675->4740 4678 4024fa 4676->4678 4680->4665 4680->4666 4703 40296e 4682->4703 4684 401a03 SetDlgItemTextA SetDlgItemTextA SetDlgItemTextA 4704 40296e 4684->4704 4686 401a4b SendMessageA SetDlgItemTextA 4687 401a81 Sleep 4686->4687 4701 401a8c 4686->4701 4687->4701 4688 401aaf wsprintfA 4688->4701 4689 401b94 RemoveDirectoryA 4691 401bb3 PostMessageA 4689->4691 4692 401ba8 Sleep 4689->4692 4690 401b79 _strlen 4690->4689 4694 405320 ___ansicp 5 API calls 4691->4694 4692->4691 4693 401ac7 wsprintfA SetDlgItemTextA 4693->4701 4695 401bd6 4694->4695 4696 4013bb GetFileAttributesA 4696->4701 4697 401b1b RemoveDirectoryA 4697->4701 4699 401b35 DeleteFileA 4699->4701 4701->4688 4701->4690 4701->4693 4701->4696 4701->4697 4701->4699 4702 401b4f SendMessageA Sleep 4701->4702 4705 401379 4701->4705 4710 402941 4701->4710 4702->4701 4703->4684 4704->4686 4706 4011f0 8 API calls 4705->4706 4707 401399 4706->4707 4708 4011f0 8 API calls 4707->4708 4709 4013a2 GetFileAttributesA 4708->4709 4709->4701 4711 40294a 4710->4711 4712 40294e VirtualFree 4710->4712 4711->4701 4712->4701 4791 404803 SetFilePointer 4713->4791 4716 405096 4799 40478e 4716->4799 4721 40474a ReadFile 4722 4050c8 4721->4722 4723 40474a ReadFile 4722->4723 4724 4050db 4723->4724 4725 40474a ReadFile 4724->4725 4726 4050ee 4725->4726 4727 40478e ReadFile 4726->4727 4728 405118 4727->4728 4729 40478e ReadFile 4728->4729 4730 40512b 4729->4730 4731 40474a ReadFile 4730->4731 4733 40513e 4731->4733 4732 405162 CloseHandle 4735 40237a Sleep 4732->4735 4733->4732 4734 40516d VirtualAlloc 4733->4734 4813 404c20 4734->4813 4735->4661 4738 404934 7 API calls 4737->4738 4739 404c1b 4738->4739 4739->4665 4741 401c27 _memset 4740->4741 4742 404bf9 7 API calls 4741->4742 4746 401c42 4742->4746 4743 401c53 VirtualAlloc 4745 401c9a wsprintfA 4743->4745 4743->4746 4744 401c49 4748 401039 9 API calls 4744->4748 4762 4010fc lstrlenA 4744->4762 4884 401342 4744->4884 4747 401957 9 API calls 4745->4747 4746->4743 4746->4744 4746->4745 4751 401cda wsprintfA 4746->4751 4755 401d07 GetFullPathNameA 4746->4755 4760 401df1 WriteFile 4746->4760 4761 401e07 DosDateTimeToFileTime LocalFileTimeToFileTime SetFileTime FindCloseChangeNotification VirtualFree 4746->4761 4879 404e53 4746->4879 4749 401cbc lstrcpyA 4747->4749 4748->4743 4750 401813 18 API calls 4749->4750 4765 401cd3 4750->4765 4869 4051e3 4751->4869 4753 405320 ___ansicp 5 API calls 4754 401e64 4753->4754 4754->4665 4756 401957 9 API calls 4755->4756 4757 401d23 lstrcpyA CreateFileA 4756->4757 4757->4744 4757->4746 4760->4746 4763 404fcd 2 API calls 4761->4763 4764 401d81 lstrlenA 4762->4764 4763->4765 4766 401342 lstrlenA 4764->4766 4765->4753 4767 401d9c 4766->4767 4768 4010be VirtualAlloc 4767->4768 4769 401813 18 API calls 4767->4769 4768->4767 4770 401da9 CreateFileA 4769->4770 4770->4746 4772 40290b 4771->4772 4773 40290d lstrcpyA 4771->4773 4772->4665 4774 402922 4773->4774 4774->4665 4776 404c6b 4775->4776 4777 404c70 4775->4777 4776->4665 4777->4776 4778 404934 7 API calls 4777->4778 4778->4776 4780 4024aa 4779->4780 4781 404fe2 4779->4781 4785 4051ae 4780->4785 4781->4780 4782 405018 VirtualFree 4781->4782 4783 40501f 4781->4783 4782->4783 4784 405033 VirtualFree 4783->4784 4784->4780 4786 4051b7 4785->4786 4787 4051bc 4785->4787 4786->4671 4788 4051c9 FindCloseChangeNotification VirtualFree 4787->4788 4789 404fcd 2 API calls 4787->4789 4788->4671 4790 4051c8 4789->4790 4790->4788 4792 404840 VirtualAlloc 4791->4792 4793 404839 SetFilePointer 4791->4793 4792->4793 4798 404863 4792->4798 4793->4716 4795 4048fe VirtualFree 4795->4793 4796 40489b SetFilePointer 4796->4795 4797 4048aa ReadFile 4796->4797 4797->4795 4797->4798 4798->4795 4798->4796 4817 404711 ReadFile 4799->4817 4802 404711 ReadFile 4805 4047b4 4802->4805 4803 404711 ReadFile 4804 4047cc 4803->4804 4806 404711 ReadFile 4804->4806 4807 4047e4 4804->4807 4805->4803 4805->4804 4806->4807 4808 40474a 4807->4808 4809 404711 ReadFile 4808->4809 4810 40475b 4809->4810 4811 404770 4810->4811 4812 404711 ReadFile 4810->4812 4811->4721 4812->4811 4814 404c31 4813->4814 4815 404c2c 4813->4815 4819 404934 4814->4819 4815->4735 4818 404731 4817->4818 4818->4802 4818->4805 4820 404946 4819->4820 4821 40494e SetFilePointer 4819->4821 4820->4815 4822 404968 4821->4822 4823 404973 4821->4823 4824 40478e ReadFile 4822->4824 4825 40474a ReadFile 4823->4825 4824->4823 4826 404999 4825->4826 4827 40474a ReadFile 4826->4827 4828 4049ad 4827->4828 4829 40474a ReadFile 4828->4829 4830 4049c1 4829->4830 4831 40474a ReadFile 4830->4831 4832 4049d5 4831->4832 4833 40478e ReadFile 4832->4833 4834 4049e9 4833->4834 4835 40478e ReadFile 4834->4835 4836 4049fd 4835->4836 4837 40478e ReadFile 4836->4837 4838 404a11 4837->4838 4839 40478e ReadFile 4838->4839 4840 404a25 4839->4840 4841 40474a ReadFile 4840->4841 4842 404a39 4841->4842 4843 40474a ReadFile 4842->4843 4844 404a4d 4843->4844 4845 40474a ReadFile 4844->4845 4846 404a61 4845->4846 4847 40474a ReadFile 4846->4847 4848 404a75 4847->4848 4849 40474a ReadFile 4848->4849 4850 404a89 4849->4850 4851 40478e ReadFile 4850->4851 4852 404a9d 4851->4852 4853 40478e ReadFile 4852->4853 4854 404ab1 4853->4854 4855 404b00 4854->4855 4858 404b64 4854->4858 4859 404ae8 ReadFile 4854->4859 4856 404b24 SetFilePointer 4855->4856 4857 404b3e 4855->4857 4855->4858 4860 404b36 4856->4860 4857->4858 4861 404b48 ReadFile 4857->4861 4858->4820 4863 404b95 SetFilePointer 4858->4863 4864 404baa 4858->4864 4859->4855 4862 404afc 4859->4862 4860->4857 4861->4858 4865 404b60 4861->4865 4862->4855 4863->4864 4866 404ba7 4863->4866 4864->4820 4867 404bb4 ReadFile 4864->4867 4865->4858 4866->4864 4867->4820 4868 404bcc 4867->4868 4868->4820 4870 4051f3 4869->4870 4871 4051fb 4869->4871 4870->4746 4871->4870 4872 40520b 4871->4872 4873 404fcd 2 API calls 4871->4873 4888 404cba SetFilePointer 4872->4888 4873->4872 4876 405228 VirtualAlloc 4876->4870 4877 40523f VirtualAlloc 4876->4877 4877->4870 4878 405268 VirtualFree 4877->4878 4878->4870 4880 404e69 4879->4880 4881 404e71 4879->4881 4880->4746 4881->4880 4882 404ed4 SetFilePointer 4881->4882 4882->4880 4883 404eee ReadFile 4882->4883 4883->4880 4883->4881 4885 40134b 4884->4885 4887 401362 4884->4887 4886 401350 lstrlenA 4885->4886 4885->4887 4886->4887 4887->4744 4887->4887 4889 404cf1 4888->4889 4909 404cea 4888->4909 4890 40478e ReadFile 4889->4890 4891 404cfc 4890->4891 4892 40474a ReadFile 4891->4892 4893 404d1d 4892->4893 4894 40474a ReadFile 4893->4894 4895 404d30 4894->4895 4896 40474a ReadFile 4895->4896 4897 404d43 4896->4897 4898 40478e ReadFile 4897->4898 4899 404d70 4898->4899 4900 40478e ReadFile 4899->4900 4901 404d83 4900->4901 4902 40478e ReadFile 4901->4902 4904 404dad 4902->4904 4903 40478e ReadFile 4905 404dd7 4903->4905 4904->4903 4906 40474a ReadFile 4905->4906 4908 404e01 4906->4908 4907 40474a ReadFile 4907->4909 4908->4907 4909->4870 4909->4876 5943 40a71d 5944 40a755 5943->5944 5945 40a72b 5943->5945 5945->5944 5947 408d3d 5945->5947 5948 408d49 __locking 5947->5948 5949 406988 __write_nolock 67 API calls 5948->5949 5951 408d4e 5949->5951 5950 40a4c0 _abort 69 API calls 5952 408d70 __locking 5950->5952 5951->5950 5952->5944

                                              Control-flow Graph

                                              APIs
                                              • _memset.LIBCMT ref: 00401EA3
                                              • _memset.LIBCMT ref: 00401EB7
                                              • _memset.LIBCMT ref: 00401EC5
                                              • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000000), ref: 00401EE9
                                              • GetTempPathA.KERNEL32(00000000,?,?,?,?,?,?,00000000,00000000), ref: 00401EF0
                                              • GetCurrentDirectoryA.KERNEL32(00000104,C:\Users\user\Desktop,?,?,?,?,?,?,00000000,00000000), ref: 00401F01
                                              • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 00401F07
                                              • GetModuleFileNameA.KERNEL32(00000000,00414F20,00000104,?,?,?,?,?,?,00000000,00000000), ref: 00401F1A
                                              • CreateFileA.KERNELBASE(00414F20,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00000000,00000000), ref: 00401F2D
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,?,00000000,00000000), ref: 00401F42
                                              • SetFilePointer.KERNELBASE(000000FD,00000000,00000001,?,?,?,?,?,?,00000000,00000000), ref: 00401F7B
                                              • ReadFile.KERNELBASE(?,00000004,?,00000000,?,?,?,?,?,?,00000000,00000000), ref: 00401FA1
                                              • SetFilePointer.KERNELBASE(000000FD,00000000,00000001,?,?,?,?,?,?,00000000,00000000), ref: 00401FE8
                                              • ReadFile.KERNELBASE(?,00000004,?,00000000,Could not read the source SFX.,?,?,?,?,?,?,00000000,00000000), ref: 0040200E
                                              • SetFilePointer.KERNELBASE(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000), ref: 00402032
                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,?,?,?,?,?,00000000,00000000), ref: 00402044
                                              • ReadFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000,00000000), ref: 0040205C
                                              • GetTempPathA.KERNEL32(00000104,?,?,?,?,?,?,?,00000000,00000000), ref: 0040206A
                                              • GetTempFileNameA.KERNELBASE(?,0040B5E0,00000000,?,?,?,?,?,?,?,00000000,00000000), ref: 00402085
                                              • CreateFileA.KERNELBASE(?,40000000,00000003,00000000,00000002,00000000,00000000,?,?,?,?,?,?,00000000,00000000), ref: 0040209E
                                              • WriteFile.KERNELBASE(00000000,?,?,00000000,?,?,?,?,?,?,00000000,00000000), ref: 004020C5
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 004020D1
                                              • GetPrivateProfileIntA.KERNEL32(0040B5E0,ZipSize,00000000,?), ref: 004020EB
                                              • GetPrivateProfileIntA.KERNEL32(0040B5E0,Delete,00000000,?), ref: 00402100
                                              • GetPrivateProfileIntA.KERNEL32(0040B5E0,NoGUI,00000000,?), ref: 00402115
                                              • GetPrivateProfileIntA.KERNEL32(0040B5E0,Debug,00000000,?), ref: 0040212A
                                              • GetPrivateProfileStringA.KERNEL32(0040B5E0,Name,Unnamed Archive,ZOC Installation,000000FF,?), ref: 00402153
                                              • GetPrivateProfileStringA.KERNEL32(0040B5E0,Exec,0040B280,.\setup.exe\,000000FF,?), ref: 00402171
                                              • GetPrivateProfileStringA.KERNEL32(0040B5E0,DefaultPath,0040B280,C:\Users\user\AppData\Local\Temp\~emtec~354033,00000104,?), ref: 0040218F
                                              • GetPrivateProfileStringA.KERNEL32(0040B5E0,Intro,0040B280,004143C0,00000400,?), ref: 004021AD
                                              • GetPrivateProfileStringA.KERNEL32(0040B5E0,AutoExtract,FALSE,?,00000006,?), ref: 004021C7
                                              • GetPrivateProfileStringA.KERNEL32(0040B5E0,OpenFolder,FALSE,?,00000006,?), ref: 004021E1
                                              • GetPrivateProfileStringA.KERNEL32(0040B5E0,URL,0040B280,00410910,00000080,?), ref: 004021FF
                                              • GetPrivateProfileStringA.KERNEL32(0040B5E0,Author,0040B280,00410E10,000000FF,?), ref: 0040221D
                                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\~emtec~354033,?,?,?,?,?,?,00000000,00000000), ref: 00402267
                                              • lstrcpyA.KERNEL32(C:\Users\user\AppData\Local\Temp\~emtec~354033,$curdir$,?,?,?,?,?,?,00000000,00000000), ref: 0040228C
                                              • lstrcpyA.KERNEL32(?,00000000,?,?,?,?,?,?,00000000,00000000), ref: 0040229A
                                              • lstrcpyA.KERNEL32(C:\Users\user\AppData\Local\Temp\~emtec~354033,?,?,?,?,?,?,?,00000000,00000000), ref: 004022A1
                                              • lstrcpyA.KERNEL32(C:\Users\user\AppData\Local\Temp\~emtec~354033\,C:\Users\user\AppData\Local\Temp\~emtec~354033,?,?,?,?,?,?,00000000,00000000), ref: 004022A9
                                              • lstrcpyA.KERNEL32(C:\Users\user\AppData\Local\Temp\~emtec~354033,00000000,?,?,?,?,?,?,00000000,00000000), ref: 004022B4
                                              • lstrcpyA.KERNEL32(C:\Users\user\AppData\Local\Temp\~emtec~354033\,00000000,?,?,?,?,?,?,00000000,00000000), ref: 004022C4
                                              • VirtualFree.KERNELBASE(00000000,00008000,?,?,?,?,?,?,00000000,00000000), ref: 004022F0
                                              • DeleteFileA.KERNELBASE(?,?,?,?,?,?,?,00000000,00000000), ref: 004022FD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: File$PrivateProfile$String$lstrcpy$Pointer$ReadTemp_memset$CreateCurrentNamePathVirtuallstrlen$AllocCloseDeleteDirectoryFreeHandleModuleProcessWrite
                                              • String ID: OA$$curdir$$$temp$$.\setup.exe\$Author$AutoExtract$C:\Users\user\AppData\Local\Temp\~emtec~354033$C:\Users\user\AppData\Local\Temp\~emtec~354033\$C:\Users\user\Desktop$Can't write temp file$Could not get file info. This archive is likely corrupted.$Could not read the source SFX.$Debug$DefaultPath$Delete$Exec$FALSE$Intro$Name$NoGUI$OpenFolder$URL$Unnamed Archive$ZOC Installation$ZipSize
                                              • API String ID: 3255873264-1124220831
                                              • Opcode ID: df61d446c2bfc078714f80d42b1de2b837ac060e2c40b2def2cfc33245c28dce
                                              • Instruction ID: 1a3fabdc81bed6bcdf13e4d3adf4703258411a5fcca0f91ac66744013bc12ab1
                                              • Opcode Fuzzy Hash: df61d446c2bfc078714f80d42b1de2b837ac060e2c40b2def2cfc33245c28dce
                                              • Instruction Fuzzy Hash: 67C191B1581248BEEB219BA09C49FEF3B6CEF45704F14407BF905B61E0D7B85A448BAD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8b36aa0aa2268c91353dfe6a5efdf39a749a29305728033311bb681a434b3eee
                                              • Instruction ID: 62788a7c821a69d6522376510c136064b83e62b8c1f062fc13667314c3e4bad1
                                              • Opcode Fuzzy Hash: 8b36aa0aa2268c91353dfe6a5efdf39a749a29305728033311bb681a434b3eee
                                              • Instruction Fuzzy Hash: B9425D71910609EFCB24CF69C584AAEBBF5FF08315F10852EE85AA7680D378EA51DF44
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 55 40142e-4014a8 call 405330 * 2 VirtualAlloc call 4010be 62 4014b3-4014b8 lstrcatA 55->62 63 4014aa-4014b1 55->63 64 4014be-4014d2 call 4010fc 62->64 63->64 67 4014f4-4014f7 64->67 68 4014d4-4014df call 4011f0 67->68 69 4014f9-401516 ExpandEnvironmentStringsA call 4012eb 67->69 73 4014e4-4014f1 call 4010fc 68->73 74 4017af-4017d1 lstrcpyA call 4012a3 69->74 73->67 79 4017d7-4017db 74->79 80 40151b-401530 call 4012a3 74->80 82 4017f8-401812 call 405320 79->82 83 4017dd-4017f6 lstrlenA call 4010be lstrcpyA 79->83 87 401532-40155e call 405330 call 4013d7 80->87 88 401563-401578 call 4012a3 80->88 83->82 102 401777-40177d 87->102 96 401588-40159d call 4012a3 88->96 97 40157a-401586 88->97 104 4015ad-4015c2 call 4012a3 96->104 105 40159f-4015ab 96->105 100 4015f5-4015fc call 4013d7 97->100 100->102 106 40177e-401783 lstrcpyA 102->106 112 4015d2-4015e7 call 4012a3 104->112 113 4015c4-4015d0 104->113 105->100 109 401795-4017aa lstrcatA call 4012eb 106->109 109->74 116 401601-401616 call 4012a3 112->116 117 4015e9-4015f0 112->117 113->100 120 401622-401637 call 4012a3 116->120 121 401618-40161d 116->121 117->100 124 401639-401647 GetCurrentDirectoryA 120->124 125 40164c-401661 call 4012a3 120->125 121->106 124->102 128 401663-40169e call 405330 call 4013d7 lstrlenA 125->128 129 4016da-4016ef call 4012a3 125->129 141 4016a0-4016ac lstrcatA 128->141 142 4016b2-4016c1 call 4013bb 128->142 134 4016f1-40171c lstrcpyA RegOpenKeyExA 129->134 135 401752-401767 call 4012a3 129->135 134->102 137 40171e-401750 RegQueryValueExA RegCloseKey 134->137 144 401785-40178f lstrcatA 135->144 145 401769-401771 GetSystemDirectoryA 135->145 137->102 141->142 142->102 147 4016c7-4016d5 GetTempPathA 142->147 144->109 145->102 147->102
                                              APIs
                                              • _memset.LIBCMT ref: 00401465
                                              • _memset.LIBCMT ref: 00401479
                                              • VirtualAlloc.KERNELBASE(00000000,00000105,00001000,00000004,?,?,?,759183C0,C:\Users\user\AppData\Local\Temp\~emtec~354033,00000000), ref: 0040148E
                                                • Part of subcall function 004010BE: VirtualAlloc.KERNELBASE(00000000,004014A0,00001000,00000004,00000103,00000000,0040149F,?,00000001,?,?,?,759183C0,C:\Users\user\AppData\Local\Temp\~emtec~354033,00000000), ref: 004010D2
                                              • lstrcatA.KERNEL32(?,0040B2D4,?,?,?,759183C0,C:\Users\user\AppData\Local\Temp\~emtec~354033,00000000), ref: 004014B8
                                              • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104), ref: 004014FE
                                              • _memset.LIBCMT ref: 00401545
                                                • Part of subcall function 004013D7: RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,00020019,00000103,?,00000000,00000103), ref: 004013F2
                                                • Part of subcall function 004013D7: RegQueryValueExA.ADVAPI32(?,?,00000000), ref: 0040141D
                                                • Part of subcall function 004013D7: RegCloseKey.ADVAPI32(?), ref: 00401426
                                              • lstrcpyA.KERNEL32(?,?), ref: 00401781
                                              • lstrcatA.KERNEL32(?,?), ref: 0040178F
                                              • lstrcatA.KERNEL32(?,0040B2D4), ref: 00401799
                                              • lstrcpyA.KERNEL32(?,00000000), ref: 004017BA
                                              • lstrlenA.KERNEL32(?), ref: 004017E0
                                              • lstrcpyA.KERNEL32(?,00000000), ref: 004017F6
                                                • Part of subcall function 004011F0: lstrlenA.KERNEL32(0040B454,?,00000104,?,?,004014E4,?,0040B454,0040B450,00000104), ref: 004011FF
                                                • Part of subcall function 004011F0: lstrlenA.KERNEL32(?,?,?,004014E4,?,0040B454,0040B450,00000104,?,?,?,?,?,?,759183C0,C:\Users\user\AppData\Local\Temp\~emtec~354033), ref: 00401206
                                                • Part of subcall function 004011F0: lstrcmpA.KERNEL32(0040B454,?,?,?,004014E4,?,0040B454,0040B450,00000104,?,?,?,?,?,?,759183C0), ref: 00401211
                                                • Part of subcall function 004011F0: lstrlenA.KERNEL32(0040B450,0040B2D4,?,?,004014E4,?,0040B454,0040B450,00000104,?,?,?,?,?,?,759183C0), ref: 00401236
                                                • Part of subcall function 004011F0: VirtualAlloc.KERNELBASE(00000000,004014E4,00001000,00000004,?,?,004014E4,?,0040B454,0040B450,00000104), ref: 00401250
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: lstrlen$AllocVirtual_memsetlstrcatlstrcpy$CloseEnvironmentExpandOpenQueryStringsValuelstrcmp
                                              • String ID: %curdir%$%desktop%$%favorites%$%programfiles%$%quicklaunch%$%sendto%$%startmenu%$%startup%$%sysdir%$%targetdir%$AppData$C:\Program Files$C:\Users\user\AppData\Local\Temp\~emtec~354033$C:\Users\user\AppData\Local\Temp\~emtec~354033\$Desktop$Favorites$ProgramFilesDir$Programs$SOFTWARE\Microsoft\Windows\CurrentVersion$SendTo$Startup$\Microsoft\Internet Explorer\Quick Launch
                                              • API String ID: 674325901-2026946969
                                              • Opcode ID: 37606a7f0e300fb1ec33e0d94ee46084ceb86371dc2b888ebe7b25e597868a81
                                              • Instruction ID: 818a044053bc86c3c00416b233e70c77056a4a10d8390d6c9c2741c9cc04c5f5
                                              • Opcode Fuzzy Hash: 37606a7f0e300fb1ec33e0d94ee46084ceb86371dc2b888ebe7b25e597868a81
                                              • Instruction Fuzzy Hash: CBA11171A44348AEEF24DBA19C45FEA376CEB05704F64003BB945F61D2EB7896048B6D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • lstrlenA.KERNEL32(.\setup.exe\), ref: 00402539
                                              • _memset.LIBCMT ref: 0040255E
                                              • _memset.LIBCMT ref: 00402572
                                              • _memset.LIBCMT ref: 0040257E
                                              • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 004025A4
                                              • SetCurrentDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 004025B1
                                                • Part of subcall function 0040142E: _memset.LIBCMT ref: 00401465
                                                • Part of subcall function 0040142E: _memset.LIBCMT ref: 00401479
                                                • Part of subcall function 0040142E: VirtualAlloc.KERNELBASE(00000000,00000105,00001000,00000004,?,?,?,759183C0,C:\Users\user\AppData\Local\Temp\~emtec~354033,00000000), ref: 0040148E
                                                • Part of subcall function 0040142E: ExpandEnvironmentStringsA.KERNEL32(?,?,00000104), ref: 004014FE
                                                • Part of subcall function 0040142E: lstrcpyA.KERNEL32(?,00000000), ref: 004017BA
                                                • Part of subcall function 0040142E: lstrlenA.KERNEL32(?), ref: 004017E0
                                                • Part of subcall function 0040142E: lstrcpyA.KERNEL32(?,00000000), ref: 004017F6
                                              • lstrcpyA.KERNEL32(?,00000000), ref: 004025C2
                                              • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 004025EB
                                              • ShowWindow.USER32(00000000), ref: 004025FC
                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00402607
                                              • CloseHandle.KERNEL32(?), ref: 00402616
                                              • CloseHandle.KERNEL32(?), ref: 0040261B
                                              • _memset.LIBCMT ref: 0040262C
                                              • wsprintfA.USER32 ref: 00402641
                                              • MessageBoxA.USER32(00000000,?,Error,00000010), ref: 00402656
                                              • SetCurrentDirectoryA.KERNEL32(?), ref: 00402663
                                              • CreateThread.KERNEL32(00000000,00000000,004019CB,00000000,00000000,?), ref: 0040267B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: _memset$CurrentDirectorylstrcpy$CloseCreateHandlelstrlen$AllocEnvironmentExpandMessageObjectProcessShowSingleStringsThreadVirtualWaitWindowwsprintf
                                              • String ID: %s could not be executed.$.\setup.exe\$C:\Users\user\AppData\Local\Temp\~emtec~354033\$Error
                                              • API String ID: 3102551066-3267213050
                                              • Opcode ID: 5a357493f7fb41afaa1c40f1ac1d43d1f4d4a268ec120d6fdf9a306d60c53d09
                                              • Instruction ID: cbabd2bb027e95d25c02f5acb2326d93657106e7ec2713227161370b751db991
                                              • Opcode Fuzzy Hash: 5a357493f7fb41afaa1c40f1ac1d43d1f4d4a268ec120d6fdf9a306d60c53d09
                                              • Instruction Fuzzy Hash: 5A4152B190014DAFDB20AFA4DD89EDF37ACEB08354F004437F915F61A1DB789A448BA8
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • _memset.LIBCMT ref: 00401C22
                                              • VirtualAlloc.KERNELBASE(00000000,0000FFFF,00001000,00000004,?,?,?,?,?,?,?,?,75A73EB0,C:\Users\user\AppData\Local\Temp\~emtec~354033\,75920F00), ref: 00401C60
                                              • wsprintfA.USER32 ref: 00401CAD
                                              • lstrcpyA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,75A73EB0), ref: 00401CC4
                                                • Part of subcall function 00401039: GetLastError.KERNEL32(75923550,759234C0), ref: 00401061
                                                • Part of subcall function 00401039: GetLastError.KERNEL32(00000400,0040B280,00000000,00000000), ref: 00401077
                                                • Part of subcall function 00401039: FormatMessageA.KERNEL32(00001100,00000000,00000000), ref: 00401081
                                                • Part of subcall function 00401039: wsprintfA.USER32 ref: 0040109A
                                                • Part of subcall function 00401039: MessageBoxA.USER32(00000000,?,FreeExtractor Error,00000010), ref: 004010B3
                                              • wsprintfA.USER32 ref: 00401CF0
                                              • GetFullPathNameA.KERNEL32(?,00000104,?,00000000), ref: 00401D11
                                              • lstrcpyA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,75A73EB0), ref: 00401D2C
                                              • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00401D4F
                                              • lstrlenA.KERNEL32(?), ref: 00401D8A
                                              • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00401DBE
                                              • WriteFile.KERNELBASE(?,?,00000000,?,00000000), ref: 00401DFD
                                              • DosDateTimeToFileTime.KERNEL32(?,?,?), ref: 00401E11
                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00401E1C
                                              • SetFileTime.KERNELBASE(?,00000000,00000000,?), ref: 00401E2B
                                              • FindCloseChangeNotification.KERNELBASE(?), ref: 00401E34
                                              • VirtualFree.KERNELBASE(?,00000000,00004000), ref: 00401E43
                                              Strings
                                              • %s%s, xrefs: 00401CA7, 00401CEA
                                              • Could not get file info. This archive is likely corrupted., xrefs: 00401C49
                                              • C:\Users\user\AppData\Local\Temp\~emtec~354033\, xrefs: 00401BFF
                                              • Could not extract the current file., xrefs: 00401DC8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: File$Time$wsprintf$CreateErrorLastMessageVirtuallstrcpy$AllocChangeCloseDateFindFormatFreeFullLocalNameNotificationPathWrite_memsetlstrlen
                                              • String ID: %s%s$C:\Users\user\AppData\Local\Temp\~emtec~354033\$Could not extract the current file.$Could not get file info. This archive is likely corrupted.
                                              • API String ID: 1880198518-305127722
                                              • Opcode ID: 737c467f5faa1c5a6a6d6caa50c70dcba2893829461d2469f259e14798b719e7
                                              • Instruction ID: 7067d0a0fd5be49f7b50004b7e9254ef6b91271585893d8c31040e999677030c
                                              • Opcode Fuzzy Hash: 737c467f5faa1c5a6a6d6caa50c70dcba2893829461d2469f259e14798b719e7
                                              • Instruction Fuzzy Hash: 5D711FB1D4014EABDB209BA4DD45EFF7BBCEF04344F104436F615B61A1D7389A448BA8
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\~emtec~354033\,0040B2D4), ref: 0040234E
                                              • GetFullPathNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\~emtec~354033\,00000104,C:\Users\user\AppData\Local\Temp\~emtec~354033\,00000000), ref: 0040235D
                                                • Part of subcall function 00405049: CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000,?,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 0040506D
                                                • Part of subcall function 00405049: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,?,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 0040508B
                                              • Sleep.KERNELBASE(000001F4), ref: 0040238B
                                              • GetDlgItem.USER32(000003EF), ref: 004023B4
                                              • SendMessageA.USER32(00000000,00000401,00000000,?), ref: 004023D3
                                              • wsprintfA.USER32 ref: 00402427
                                              • SetDlgItemTextA.USER32(000003FA,?), ref: 0040243E
                                              • Sleep.KERNELBASE(00000032), ref: 00402446
                                              • SendMessageA.USER32(?,00000402,?,00000000), ref: 00402490
                                              • SendMessageA.USER32(?,00000402,?,00000000), ref: 004024CA
                                              • Sleep.KERNELBASE(0000012C), ref: 004024D1
                                              • PostMessageA.USER32(00000111,000003EC,00000000), ref: 004024E4
                                                • Part of subcall function 00401039: GetLastError.KERNEL32(75923550,759234C0), ref: 00401061
                                                • Part of subcall function 00401039: GetLastError.KERNEL32(00000400,0040B280,00000000,00000000), ref: 00401077
                                                • Part of subcall function 00401039: FormatMessageA.KERNEL32(00001100,00000000,00000000), ref: 00401081
                                                • Part of subcall function 00401039: wsprintfA.USER32 ref: 0040109A
                                                • Part of subcall function 00401039: MessageBoxA.USER32(00000000,?,FreeExtractor Error,00000010), ref: 004010B3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Message$SendSleep$ErrorFileItemLastwsprintf$CreateFormatFullNamePathPointerPostTextlstrcat
                                              • String ID: Building Installation Environment ...$C:\Users\user\AppData\Local\Temp\~emtec~354033\$Could not extract the current file.$Could not get file info. This archive is likely corrupted.$Could not read SFX info. It's likely corrupt.
                                              • API String ID: 1293832600-1003013652
                                              • Opcode ID: 8de3f1bb66b49ee0ff8f7b079aae17b94fe05722ada9e11a35cd559533b799ad
                                              • Instruction ID: 69f63de8c50ffa58a3254667d955117a6c463ecd59ab2f25f977ad8beffe7c13
                                              • Opcode Fuzzy Hash: 8de3f1bb66b49ee0ff8f7b079aae17b94fe05722ada9e11a35cd559533b799ad
                                              • Instruction Fuzzy Hash: 5A419171950218BFEF10ABA1DE4AEEE7778EF08715F104036FA01B51E1D7B959009B6C
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • _memset.LIBCMT ref: 00401847
                                              • _memset.LIBCMT ref: 0040185B
                                              • GetFullPathNameA.KERNEL32(?,00000104,?,00000000,?,?,?,00000000,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 00401871
                                              • lstrlenA.KERNEL32(?,?,?,?,?,?,?,00000000,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 00401893
                                              • lstrcpyA.KERNEL32(?,?,?,?,?,?,?,?,00000000,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 004018A7
                                              • lstrcatA.KERNEL32(?,0040B2D4,?,?,?,?,?,?,00000000,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 004018B9
                                              • GetFullPathNameA.KERNEL32(?,00000104,?,00000000,?,?,?,?,?,?,00000000,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 004018C9
                                              • CreateDirectoryA.KERNELBASE(?,00000000,?,?,?,?,?,?,00000000,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 004018E8
                                              • lstrcatA.KERNEL32(?,0040B2D4,?,?,?,00000000,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 00401887
                                                • Part of subcall function 004012EB: lstrlenA.KERNEL32(00401510,0040B2D4,?,00000104,00401510,?,0040B2D4,00000000), ref: 004012F5
                                              • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,00000000,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 00401908
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\~emtec~354033\, xrefs: 0040182F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: lstrlen$FullNamePath_memsetlstrcat$CreateDirectorylstrcpy
                                              • String ID: C:\Users\user\AppData\Local\Temp\~emtec~354033\
                                              • API String ID: 2697513820-4213018283
                                              • Opcode ID: a3f2baf4ffaf07aae129d54dc5a3167d5ce247f874da67bab38c9c92332b4cb5
                                              • Instruction ID: c64920feef3fd70422c0ee4afce9e6ed662e7a93599af01e7b63ac33e804fe4c
                                              • Opcode Fuzzy Hash: a3f2baf4ffaf07aae129d54dc5a3167d5ce247f874da67bab38c9c92332b4cb5
                                              • Instruction Fuzzy Hash: A631D0B2901248ABEB30AFB59D88EDF77ACEF45344F10443AAA19E7152E73496058F64
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • #17.COMCTL32(?,00000000,?,004028E3,00000000), ref: 004027CC
                                                • Part of subcall function 00401E6C: _memset.LIBCMT ref: 00401EA3
                                                • Part of subcall function 00401E6C: _memset.LIBCMT ref: 00401EB7
                                                • Part of subcall function 00401E6C: _memset.LIBCMT ref: 00401EC5
                                                • Part of subcall function 00401E6C: lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000000), ref: 00401EE9
                                                • Part of subcall function 00401E6C: GetTempPathA.KERNEL32(00000000,?,?,?,?,?,?,00000000,00000000), ref: 00401EF0
                                                • Part of subcall function 00401E6C: GetCurrentDirectoryA.KERNEL32(00000104,C:\Users\user\Desktop,?,?,?,?,?,?,00000000,00000000), ref: 00401F01
                                                • Part of subcall function 00401E6C: GetCurrentProcess.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 00401F07
                                                • Part of subcall function 00401E6C: GetModuleFileNameA.KERNEL32(00000000,00414F20,00000104,?,?,?,?,?,?,00000000,00000000), ref: 00401F1A
                                                • Part of subcall function 00401E6C: CreateFileA.KERNELBASE(00414F20,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00000000,00000000), ref: 00401F2D
                                                • Part of subcall function 00401E6C: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,?,00000000,00000000), ref: 00401F42
                                                • Part of subcall function 00401E6C: ReadFile.KERNELBASE(?,00000004,?,00000000,?,?,?,?,?,?,00000000,00000000), ref: 00401FA1
                                                • Part of subcall function 00401E6C: ReadFile.KERNELBASE(?,00000004,?,00000000,Could not read the source SFX.,?,?,?,?,?,?,00000000,00000000), ref: 0040200E
                                                • Part of subcall function 004013BB: GetFileAttributesA.KERNELBASE(?,004016BE,?), ref: 004013BF
                                              • DialogBoxParamA.USER32(00000066,00000000,0040269D,00000000), ref: 0040281B
                                              • WaitForSingleObject.KERNEL32(?,00001388,?,004028E3,00000000), ref: 0040283D
                                              • CloseHandle.KERNEL32(?,004028E3,00000000), ref: 00402845
                                              • WaitForSingleObject.KERNEL32(?,00001388,?,004028E3,00000000), ref: 00402852
                                              • CloseHandle.KERNEL32(?,004028E3,00000000), ref: 0040285A
                                              • WaitForSingleObject.KERNEL32(?,00001388,?,004028E3,00000000), ref: 00402867
                                              • CloseHandle.KERNEL32(?,004028E3,00000000), ref: 0040286F
                                                • Part of subcall function 00401813: _memset.LIBCMT ref: 00401847
                                                • Part of subcall function 00401813: _memset.LIBCMT ref: 0040185B
                                                • Part of subcall function 00401813: GetFullPathNameA.KERNEL32(?,00000104,?,00000000,?,?,?,00000000,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 00401871
                                                • Part of subcall function 00401813: lstrcatA.KERNEL32(?,0040B2D4,?,?,?,00000000,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 00401887
                                                • Part of subcall function 00401813: lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,00000000,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 00401908
                                                • Part of subcall function 00401039: GetLastError.KERNEL32(75923550,759234C0), ref: 00401061
                                                • Part of subcall function 00401039: GetLastError.KERNEL32(00000400,0040B280,00000000,00000000), ref: 00401077
                                                • Part of subcall function 00401039: FormatMessageA.KERNEL32(00001100,00000000,00000000), ref: 00401081
                                                • Part of subcall function 00401039: wsprintfA.USER32 ref: 0040109A
                                                • Part of subcall function 00401039: MessageBoxA.USER32(00000000,?,FreeExtractor Error,00000010), ref: 004010B3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: File$_memset$CloseHandleObjectSingleWait$CurrentErrorLastMessageNamePathReadlstrlen$AttributesCreateDialogDirectoryFormatFullModuleParamPointerProcessTemplstrcatwsprintf
                                              • String ID: C:\Users\user\AppData\Local\Temp\~emtec~354033\$Couldn't create output directory.
                                              • API String ID: 3263903487-3614768603
                                              • Opcode ID: 8696fcb03184804f0f24fbe45bad661be33e71de10099a232f558d14175ec8f0
                                              • Instruction ID: 4ca3e2172306d8441907a0a894a9c08b5848724510cc59735dc340afc297f246
                                              • Opcode Fuzzy Hash: 8696fcb03184804f0f24fbe45bad661be33e71de10099a232f558d14175ec8f0
                                              • Instruction Fuzzy Hash: 371177B56102046BD7217B36EE89D5B7BACEF80784711843AF804F32F0DBB89D008A6D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 297 40269d-4026a6 298 402797-4027a9 PostMessageA 297->298 299 4026ac-4026ae 297->299 300 4027af-4027b1 298->300 299->298 301 4026b4-4026b9 299->301 302 4027b2-4027b3 300->302 303 40275a-402795 SetWindowTextA PostMessageA ShowWindow 301->303 304 4026bf-4026c0 301->304 303->300 305 4026c2-4026c9 304->305 306 4026da-4026dc 304->306 307 4026cb-4026ce 305->307 308 40273e-402758 CreateThread 305->308 306->302 309 4026d0-4026d5 307->309 310 402725-40273c EndDialog 307->310 308->300 311 402706-402720 CreateThread 309->311 312 4026d7-4026d8 309->312 310->300 311->300 312->306 313 4026e1-402701 EndDialog 312->313 313->300
                                              APIs
                                              • EndDialog.USER32(?,00000000), ref: 004026F1
                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00002516,00000000,00000000,?), ref: 00402715
                                              • EndDialog.USER32(?,00000001), ref: 00402736
                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00002325,00000000,00000000,?), ref: 0040274D
                                              • SetWindowTextA.USER32(?,ZOC Installation), ref: 00402770
                                              • PostMessageA.USER32(?,00000111,0000000B,00000000), ref: 00402780
                                              • ShowWindow.USER32(00000005), ref: 0040278E
                                              • PostMessageA.USER32(00000111,000003ED,00000000), ref: 004027A9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: CreateDialogMessagePostThreadWindow$ShowText
                                              • String ID: ZOC Installation
                                              • API String ID: 45217082-3218763524
                                              • Opcode ID: dbc5ac1d0c7c481cdeb8b5b9e4502041b959a42bf153dcb64720112c3ec234ac
                                              • Instruction ID: b903888f525894a0ce4ba5cc17fa31e332851c468d2553657f96f822baa69666
                                              • Opcode Fuzzy Hash: dbc5ac1d0c7c481cdeb8b5b9e4502041b959a42bf153dcb64720112c3ec234ac
                                              • Instruction Fuzzy Hash: 64215CB1551208BFE7108F74DE4CAB73AA8E748791F508432F901FA2E0D3F989819A5C
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 314 4011f0-401219 lstrlenA * 2 lstrcmpA 315 40129f-4012a2 314->315 316 40121f-401231 call 40119a 314->316 319 401233-401242 lstrlenA 316->319 320 40125d-40125f 316->320 319->320 322 401244-40125b VirtualAlloc 319->322 321 40129e 320->321 321->315 322->320 323 401261-40126e lstrcpyA 322->323 324 40127e-401282 323->324 325 401270-40127b 324->325 326 401284-40129c lstrcpyA VirtualFree 324->326 325->324 326->321
                                              APIs
                                              • lstrlenA.KERNEL32(0040B454,?,00000104,?,?,004014E4,?,0040B454,0040B450,00000104), ref: 004011FF
                                              • lstrlenA.KERNEL32(?,?,?,004014E4,?,0040B454,0040B450,00000104,?,?,?,?,?,?,759183C0,C:\Users\user\AppData\Local\Temp\~emtec~354033), ref: 00401206
                                              • lstrcmpA.KERNEL32(0040B454,?,?,?,004014E4,?,0040B454,0040B450,00000104,?,?,?,?,?,?,759183C0), ref: 00401211
                                              • lstrlenA.KERNEL32(0040B450,0040B2D4,?,?,004014E4,?,0040B454,0040B450,00000104,?,?,?,?,?,?,759183C0), ref: 00401236
                                              • VirtualAlloc.KERNELBASE(00000000,004014E4,00001000,00000004,?,?,004014E4,?,0040B454,0040B450,00000104), ref: 00401250
                                              • lstrcpyA.KERNEL32(00000000,?,?,?,004014E4,?,0040B454,0040B450,00000104,?,?,?,?,?,?,759183C0), ref: 0040126C
                                              • lstrcpyA.KERNEL32(00000001,0040B450,?,?,?,004014E4), ref: 00401288
                                              • VirtualFree.KERNELBASE(0040B450,00000000,00008000,?,?,?,004014E4), ref: 00401294
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: lstrlen$Virtuallstrcpy$AllocFreelstrcmp
                                              • String ID:
                                              • API String ID: 1979252130-0
                                              • Opcode ID: c8a411b3f2c4ad60fd71c5fcb8efb33f4cda4e5d6d35f89723b3214fb952243d
                                              • Instruction ID: 96d4167f46ff1ee276c3b00bc8b0778e44d999f8b3ec90ea23a610dc3e31eb9a
                                              • Opcode Fuzzy Hash: c8a411b3f2c4ad60fd71c5fcb8efb33f4cda4e5d6d35f89723b3214fb952243d
                                              • Instruction Fuzzy Hash: E1216A35600209AFDF119FA4DD44BAE3F65EF44390F10407AF915B62A0D774D915ABA8
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 327 404934-404944 328 404946-404949 327->328 329 40494e-404966 SetFilePointer 327->329 330 404bf6-404bf8 328->330 331 404968-40496e call 40478e 329->331 332 404979-40497c 329->332 336 404973-404977 331->336 333 40498e-40499d call 40474a 332->333 340 4049a2-4049b1 call 40474a 333->340 341 40499f 333->341 336->332 337 40497e-404985 336->337 337->333 339 404987 337->339 339->333 344 4049b3 340->344 345 4049b6-4049c5 call 40474a 340->345 341->340 344->345 348 4049c7 345->348 349 4049ca-4049d9 call 40474a 345->349 348->349 352 4049db 349->352 353 4049de-4049ed call 40478e 349->353 352->353 356 4049f2-404a01 call 40478e 353->356 357 4049ef 353->357 360 404a03 356->360 361 404a06-404a15 call 40478e 356->361 357->356 360->361 364 404a17 361->364 365 404a1a-404a29 call 40478e 361->365 364->365 368 404a2b 365->368 369 404a2e-404a3d call 40474a 365->369 368->369 372 404a42-404a51 call 40474a 369->372 373 404a3f 369->373 376 404a53 372->376 377 404a56-404a65 call 40474a 372->377 373->372 376->377 380 404a67 377->380 381 404a6a-404a79 call 40474a 377->381 380->381 384 404a7b 381->384 385 404a7e-404a8d call 40474a 381->385 384->385 388 404a92-404aa1 call 40478e 385->388 389 404a8f 385->389 392 404aa3 388->392 393 404aa6-404ab5 call 40478e 388->393 389->388 392->393 396 404ab7 393->396 397 404aba-404ac3 393->397 396->397 398 404ac9-404ace 397->398 399 404b6b 397->399 400 404ad0-404ad3 398->400 401 404b0a-404b0e 398->401 402 404b6e-404b72 399->402 403 404ad5-404ad9 400->403 404 404adb 400->404 401->399 407 404b10-404b1b 401->407 405 404bf1-404bf5 402->405 406 404b74-404b79 402->406 408 404ade-404ae0 403->408 404->408 405->330 409 404bd6-404bdb 406->409 410 404b7b-404b83 406->410 411 404b20-404b22 407->411 412 404b1d 407->412 415 404b00-404b08 408->415 416 404ae2-404ae6 408->416 413 404be5-404bea 409->413 414 404bdd-404be3 409->414 417 404b85-404b8c 410->417 418 404b8e 410->418 419 404b24-404b34 SetFilePointer 411->419 420 404b3e-404b40 411->420 412->411 413->405 423 404bec-404bef 413->423 414->413 415->399 415->401 416->415 424 404ae8-404afa ReadFile 416->424 425 404b91-404b93 417->425 418->425 426 404b36-404b38 419->426 427 404b3a 419->427 421 404b42-404b46 420->421 422 404b64-404b69 420->422 421->422 428 404b48-404b5e ReadFile 421->428 422->402 423->405 424->415 429 404afc 424->429 430 404b95-404ba5 SetFilePointer 425->430 431 404baa-404bac 425->431 426->420 427->420 428->422 432 404b60 428->432 429->415 430->431 433 404ba7 430->433 434 404bd0-404bd4 431->434 435 404bae-404bb2 431->435 432->422 433->431 434->405 434->409 435->434 436 404bb4-404bca ReadFile 435->436 436->434 437 404bcc 436->437 437->434
                                              APIs
                                              • SetFilePointer.KERNELBASE(004051A3,0824748B,00000000,00000000,00000000,00000000,004051A3), ref: 0040495B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: 0545b2a60ac735d96d4d7965a776e0a1d23aeecac35a3f0ed0c8ee50446b3489
                                              • Instruction ID: 6a869b3b57545260727cb0a2e342219a61a0c94c9ce3c898661590064a9b3964
                                              • Opcode Fuzzy Hash: 0545b2a60ac735d96d4d7965a776e0a1d23aeecac35a3f0ed0c8ee50446b3489
                                              • Instruction Fuzzy Hash: 71A133B6904209EEEB20DFA4D941BAE77B9EF80350F24417BEA51B72D4E7359D00DB18
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 438 405049-405094 CreateFileA call 404803 SetFilePointer 441 405096 438->441 442 405098-4050a6 call 40478e 438->442 441->442 445 4050a8 442->445 446 4050ab-4050b9 call 40474a 442->446 445->446 449 4050bb 446->449 450 4050be-4050cc call 40474a 446->450 449->450 453 4050d1-4050df call 40474a 450->453 454 4050ce 450->454 457 4050e1 453->457 458 4050e4-4050f2 call 40474a 453->458 454->453 457->458 461 4050f4 458->461 462 4050f7-4050fd 458->462 461->462 463 40510b-40510d 462->463 464 4050ff-405103 462->464 466 40510e-40511c call 40478e 463->466 464->463 465 405105-405109 464->465 465->463 465->466 469 405121-40512f call 40478e 466->469 470 40511e 466->470 473 405131 469->473 474 405134-405142 call 40474a 469->474 470->469 473->474 477 405144 474->477 478 405147-405155 474->478 477->478 479 405157-405159 478->479 480 40515e-405160 478->480 481 405162-40516b CloseHandle 479->481 482 40515b-40515d 479->482 480->481 483 40516d-40519e VirtualAlloc call 404c20 480->483 484 4051a6-4051ad 481->484 482->480 486 4051a3-4051a4 483->486 486->484
                                              APIs
                                              • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000,?,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 0040506D
                                                • Part of subcall function 00404803: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,00000000,00000000,00000080,?), ref: 00404832
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,?,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 0040508B
                                              • CloseHandle.KERNEL32(00000000,?,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 00405163
                                              • VirtualAlloc.KERNELBASE(00000000,00000080,00001000,00000004,?,C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 0040518B
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\~emtec~354033\, xrefs: 00405055
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: File$Pointer$AllocCloseCreateHandleVirtual
                                              • String ID: C:\Users\user\AppData\Local\Temp\~emtec~354033\
                                              • API String ID: 4021238690-4213018283
                                              • Opcode ID: aa05d3edf7b293831859d043f8d8499699b64315b0b51bad616b354aa5fc12fa
                                              • Instruction ID: 803072996f6395c0e7fb430fc1d7df9bc2105f5e7eefd168186a6777c12adcea
                                              • Opcode Fuzzy Hash: aa05d3edf7b293831859d043f8d8499699b64315b0b51bad616b354aa5fc12fa
                                              • Instruction Fuzzy Hash: 614190729056186EEB20DEA59D41BBF77ACDB45370F20023BFD20F61C0E7789D058A98
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 487 404803-404837 SetFilePointer 488 404840-404842 487->488 489 404839-40483b 487->489 491 404844 488->491 492 404847-404861 VirtualAlloc 488->492 490 404911-404915 489->490 491->492 492->489 493 404863-404869 492->493 494 4048fe-40490e VirtualFree 493->494 495 40486f 493->495 494->490 496 404879-404886 495->496 497 404888 496->497 498 40488b-404897 496->498 497->498 499 404899 498->499 500 40489b-4048a8 SetFilePointer 498->500 499->500 500->494 501 4048aa-4048bf ReadFile 500->501 501->494 502 4048c1-4048c4 501->502 503 4048e5-4048e7 502->503 504 4048c6-4048ce 503->504 505 4048e9 503->505 504->503 506 4048d0-4048d5 504->506 507 4048f2-4048f8 505->507 506->503 508 4048d7-4048dc 506->508 507->494 509 404871-404874 507->509 508->503 510 4048de-4048e3 508->510 509->496 510->503 511 4048eb-4048f0 510->511 511->494 511->507
                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,00000000,00000000,00000080,?), ref: 00404832
                                              • VirtualAlloc.KERNELBASE(00000000,00000404,00001000,00000004), ref: 00404856
                                              • SetFilePointer.KERNELBASE(00000000,?,00000000,00000000), ref: 004048A3
                                              • ReadFile.KERNELBASE(00000000,?,00000404,00000000,00000000), ref: 004048B7
                                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00404908
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: File$PointerVirtual$AllocFreeRead
                                              • String ID:
                                              • API String ID: 3108635511-0
                                              • Opcode ID: 1e3b1115f09fb707520bb097aff1c435f8e54bf8fb8e6104146ea58a9e433ec8
                                              • Instruction ID: 5ecc3bd628a34f2ccc3d53b58d58b24b39d4eda0cd5caec076c4673e0f20c642
                                              • Opcode Fuzzy Hash: 1e3b1115f09fb707520bb097aff1c435f8e54bf8fb8e6104146ea58a9e433ec8
                                              • Instruction Fuzzy Hash: D63192B6A00284ABDB20AF65CC44B6F7B60AB84714F14887AE615BB2D0D3749941DB58
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 512 4051e3-4051f1 513 4051f3 512->513 514 4051fb-4051fe 512->514 515 4051f5-4051f6 513->515 514->513 516 405200-405203 514->516 517 4052f0-4052f3 515->517 518 405205-40520b call 404fcd 516->518 519 40520c-405222 call 404cba 516->519 518->519 524 405224-405226 519->524 525 405228-40523d VirtualAlloc 519->525 524->515 526 405275-405278 525->526 527 40523f-405266 VirtualAlloc 525->527 530 4052ef 526->530 528 405268-40526f VirtualFree 527->528 529 40527a-4052a3 527->529 528->526 531 4052a5-4052c5 call 403cf7 529->531 532 4052ce-4052ed 529->532 530->517 531->532 535 4052c7 531->535 532->530 535->532
                                              APIs
                                              • VirtualAlloc.KERNELBASE(00000000,0000006C,00001000,00000004,?,?,00401CFC,?), ref: 00405233
                                              • VirtualAlloc.KERNELBASE(00000000,00004000,00001000,00000004,?,?,?,?,?,?,?,?,75A73EB0,C:\Users\user\AppData\Local\Temp\~emtec~354033\,75920F00), ref: 0040524C
                                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,?,?,?,75A73EB0,C:\Users\user\AppData\Local\Temp\~emtec~354033\,75920F00), ref: 0040526F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Virtual$Alloc$Free
                                              • String ID: 1.1.3
                                              • API String ID: 3668210933-2347784635
                                              • Opcode ID: 1b9aeeef757dac2b6c1a55c5fc68f503e511110812d7a0824588dbc47ad4780b
                                              • Instruction ID: af21e68c9badbd50f5d4c5867e97fd73f4a8a2ebcfaedd261536af9858537d59
                                              • Opcode Fuzzy Hash: 1b9aeeef757dac2b6c1a55c5fc68f503e511110812d7a0824588dbc47ad4780b
                                              • Instruction Fuzzy Hash: AE313AB1A04B06AFD724DF29D980A56BBE8FB08314B10093EE656E6B81D734F550CF98
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 536 4051ae-4051b5 537 4051b7-4051bb 536->537 538 4051bc-4051c0 536->538 539 4051c2-4051c8 call 404fcd 538->539 540 4051c9-4051e2 FindCloseChangeNotification VirtualFree 538->540 539->540
                                              APIs
                                              • FindCloseChangeNotification.KERNELBASE(?,C:\Users\user\AppData\Local\Temp\~emtec~354033\,004024B2,?,?), ref: 004051CB
                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004051D9
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\~emtec~354033\, xrefs: 004051AE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ChangeCloseFindFreeNotificationVirtual
                                              • String ID: C:\Users\user\AppData\Local\Temp\~emtec~354033\
                                              • API String ID: 560371109-4213018283
                                              • Opcode ID: 4ab138d56a7379c63b628201f5af0c4c13f37c6e9f6ad2a8887551ed27003bbe
                                              • Instruction ID: 7285a0c4f2d92058e360dfddef20c3b7d3ca5475ae935d08b3b1d3249586ceb0
                                              • Opcode Fuzzy Hash: 4ab138d56a7379c63b628201f5af0c4c13f37c6e9f6ad2a8887551ed27003bbe
                                              • Instruction Fuzzy Hash: 3FE0C232409B20AEEA222B14BC08B9B3790EF09324F11092AF160B90E4D7786C848ECC
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 543 404fcd-404fdb 544 404fe2-404fe8 543->544 545 404fdd-404fe0 543->545 547 404fea-404fed 544->547 548 404fef-404ff2 544->548 546 405046-405048 545->546 549 405045 547->549 550 405004-405016 548->550 551 404ff4-404ffa 548->551 549->546 553 405018-40501d VirtualFree 550->553 554 40501f-405025 550->554 551->550 552 404ffc 551->552 552->550 553->554 555 405033-405044 VirtualFree 554->555 556 405027-405031 call 403cb9 554->556 555->549 556->555
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\~emtec~354033\, xrefs: 00404FE2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: C:\Users\user\AppData\Local\Temp\~emtec~354033\
                                              • API String ID: 0-4213018283
                                              • Opcode ID: e034e5556bc388b5e779c22109ac397b86efc0eb0e6c071a31e0b7db90e1fc4e
                                              • Instruction ID: 20f687011fcf1791211a9634d7707005dbe2747c4b6f258ed0e572a13b45f968
                                              • Opcode Fuzzy Hash: e034e5556bc388b5e779c22109ac397b86efc0eb0e6c071a31e0b7db90e1fc4e
                                              • Instruction Fuzzy Hash: CA015EB1508715AFDB389F15D88486BB3E8EB48325B20493FF166E2690D775EC408E68
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • VirtualAlloc.KERNELBASE(00000000,00000104,00001000,00000004,C:\Users\user\AppData\Local\Temp\~emtec~354033\,0040246C,00414AE8,?), ref: 004028FF
                                              • lstrcpyA.KERNEL32(00000000,?), ref: 00402912
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\~emtec~354033\, xrefs: 004028F0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: AllocVirtuallstrcpy
                                              • String ID: C:\Users\user\AppData\Local\Temp\~emtec~354033\
                                              • API String ID: 4117716100-4213018283
                                              • Opcode ID: bcaf8bb63931681b9ca47130f7b022dc2ce4c2f67fdb7ee1458d5594e61d9d3e
                                              • Instruction ID: 0840543de2989a88ca697b9d14da5a8e60263cd651b7ad0e20701b82c5fa3048
                                              • Opcode Fuzzy Hash: bcaf8bb63931681b9ca47130f7b022dc2ce4c2f67fdb7ee1458d5594e61d9d3e
                                              • Instruction Fuzzy Hash: 59E09BB16553109FD7264F10E908BE737A0EF45762F01446DF695AA3D0C3B088418AD8
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7b8cac7fb6169c97dbc0e3d7f97242558d8744404fb42789dee7ce39cc4eba96
                                              • Instruction ID: 9f43172cbffd2757e157e29dd93894b4af6743593de9866573e11b76725491bb
                                              • Opcode Fuzzy Hash: 7b8cac7fb6169c97dbc0e3d7f97242558d8744404fb42789dee7ce39cc4eba96
                                              • Instruction Fuzzy Hash: 9E5119B1900706DFCB309F69C98085BB7F5BF843147218A3FE696A7A90D738E944CB55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetFilePointer.KERNELBASE(00401CFC,500040B2,00000000,00000000,?,00000000,?,?,?,0040521D,00401CFC,00401CFC,?,00000104,00000000), ref: 00404CDD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: 6e66ab15bb024579e4937df28d883a405a12aa104972a77bda4480837ebe67bc
                                              • Instruction ID: 1c560504153a65f87d7a498a28a53e97ad314c0e97c6f4fd8ca7b978515e137d
                                              • Opcode Fuzzy Hash: 6e66ab15bb024579e4937df28d883a405a12aa104972a77bda4480837ebe67bc
                                              • Instruction Fuzzy Hash: BF5192B6204204EFEB21CEA5D98096A77E9EFC5364B34057BEB50E72D0E735ED409B18
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • ReadFile.KERNELBASE(00000000,?,00000001,00000000,00000000,?,?,?,004047A1,00000000,?,00000000,00000000,?,?,004050A2), ref: 00404725
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID:
                                              • API String ID: 2738559852-0
                                              • Opcode ID: 95a32e419c05aa302803649531c120a5e6e864f4569269e8a9cd6754ae34fbd8
                                              • Instruction ID: 31e718e927d5592d7190d26589b0e5bc9632fe5188b9ea9386b4a4f7d65233bc
                                              • Opcode Fuzzy Hash: 95a32e419c05aa302803649531c120a5e6e864f4569269e8a9cd6754ae34fbd8
                                              • Instruction Fuzzy Hash: 31E01AB5204108BFEB098B64CC16BAE7BACDB45344F4040B9B902E62D0EBB5DE45CA64
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetFileAttributesA.KERNELBASE(?,004016BE,?), ref: 004013BF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 8caed6b9972a23968236a57ecfee80e31415ced2e774ab9d1578709467e66c2d
                                              • Instruction ID: f1cc98af387dd7fd2f9c77ec672864b50cdc4a033f0996c9240ac066445e8b89
                                              • Opcode Fuzzy Hash: 8caed6b9972a23968236a57ecfee80e31415ced2e774ab9d1578709467e66c2d
                                              • Instruction Fuzzy Hash: EDC09272820404A6EA101734AD4902E35E1FB91736BE48BF5F175E08F0C739C829B669
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • VirtualAlloc.KERNELBASE(00000000,004014A0,00001000,00000004,00000103,00000000,0040149F,?,00000001,?,?,?,759183C0,C:\Users\user\AppData\Local\Temp\~emtec~354033,00000000), ref: 004010D2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: ecca1f0ab0cdaded683cd294faa6dddf3beb1caf0d4529479c24439f10543d75
                                              • Instruction ID: d31f515c08cc0c3c98d6e680e27f2706f61cbba694047fbd2b04043c5077b04b
                                              • Opcode Fuzzy Hash: ecca1f0ab0cdaded683cd294faa6dddf3beb1caf0d4529479c24439f10543d75
                                              • Instruction Fuzzy Hash: E8E02B361042C05AC3228A2D88C1B976BD99BCA710F14806EF2C4D7691C6B208858365
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 00405307
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 35a26a88bda27b3e8a52bbe6f083c8f6a87bc6bbf2b07d18d031be8817683a04
                                              • Instruction ID: 2330009775a580402cc4fb9e482472cbe34082369fe5739f92b2a5dea1c4b7ab
                                              • Opcode Fuzzy Hash: 35a26a88bda27b3e8a52bbe6f083c8f6a87bc6bbf2b07d18d031be8817683a04
                                              • Instruction Fuzzy Hash: E5C09B712443017FE914CB40DE46F167794D7D4751F008404F358DD0D0C2B095408659
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00405319
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: FreeVirtual
                                              • String ID:
                                              • API String ID: 1263568516-0
                                              • Opcode ID: a5856b4697b908be054a4ac72a5414c51910e8e6471a67c9f41b8b29c04436bf
                                              • Instruction ID: 43064bf31c4af6517e82ec928997074ea404778ef87d2f11be693db213543b9f
                                              • Opcode Fuzzy Hash: a5856b4697b908be054a4ac72a5414c51910e8e6471a67c9f41b8b29c04436bf
                                              • Instruction Fuzzy Hash: 97A00230A94745ABEE619F10DE0AF2A7A61FB88B01F304864B2A1790F0DBB1641CDF4D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • LoadLibraryA.KERNEL32(USER32.DLL,00000000,00000000,00000314,?,?,?,00413E80,00408C97,00413E80,Microsoft Visual C++ Runtime Library,00012010), ref: 0040A2EA
                                              • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 0040A306
                                                • Part of subcall function 0040673B: TlsGetValue.KERNEL32(00000000,004067B0,00000000,0040A2CB,00000000,00000000,00000314,?,?,?,00413E80,00408C97,00413E80,Microsoft Visual C++ Runtime Library,00012010), ref: 00406748
                                                • Part of subcall function 0040673B: TlsGetValue.KERNEL32(FFFFFFFF,?,?,?,00413E80,00408C97,00413E80,Microsoft Visual C++ Runtime Library,00012010), ref: 0040675F
                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040A323
                                                • Part of subcall function 0040673B: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,00413E80,00408C97,00413E80,Microsoft Visual C++ Runtime Library,00012010), ref: 00406774
                                                • Part of subcall function 0040673B: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 0040678F
                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040A338
                                              • __invoke_watson.LIBCMT ref: 0040A359
                                                • Part of subcall function 004058C2: _memset.LIBCMT ref: 0040594E
                                                • Part of subcall function 004058C2: IsDebuggerPresent.KERNEL32(?,?,00000000), ref: 0040596C
                                                • Part of subcall function 004058C2: SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000000), ref: 00405976
                                                • Part of subcall function 004058C2: UnhandledExceptionFilter.KERNEL32(00413E80,?,?,00000000), ref: 00405980
                                                • Part of subcall function 004058C2: GetCurrentProcess.KERNEL32(C000000D,?,?,00000000), ref: 0040599B
                                                • Part of subcall function 004058C2: TerminateProcess.KERNEL32(00000000,?,?,00000000), ref: 004059A2
                                                • Part of subcall function 004067B2: TlsGetValue.KERNEL32(?,004059CC), ref: 004067BF
                                                • Part of subcall function 004067B2: TlsGetValue.KERNEL32(FFFFFFFF,?,004059CC), ref: 004067D6
                                                • Part of subcall function 004067B2: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,004059CC), ref: 004067EB
                                                • Part of subcall function 004067B2: GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 00406806
                                              • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 0040A36D
                                              • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 0040A385
                                              • __invoke_watson.LIBCMT ref: 0040A3F8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: AddressProc$Value$ExceptionFilterHandleModuleProcessUnhandled__invoke_watson$CurrentDebuggerLibraryLoadPresentTerminate_memset
                                              • String ID: GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                              • API String ID: 2940365033-1046234306
                                              • Opcode ID: 7535dc95bca35e8515447b33f3995a6085b2fd547173bcfe7f17b26d5951e0ea
                                              • Instruction ID: fb75f07dada1393bf471aa4606fccdf42b34b645b5060d37196be1893b94f689
                                              • Opcode Fuzzy Hash: 7535dc95bca35e8515447b33f3995a6085b2fd547173bcfe7f17b26d5951e0ea
                                              • Instruction Fuzzy Hash: D041A879900314AACF11AFB5EC8D96F7BA8EB54304B14853FE411F31D1DB7C96A08A6E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetLastError.KERNEL32(75923550,759234C0), ref: 00401061
                                              • GetLastError.KERNEL32(00000400,0040B280,00000000,00000000), ref: 00401077
                                              • FormatMessageA.KERNEL32(00001100,00000000,00000000), ref: 00401081
                                              • wsprintfA.USER32 ref: 0040109A
                                              • MessageBoxA.USER32(00000000,?,FreeExtractor Error,00000010), ref: 004010B3
                                              Strings
                                              • An error prevents this program from continuing: %s %s, xrefs: 00401094
                                              • FreeExtractor Error, xrefs: 004010A5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ErrorLastMessage$Formatwsprintf
                                              • String ID: An error prevents this program from continuing: %s %s$FreeExtractor Error
                                              • API String ID: 1581998817-4084750130
                                              • Opcode ID: acb655983f01ccbc4432a74fe19c605360c92e51bac16d86cd417deff0586d3d
                                              • Instruction ID: cceed217cb06599c6bea3e27b0279c81086081636dd7b3d71e1a28751e90d1bf
                                              • Opcode Fuzzy Hash: acb655983f01ccbc4432a74fe19c605360c92e51bac16d86cd417deff0586d3d
                                              • Instruction Fuzzy Hash: 5B0144B0940218FBE7209B659E09FAA7B7CDB04B41F5000B5FB84BB1D0D7B469858BAD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • IsDebuggerPresent.KERNEL32 ref: 0040577D
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00405792
                                              • UnhandledExceptionFilter.KERNEL32(H9A), ref: 0040579D
                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 004057B9
                                              • TerminateProcess.KERNEL32(00000000), ref: 004057C0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                              • String ID: H9A
                                              • API String ID: 2579439406-2392324566
                                              • Opcode ID: f3f983a565a634118f86a5c31206162df798c8c9aee7372c059c73b85cdff77a
                                              • Instruction ID: 57dfa1f30706d692dc90ede94f4937a1f385ef2fac3a762102a9ca2c1f0a59cd
                                              • Opcode Fuzzy Hash: f3f983a565a634118f86a5c31206162df798c8c9aee7372c059c73b85cdff77a
                                              • Instruction Fuzzy Hash: BA21F2B4515304EFD710DF58EE846857BA4FF08396F10903AE549A7BA1E7B44A84CF4D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(Function_0000A71D), ref: 0040A75F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: 62ce11549e5746e1c56843aadc80f163991ebec6f0de7f7a3d821c5877fe52f7
                                              • Instruction ID: 479729f7af4ba4fc7a668e51885c1e6a7ddd50a5672cc172fac87352e107537b
                                              • Opcode Fuzzy Hash: 62ce11549e5746e1c56843aadc80f163991ebec6f0de7f7a3d821c5877fe52f7
                                              • Instruction Fuzzy Hash: 0190026026220046CE1117745E2D60A25E0AE9860275144B16112E61D5DB7480105D5E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c55e8cef4ead66dbed7c29c400053208fb80856e2e7f565912a24ab0806c1605
                                              • Instruction ID: f3b80663a6165fa8ad55d1a235edb86501d0df6e93bd80599857d8be7be0a23f
                                              • Opcode Fuzzy Hash: c55e8cef4ead66dbed7c29c400053208fb80856e2e7f565912a24ab0806c1605
                                              • Instruction Fuzzy Hash: F8D139B1A102588FCF18CF68C8805AD7BE5FF99354B25826AFD15A7394D374E881CF84
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 09a56591039af48e6e42cb9e98d333cb850fe6655379670edaf9c767c4dbc8b6
                                              • Instruction ID: 41c1e8b651adb9bc2f54ebd6148bc50d1c3c1122979b0627e3caf2e8fa5d4ef8
                                              • Opcode Fuzzy Hash: 09a56591039af48e6e42cb9e98d333cb850fe6655379670edaf9c767c4dbc8b6
                                              • Instruction Fuzzy Hash: BE218622E106B316CB0D9EFE69C4122E7A0DB4F3227164176DDD4770A1D6B8ED2089D8
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetDlgItem.USER32(000003EF), ref: 004019EE
                                              • SetDlgItemTextA.USER32(000003F7,00414AE8), ref: 00401A1F
                                              • SetDlgItemTextA.USER32(000003F9,Removing temp files), ref: 00401A31
                                              • SetDlgItemTextA.USER32(000003FA,Cleaning up ...), ref: 00401A43
                                              • SendMessageA.USER32(00000401,00000401,00000000,?), ref: 00401A64
                                              • SetDlgItemTextA.USER32(000003F8,The extracted files are being removed.), ref: 00401A76
                                              • Sleep.KERNEL32(000000C8), ref: 00401A86
                                              • wsprintfA.USER32 ref: 00401ABB
                                              • wsprintfA.USER32 ref: 00401AD5
                                              • SetDlgItemTextA.USER32(000003FA,?), ref: 00401AF1
                                              • RemoveDirectoryA.KERNEL32(00000000), ref: 00401B20
                                              • DeleteFileA.KERNEL32(00000000), ref: 00401B3A
                                              • SendMessageA.USER32(?,00000402,00000000,00000000), ref: 00401B60
                                              • Sleep.KERNEL32(00000032), ref: 00401B64
                                              • _strlen.LIBCMT ref: 00401B7D
                                              • _strlen.LIBCMT ref: 00401B8A
                                              • RemoveDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\~emtec~354033\), ref: 00401B95
                                              • Sleep.KERNEL32(000000C8), ref: 00401BAD
                                              • PostMessageA.USER32(00000111,0000001F,00000000), ref: 00401BC2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Item$Text$MessageSleep$DirectoryRemoveSend_strlenwsprintf$DeleteFilePost
                                              • String ID: %s%s$C:\Users\user\AppData\Local\Temp\~emtec~354033\$Cleaning up ...$Deleting %s ...$Removing temp files$The extracted files are being removed.$JA
                                              • API String ID: 1276955235-254564783
                                              • Opcode ID: d2f8ba33f8bde57fb984576adea1bc4c563aa837c2e928137c83c24265c30714
                                              • Instruction ID: 018cfaeb45447ecf13b2acfa7123d574b2b1dd0aeef0a2152d6557e7c74a5fb2
                                              • Opcode Fuzzy Hash: d2f8ba33f8bde57fb984576adea1bc4c563aa837c2e928137c83c24265c30714
                                              • Instruction Fuzzy Hash: FE51D270544304AFE711AB70ED49FAB3BA8EB40745F00403AF640B61F2DBB85A41CB9D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • _strcpy_s.LIBCMT ref: 00408BA1
                                              • __invoke_watson.LIBCMT ref: 00408BB2
                                              • GetModuleFileNameA.KERNEL32(00000000,00413E99,00000104), ref: 00408BCE
                                              • _strcpy_s.LIBCMT ref: 00408BE3
                                              • __invoke_watson.LIBCMT ref: 00408BF6
                                              • _strlen.LIBCMT ref: 00408BFF
                                              • _strlen.LIBCMT ref: 00408C0C
                                              • __invoke_watson.LIBCMT ref: 00408C39
                                              • _strcat_s.LIBCMT ref: 00408C4C
                                              • __invoke_watson.LIBCMT ref: 00408C5D
                                              • _strcat_s.LIBCMT ref: 00408C6E
                                              • __invoke_watson.LIBCMT ref: 00408C7F
                                              • GetStdHandle.KERNEL32(000000F4,?,?,00000000,76EC5E70,00000003,00408D01,000000FC,0040897C,00000001,00000000,00000000,?,0040620A,?,00000001), ref: 00408C9E
                                              • _strlen.LIBCMT ref: 00408CBF
                                              • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,0040620A,?,00000001,?,00406563,00000018,0040D028,0000000C,004065F2,?), ref: 00408CC9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: __invoke_watson$_strlen$File_strcat_s_strcpy_s$HandleModuleNameWrite
                                              • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                              • API String ID: 1879448924-4022980321
                                              • Opcode ID: 5e9343f13591cded3f6552505266235912c0705e655521e4fa6f8cc2ebe2dc33
                                              • Instruction ID: 594bb38951b2c435f25d05a6fd36c9204c2ab34fdf1c0c1e92fa44a5d5f10645
                                              • Opcode Fuzzy Hash: 5e9343f13591cded3f6552505266235912c0705e655521e4fa6f8cc2ebe2dc33
                                              • Instruction Fuzzy Hash: F53113A2A553156AE62036218E4AB2B362C9B20358F14013FFD85B12D3EF7D891541FE
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL,0040D068,0000000C,00406963,00000000,00000000,?,00000000,00405A22,004063E2,00000001,004066EA,?,00000000), ref: 00406863
                                              • GetProcAddress.KERNEL32(?,EncodePointer), ref: 00406897
                                              • GetProcAddress.KERNEL32(?,DecodePointer), ref: 004068A7
                                              • InterlockedIncrement.KERNEL32(0040F818), ref: 004068C9
                                              • __lock.LIBCMT ref: 004068D1
                                              • ___addlocaleref.LIBCMT ref: 004068F0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: AddressProc$HandleIncrementInterlockedModule___addlocaleref__lock
                                              • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                              • API String ID: 1036688887-2843748187
                                              • Opcode ID: 62227c4c7599d968a19aa212d8ea303ef7cb03e68bb1b70dc341199583a9e4cd
                                              • Instruction ID: b17cabcd69524e07b574707f6cfc9f44af6e743911dd95d64703bafbafa7d369
                                              • Opcode Fuzzy Hash: 62227c4c7599d968a19aa212d8ea303ef7cb03e68bb1b70dc341199583a9e4cd
                                              • Instruction Fuzzy Hash: 1E113D719407019EEB20AF76D945B5ABBE0EF44314F10853FA8AAB36D0DB799904CF9C
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • getSystemCP.LIBCMT ref: 004081A6
                                                • Part of subcall function 00408113: _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00408120
                                                • Part of subcall function 00408113: GetOEMCP.KERNEL32(00000000), ref: 0040813A
                                              • setSBCS.LIBCMT ref: 004081B8
                                                • Part of subcall function 00407E90: _memset.LIBCMT ref: 00407EA3
                                              • IsValidCodePage.KERNEL32(-00000030), ref: 004081FE
                                              • GetCPInfo.KERNEL32(00000000,?), ref: 00408211
                                              • _memset.LIBCMT ref: 00408229
                                              • setSBUpLow.LIBCMT ref: 004082FC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Locale_memset$CodeInfoPageSystemUpdateUpdate::_Valid
                                              • String ID:
                                              • API String ID: 2658552758-0
                                              • Opcode ID: 5f22f2d49870a45d1b2c2018c7fe8595ea5d80fa3937b46ec80ff7f6d6a7ed22
                                              • Instruction ID: 1ed4ce6d81da85f2ed7b4bc36fe1caa4676ecf64e385ac523a8b50ab09fb8ca0
                                              • Opcode Fuzzy Hash: 5f22f2d49870a45d1b2c2018c7fe8595ea5d80fa3937b46ec80ff7f6d6a7ed22
                                              • Instruction Fuzzy Hash: 4E51E3309046148BDF25DF65C9802BABBA4EF44704F1884BFDCC5BF282CA3D9846CB98
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • TlsGetValue.KERNEL32(00000000,004067B0,00000000,0040A2CB,00000000,00000000,00000314,?,?,?,00413E80,00408C97,00413E80,Microsoft Visual C++ Runtime Library,00012010), ref: 00406748
                                              • TlsGetValue.KERNEL32(FFFFFFFF,?,?,?,00413E80,00408C97,00413E80,Microsoft Visual C++ Runtime Library,00012010), ref: 0040675F
                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,00413E80,00408C97,00413E80,Microsoft Visual C++ Runtime Library,00012010), ref: 00406774
                                              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 0040678F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Value$AddressHandleModuleProc
                                              • String ID: EncodePointer$KERNEL32.DLL
                                              • API String ID: 1929421221-3682587211
                                              • Opcode ID: 0b77ce69fa150788a8d1e40656aca41f106f77314867c607be1724de2d60cb87
                                              • Instruction ID: a3fbd99c55abf2678559b948ba62fee479a011887d2bad7d3359df70f305cee5
                                              • Opcode Fuzzy Hash: 0b77ce69fa150788a8d1e40656aca41f106f77314867c607be1724de2d60cb87
                                              • Instruction Fuzzy Hash: 9CF0F6301002139FC6216B34ED4096B3A95EF40364B264132F815F32F0DB3DCC15969D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • TlsGetValue.KERNEL32(?,004059CC), ref: 004067BF
                                              • TlsGetValue.KERNEL32(FFFFFFFF,?,004059CC), ref: 004067D6
                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,004059CC), ref: 004067EB
                                              • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 00406806
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Value$AddressHandleModuleProc
                                              • String ID: DecodePointer$KERNEL32.DLL
                                              • API String ID: 1929421221-629428536
                                              • Opcode ID: c19a475c749cb2b678dee1554f8b715236311ff3061ccd97e74c6964073a074b
                                              • Instruction ID: d3cfe3a3369e22c72968ec91ecf9b2cffd73badc70383e7dd90a82bded04ed60
                                              • Opcode Fuzzy Hash: c19a475c749cb2b678dee1554f8b715236311ff3061ccd97e74c6964073a074b
                                              • Instruction Fuzzy Hash: C4F090315066139BC6216F34EE00A6B7A94EF44794B16C532F816F32F0DB39CC29DAAD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __lock.LIBCMT ref: 00405CA4
                                                • Part of subcall function 004065D9: __mtinitlocknum.LIBCMT ref: 004065ED
                                                • Part of subcall function 004065D9: __amsg_exit.LIBCMT ref: 004065F9
                                                • Part of subcall function 004065D9: EnterCriticalSection.KERNEL32(?,?,?,00408A98,00000004,0040D1A8,0000000C,00406250,?,?,00000000,00000000,00000000,0040693A,00000001,00000214), ref: 00406601
                                              • ___sbh_find_block.LIBCMT ref: 00405CAF
                                              • ___sbh_free_block.LIBCMT ref: 00405CBE
                                              • HeapFree.KERNEL32(00000000,?,0040CF80,0000000C,004065BA,00000000,0040D028,0000000C,004065F2,?,?,?,00408A98,00000004,0040D1A8,0000000C), ref: 00405CEE
                                              • GetLastError.KERNEL32(?,00408A98,00000004,0040D1A8,0000000C,00406250,?,?,00000000,00000000,00000000,0040693A,00000001,00000214,?,00000000), ref: 00405CFF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                              • String ID:
                                              • API String ID: 2714421763-0
                                              • Opcode ID: dada409390ecfa9c54666b147273ea1a38f9bd2a9250a5f3f48a168545383979
                                              • Instruction ID: c56f20e2ecbc05d485a3b5cbd851e2410fb01009081eaaa340d504d71d576bdf
                                              • Opcode Fuzzy Hash: dada409390ecfa9c54666b147273ea1a38f9bd2a9250a5f3f48a168545383979
                                              • Instruction Fuzzy Hash: E1018471904B11AAEB206BB1AD0AB5F3764EF00364F20413FF411B62C0DA7C95408E5C
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,00020019,00000103,?,00000000,00000103), ref: 004013F2
                                              • RegQueryValueExA.ADVAPI32(?,?,00000000), ref: 0040141D
                                              • RegCloseKey.ADVAPI32(?), ref: 00401426
                                              Strings
                                              • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 004013E8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: CloseOpenQueryValue
                                              • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                              • API String ID: 3677997916-2036018995
                                              • Opcode ID: dc35a899928f6c4f1c4cca54cec9c2eb41d900b44d8b3982cafb415258b8ab5b
                                              • Instruction ID: fe376bb4e881d873306a744fad5fbf7f06eb9a7a9377bdf935b1d8e408fca26e
                                              • Opcode Fuzzy Hash: dc35a899928f6c4f1c4cca54cec9c2eb41d900b44d8b3982cafb415258b8ab5b
                                              • Instruction Fuzzy Hash: ADF0157890020CFFEF009F90ED49FDEBBB8EB04708F1040A0BA14B51A0D3B59A589B98
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004094F7
                                              • __isleadbyte_l.LIBCMT ref: 0040952B
                                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,?,00000000,?), ref: 0040955C
                                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000001,?,00000000,?), ref: 004095CA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                              • String ID:
                                              • API String ID: 3058430110-0
                                              • Opcode ID: 0c35b61afad96c21275ec05caaab146f7039f171d759ef604e72ddbf32abea77
                                              • Instruction ID: 96594215dd7ffc5ae7e9843afee9b77695da558d63cfa781b6e75a7e70e305ba
                                              • Opcode Fuzzy Hash: 0c35b61afad96c21275ec05caaab146f7039f171d759ef604e72ddbf32abea77
                                              • Instruction Fuzzy Hash: 3631D032A04256EFDB21DF65CC809AA7BB4FF01310F15857AE461AB2E2E334DD41DB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00406988: __amsg_exit.LIBCMT ref: 00406996
                                              • __amsg_exit.LIBCMT ref: 0040809B
                                              • __lock.LIBCMT ref: 004080AB
                                              • InterlockedDecrement.KERNEL32(?), ref: 004080C8
                                              • InterlockedIncrement.KERNEL32(0040F818), ref: 004080F3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__lock
                                              • String ID:
                                              • API String ID: 4129207761-0
                                              • Opcode ID: c81fff5e46d9b6d9a0ae035ce2f47a58c69b72d7c3bfb3762a894c53349fd8b8
                                              • Instruction ID: 6a7b75b83f8ad490ceb977d2997f914ff208c601beacb443a90cb82e981a60da
                                              • Opcode Fuzzy Hash: c81fff5e46d9b6d9a0ae035ce2f47a58c69b72d7c3bfb3762a894c53349fd8b8
                                              • Instruction Fuzzy Hash: DC017931A406219BDB31AB669A4675E76A0BF00714F02813FE851B77C1CF3C68898BDD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetLastError.KERNEL32(?,00000000,00405A22,004063E2,00000001,004066EA,?,00000000,?,?,?,?,004067FC,?,004059CC), ref: 00406913
                                                • Part of subcall function 00406820: TlsGetValue.KERNEL32(00000000,00406926,?,00000000,00405A22,004063E2,00000001,004066EA,?,00000000,?,?,?,?,004067FC), ref: 00406827
                                                • Part of subcall function 00406820: TlsSetValue.KERNEL32(00000000,00000000,00405A22,004063E2,00000001,004066EA,?,00000000,?,?,?,?,004067FC,?,004059CC), ref: 00406848
                                              • __calloc_crt.LIBCMT ref: 00406935
                                                • Part of subcall function 0040623D: __calloc_impl.LIBCMT ref: 0040624B
                                                • Part of subcall function 0040623D: Sleep.KERNEL32(00000000), ref: 00406262
                                                • Part of subcall function 004067B2: TlsGetValue.KERNEL32(?,004059CC), ref: 004067BF
                                                • Part of subcall function 004067B2: TlsGetValue.KERNEL32(FFFFFFFF,?,004059CC), ref: 004067D6
                                                • Part of subcall function 00406852: GetModuleHandleA.KERNEL32(KERNEL32.DLL,0040D068,0000000C,00406963,00000000,00000000,?,00000000,00405A22,004063E2,00000001,004066EA,?,00000000), ref: 00406863
                                                • Part of subcall function 00406852: GetProcAddress.KERNEL32(?,EncodePointer), ref: 00406897
                                                • Part of subcall function 00406852: GetProcAddress.KERNEL32(?,DecodePointer), ref: 004068A7
                                                • Part of subcall function 00406852: InterlockedIncrement.KERNEL32(0040F818), ref: 004068C9
                                                • Part of subcall function 00406852: __lock.LIBCMT ref: 004068D1
                                                • Part of subcall function 00406852: ___addlocaleref.LIBCMT ref: 004068F0
                                              • GetCurrentThreadId.KERNEL32 ref: 00406965
                                              • SetLastError.KERNEL32(00000000,?,00000000,00405A22,004063E2,00000001,004066EA,?,00000000,?,?,?,?,004067FC,?,004059CC), ref: 0040697D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Value$AddressErrorLastProc$CurrentHandleIncrementInterlockedModuleSleepThread___addlocaleref__calloc_crt__calloc_impl__lock
                                              • String ID:
                                              • API String ID: 1081334783-0
                                              • Opcode ID: 197b897f0e6162e4cbdd773ed252e9d33462d2a4db24d6a15071660457619522
                                              • Instruction ID: 6c4fa5f7ddfc670567b34fc89d08a269a6c1714e42c3e2b07c60ccb35bc3ae58
                                              • Opcode Fuzzy Hash: 197b897f0e6162e4cbdd773ed252e9d33462d2a4db24d6a15071660457619522
                                              • Instruction Fuzzy Hash: BFF028335027229AD2313B797C05A5B2E64DF04770B12413FF522B65E2CF3AC85156DC
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • DestroyWindow.USER32(?,7591E010), ref: 00401011
                                              • DestroyWindow.USER32(00010424,7591E010), ref: 0040101D
                                              • CloseHandle.KERNEL32(00000124), ref: 0040102A
                                              • ExitProcess.KERNEL32 ref: 00401032
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3263720451.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3263698053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263741147.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263760147.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263780399.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3263819707.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: DestroyWindow$CloseExitHandleProcess
                                              • String ID:
                                              • API String ID: 2085989030-0
                                              • Opcode ID: 365949bbb6c7abfec14263c5219434f77d95f52c6a6ecca140b888bf338354f3
                                              • Instruction ID: 96b95684d812e480a4c5c6016df89f69a7a307c478ed915f810d26511944f79d
                                              • Opcode Fuzzy Hash: 365949bbb6c7abfec14263c5219434f77d95f52c6a6ecca140b888bf338354f3
                                              • Instruction Fuzzy Hash: 1BE0E6716512109FD7209F74AD48F9737DCEB447507054432B410F7561C778D8405AEC
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Execution Graph

                                              Execution Coverage:13.9%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:12.2%
                                              Total number of Nodes:2000
                                              Total number of Limit Nodes:65
                                              execution_graph 37994 415c23 PostMessageA 37995 409683 37996 4096a4 __EH_prolog3 37995->37996 38110 411530 37996->38110 37998 4096c6 38157 40105b 37998->38157 38000 4096d7 38001 409a86 38000->38001 38160 410a1e 38000->38160 38002 40f5cc ctype 2 API calls 38001->38002 38004 409a95 38002->38004 38252 435782 38004->38252 38111 41153c __EH_prolog3 38110->38111 38260 40180c 38111->38260 38113 411546 _memset 38263 401000 38113->38263 38117 41157d _strlen 38272 411143 38117->38272 38119 4115a5 38308 4109e8 38119->38308 38121 4115b1 38122 411655 38121->38122 38123 4115c5 38121->38123 38125 41034d 212 API calls 38122->38125 38124 401071 ctype 212 API calls 38123->38124 38126 4115d1 38124->38126 38156 411653 38125->38156 38127 41034d 212 API calls 38126->38127 38130 4115e1 38127->38130 38128 41034d 212 API calls 38129 41166f 38128->38129 38131 411143 217 API calls 38129->38131 38132 40f5cc ctype 2 API calls 38130->38132 38133 411676 38131->38133 38134 4115ed 38132->38134 38135 4109e8 212 API calls 38133->38135 38136 41161e 38134->38136 38318 412327 GetCurrentDirectoryA 38134->38318 38137 41167c 38135->38137 38138 4109e8 212 API calls 38136->38138 38312 41b378 38137->38312 38141 411627 38138->38141 38323 40f4f7 38141->38323 38143 41034d 212 API calls 38146 411612 38143->38146 38144 411688 38147 40f5cc ctype 2 API calls 38144->38147 38149 40f5cc ctype 2 API calls 38146->38149 38150 41169a 38147->38150 38148 411638 38330 40f93f 38148->38330 38149->38136 38152 40f5cc ctype 2 API calls 38150->38152 38154 4116a5 ctype 38152->38154 38154->37998 38155 40f93f 212 API calls 38155->38156 38156->38128 38158 40f07d ctype 212 API calls 38157->38158 38159 401067 ctype 38158->38159 38159->38000 38995 435d48 38160->38995 38261 401000 ctype 212 API calls 38260->38261 38262 401816 38261->38262 38262->38113 38335 40f5eb 38263->38335 38265 401021 38266 4114d2 38265->38266 38267 4114de __EH_prolog3 38266->38267 38268 40180c 212 API calls 38267->38268 38269 4114e8 38268->38269 38885 41134a 38269->38885 38271 4114f6 ctype 38271->38117 38273 41114f __EH_prolog3 38272->38273 38946 40183a 38273->38946 38275 41115a 38276 411189 38275->38276 38970 40f4d3 212 API calls 38275->38970 38279 411315 38276->38279 38949 410f78 216 API calls 2 library calls 38276->38949 38281 40f9f8 212 API calls 38279->38281 38280 411196 38950 40f9f8 38280->38950 38283 41132c 38281->38283 38284 40f4f7 ctype 212 API calls 38283->38284 38285 411336 38284->38285 38286 40f5cc ctype 2 API calls 38285->38286 38289 411342 ctype 38286->38289 38287 4111d4 38957 412278 38287->38957 38288 4111a9 _strncmp 38288->38287 38971 40f18d 212 API calls ctype 38288->38971 38289->38119 38292 4111c7 38972 40f975 212 API calls 3 library calls 38292->38972 38295 40f9f8 212 API calls 38296 4111ee 38295->38296 38297 40f5cc ctype 2 API calls 38296->38297 38305 4111fa _strlen 38297->38305 38298 411306 38299 41b378 ctype 212 API calls 38298->38299 38299->38279 38300 40183a 212 API calls 38300->38305 38301 40f4f7 ctype 212 API calls 38301->38305 38302 40f5cc EnterCriticalSection LeaveCriticalSection ctype 38302->38305 38303 4019e1 212 API calls 38303->38305 38304 4010b7 212 API calls 38304->38305 38305->38298 38305->38300 38305->38301 38305->38302 38305->38303 38305->38304 38306 40f18d 212 API calls 38305->38306 38307 40f975 212 API calls 38305->38307 38306->38305 38307->38305 38309 4109f0 38308->38309 38310 410a1b 38309->38310 38311 40f2c0 212 API calls 38309->38311 38310->38121 38311->38309 38313 41b381 38312->38313 38314 41b38d 38312->38314 38313->38314 38315 41b38a 38313->38315 38985 41b0e0 212 API calls 7 library calls 38314->38985 38315->38144 38317 41b39b 38317->38144 38319 401071 ctype 212 API calls 38318->38319 38320 41236a 38319->38320 38321 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 38320->38321 38322 411604 38321->38322 38322->38143 38986 4369e5 38323->38986 38326 41b3fe ctype 212 API calls 38328 40f53e __mbschr_l 38326->38328 38327 40f580 __mbschr_l 38327->38148 38328->38327 38990 4360e0 __VEC_memcpy 38328->38990 38331 40f07d ctype 212 API calls 38330->38331 38332 40f951 _strlen 38331->38332 38992 40f81d 38332->38992 38334 40f96e 38334->38155 38336 40f5f5 38335->38336 38338 40f6ef 38336->38338 38342 40f779 _memset _signal 38336->38342 38350 40ef68 212 API calls 2 library calls 38336->38350 38340 41b3fe ctype 212 API calls 38338->38340 38338->38342 38339 40f63e 38346 40f65f _memset _signal 38339->38346 38351 41b3fe 38339->38351 38340->38342 38342->38265 38343 40f68f 38344 40f6f2 38343->38344 38345 40f69b 38343->38345 38344->38338 38347 41b378 ctype 212 API calls 38344->38347 38345->38338 38349 41b378 ctype 212 API calls 38345->38349 38346->38343 38348 40f5cc ctype 2 API calls 38346->38348 38347->38338 38348->38343 38349->38338 38350->38339 38352 41b425 _memset __EH_prolog3 38351->38352 38400 41b752 38352->38400 38419 41036c 38352->38419 38353 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 38354 41b770 38353->38354 38354->38346 38356 41b486 38429 4018a8 38356->38429 38359 41036c ctype 210 API calls 38360 41b4b1 38359->38360 38361 4018a8 ctype 210 API calls 38360->38361 38362 41b4c7 38361->38362 38363 41036c ctype 210 API calls 38362->38363 38364 41b4da 38363->38364 38365 40f5cc ctype 2 API calls 38364->38365 38366 41b4ec 38365->38366 38367 40f5cc ctype 2 API calls 38366->38367 38368 41b4fb 38367->38368 38369 40f5cc ctype 2 API calls 38368->38369 38370 41b50a 38369->38370 38371 40f5cc ctype 2 API calls 38370->38371 38372 41b519 GetLastError 38371->38372 38373 41b526 38372->38373 38374 41b530 38372->38374 38447 412a8a 38373->38447 38432 436694 103 API calls 2 library calls 38374->38432 38377 41b555 38378 40f5cc ctype 2 API calls 38377->38378 38379 41b566 ctype 38377->38379 38378->38379 38433 435c2a 38379->38433 38381 41b5cf ctype 38382 435c2a _sprintf 103 API calls 38381->38382 38383 41b5f6 38382->38383 38384 41b378 ctype 210 API calls 38383->38384 38385 41b607 38384->38385 38444 437ebd 38385->38444 38400->38353 38420 410378 __EH_prolog3 38419->38420 38421 401071 ctype 212 API calls 38420->38421 38422 410394 38421->38422 38511 40f07d 38422->38511 38424 4103ab _strlen 38425 40f5eb ctype 212 API calls 38424->38425 38426 4103c6 38425->38426 38427 40f07d ctype 212 API calls 38426->38427 38428 4103d5 _signal ctype _strlen 38427->38428 38428->38356 38430 41036c ctype 212 API calls 38429->38430 38431 4018c0 38430->38431 38431->38359 38432->38377 38434 435c55 38433->38434 38435 435c38 38433->38435 38434->38435 38437 435c5c 38434->38437 38518 4380ab 67 API calls _signal 38435->38518 38520 4422d1 103 API calls 12 library calls 38437->38520 38438 435c3d 38519 440bb4 67 API calls 2 library calls 38438->38519 38441 435c82 38442 435c4d 38441->38442 38521 4420d0 101 API calls 6 library calls 38441->38521 38442->38381 38522 437df9 38444->38522 38448 412aae __EH_prolog3 38447->38448 38449 412ad6 _memset 38448->38449 38450 412acb GetLastError 38448->38450 38451 412af2 FormatMessageA 38449->38451 38450->38449 38452 401071 ctype 210 API calls 38451->38452 38453 412b23 38452->38453 38454 40f4f7 ctype 210 API calls 38453->38454 38455 412b3c 38454->38455 38456 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 38455->38456 38457 412b5a 38456->38457 38457->38374 38512 40f086 38511->38512 38516 40f0e9 38511->38516 38517 435f72 121 API calls 5 library calls 38512->38517 38514 40f090 ctype 38515 41b3fe ctype 212 API calls 38514->38515 38514->38516 38515->38516 38516->38424 38517->38514 38518->38438 38520->38441 38521->38442 38525 437e05 _ctrlevent_capture@4 38522->38525 38523 437e18 38582 4380ab 67 API calls _signal 38523->38582 38525->38523 38527 437e4d 38525->38527 38526 437e1d 38583 440bb4 67 API calls 2 library calls 38526->38583 38541 445e35 38527->38541 38542 445e41 _ctrlevent_capture@4 38541->38542 38587 443484 38542->38587 38544 445ec2 38594 445f5c 38544->38594 38545 445ec6 38628 442db5 67 API calls _malloc 38545->38628 38549 445ed0 38549->38544 38629 447259 67 API calls 3 library calls 38549->38629 38553 445e4f 38553->38544 38553->38545 38597 4433c1 38553->38597 38626 43b78a 68 API calls __lock 38553->38626 38627 43b7ee LeaveCriticalSection LeaveCriticalSection __freefls@4 38553->38627 38582->38526 38588 443497 38587->38588 38589 4434aa EnterCriticalSection 38587->38589 38590 4433c1 __mtinitlocknum 66 API calls 38588->38590 38589->38553 38591 44349d 38590->38591 38591->38589 38643 439c2b 67 API calls 3 library calls 38591->38643 38593 4434a9 38593->38589 38644 4433ac LeaveCriticalSection 38594->38644 38596 445f63 38598 4433cd _ctrlevent_capture@4 38597->38598 38599 4433f5 38598->38599 38600 4433dd 38598->38600 38626->38553 38627->38553 38628->38549 38643->38593 38644->38596 38887 41136e _memset __EH_prolog3 38885->38887 38886 4114a4 38888 4109e8 212 API calls 38886->38888 38887->38886 38891 401000 ctype 212 API calls 38887->38891 38889 4114ac 38888->38889 38890 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 38889->38890 38892 4114c8 38890->38892 38893 411399 38891->38893 38892->38271 38931 43c079 38893->38931 38896 4113b5 38940 412e54 213 API calls 3 library calls 38896->38940 38897 4113da 38899 43c079 102 API calls 38897->38899 38901 4113e5 38899->38901 38900 4113be 38903 41034d 212 API calls 38900->38903 38902 4113f6 38901->38902 38904 43c079 102 API calls 38901->38904 38909 411468 38902->38909 38941 435f72 121 API calls 5 library calls 38902->38941 38906 4113cc 38903->38906 38904->38902 38908 40f5cc ctype 2 API calls 38906->38908 38907 411406 38942 4385e4 123 API calls 11 library calls 38907->38942 38911 4113d7 38908->38911 38912 401071 ctype 212 API calls 38909->38912 38911->38897 38914 411475 38912->38914 38913 411412 38915 41b3fe ctype 212 API calls 38913->38915 38916 41034d 212 API calls 38914->38916 38917 41142c _strcat 38915->38917 38918 411485 38916->38918 38921 437ed0 ___free_lconv_mon 67 API calls 38917->38921 38919 40f5cc ctype 2 API calls 38918->38919 38920 411490 38919->38920 38922 411143 217 API calls 38920->38922 38923 411440 38921->38923 38924 411498 38922->38924 38925 401071 ctype 212 API calls 38923->38925 38926 40f5cc ctype 2 API calls 38924->38926 38927 411450 38925->38927 38926->38886 38928 41034d 212 API calls 38927->38928 38929 41145d 38928->38929 38930 40f5cc ctype 2 API calls 38929->38930 38930->38909 38932 43c087 38931->38932 38936 43c0b0 38931->38936 38933 43c08c 38932->38933 38932->38936 38943 4380ab 67 API calls _signal 38933->38943 38945 43bfa6 102 API calls 4 library calls 38936->38945 38937 4113af 38937->38896 38937->38897 38938 43c091 38944 440bb4 67 API calls 2 library calls 38938->38944 38940->38900 38941->38907 38942->38913 38943->38938 38945->38937 38973 401027 38946->38973 38949->38280 38951 40fa0d _strncpy ___TypeMatch _strlen 38950->38951 38952 40fab8 38951->38952 38955 40f5eb ctype 212 API calls 38951->38955 38977 40f3a6 38951->38977 38983 40f3ee 212 API calls 3 library calls 38951->38983 38984 4360e0 __VEC_memcpy 38951->38984 38952->38288 38955->38951 38958 41229c __EH_prolog3 38957->38958 38959 40180c 212 API calls 38958->38959 38960 4122b4 GetUserNameA 38959->38960 38961 412302 38960->38961 38962 4122d7 38960->38962 38963 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 38961->38963 38964 401071 ctype 212 API calls 38962->38964 38965 4111dd 38963->38965 38966 4122e8 38964->38966 38965->38295 38967 41034d 212 API calls 38966->38967 38968 4122f6 38967->38968 38969 40f5cc ctype 2 API calls 38968->38969 38969->38961 38970->38276 38971->38292 38972->38287 38974 401055 38973->38974 38975 40104a 38973->38975 38974->38275 38976 40f5eb ctype 212 API calls 38975->38976 38976->38974 38978 40f3b6 38977->38978 38979 40f3d0 38977->38979 38980 40f07d ctype 212 API calls 38978->38980 38979->38951 38981 40f3c2 38980->38981 38982 40f07d ctype 212 API calls 38981->38982 38982->38979 38983->38951 38984->38951 38985->38317 38987 4369fe 38986->38987 38988 40f507 38986->38988 38991 4368cd 102 API calls 5 library calls 38987->38991 38988->38326 38990->38327 38991->38988 38993 40f5eb ctype 212 API calls 38992->38993 38994 40f834 _signal 38993->38994 38994->38334 39000 435cc1 38995->39000 39001 435cca 39000->39001 39002 435cee 39000->39002 39002->39001 39276 418005 39289 417e3d 235 API calls 2 library calls 39276->39289 39278 418012 39285 41804f 39278->39285 39302 418842 SendMessageA 39278->39302 39279 40105b 212 API calls 39281 41805a 39279->39281 39303 41892a 221 API calls ctype 39281->39303 39283 418063 39284 418022 39284->39285 39290 418f66 39284->39290 39301 418860 SendMessageA 39284->39301 39285->39279 39288 418042 39288->39284 39288->39285 39289->39278 39291 413b91 ctype 212 API calls 39290->39291 39292 418f87 _memset 39291->39292 39294 435c2a _sprintf 103 API calls 39292->39294 39299 418fee 39292->39299 39293 41322e ctype 212 API calls 39295 418fff 39293->39295 39296 418fcf 39294->39296 39298 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 39295->39298 39297 41b3fe ctype 212 API calls 39296->39297 39297->39299 39300 41900d 39298->39300 39299->39293 39300->39284 39301->39288 39302->39284 39303->39283 39304 401b27 39305 401b3a __EH_prolog3 39304->39305 39488 419640 39305->39488 39307 401b4b 39308 40183a 212 API calls 39307->39308 39309 401b54 39308->39309 39310 419640 212 API calls 39309->39310 39311 401b65 39310->39311 39312 40183a 212 API calls 39311->39312 39313 401b6e 39312->39313 39314 419640 212 API calls 39313->39314 39315 401b7e 39314->39315 39316 40183a 212 API calls 39315->39316 39317 401b8a 39316->39317 39318 419640 212 API calls 39317->39318 39319 401b9a 39318->39319 39320 40183a 212 API calls 39319->39320 39321 401ba6 39320->39321 39322 401c1e 39321->39322 39323 40105b 212 API calls 39321->39323 39324 419640 212 API calls 39322->39324 39325 401bd6 LoadIconA 39323->39325 39326 401c2a 39324->39326 39325->39322 39327 401bea 39325->39327 39328 40183a 212 API calls 39326->39328 39329 418658 3 API calls 39327->39329 39330 401c36 39328->39330 39331 401c01 SendMessageA 39329->39331 39500 413d81 39330->39500 39333 415d0e ctype 215 API calls 39331->39333 39333->39322 39334 401c51 39335 401000 ctype 212 API calls 39334->39335 39336 401c5e 39335->39336 39337 401000 ctype 212 API calls 39336->39337 39338 401c72 39337->39338 39339 401000 ctype 212 API calls 39338->39339 39340 401c86 39339->39340 39341 41034d 212 API calls 39340->39341 39343 401cc3 39340->39343 39341->39343 39342 401cf5 39344 401d4d 39342->39344 39518 40191c 212 API calls 39342->39518 39343->39342 39345 41034d 212 API calls 39343->39345 39347 401f08 39344->39347 39522 4019e1 39344->39522 39345->39342 39350 40f9f8 212 API calls 39347->39350 39348 401d17 39351 401d52 39348->39351 39352 401d1d 39348->39352 39354 401f1f 39350->39354 39519 4018c8 39351->39519 39355 401071 ctype 212 API calls 39352->39355 39353 401dbb 39530 4010b7 39353->39530 39510 401977 39354->39510 39359 401d2f 39355->39359 39363 41034d 212 API calls 39359->39363 39367 401d41 39363->39367 39364 40f5cc ctype 2 API calls 39365 41034d 212 API calls 39369 401f3a 39365->39369 39366 401071 ctype 212 API calls 39370 401d7a 39366->39370 39371 40f5cc ctype 2 API calls 39367->39371 39373 40f5cc ctype 2 API calls 39369->39373 39375 41034d 212 API calls 39370->39375 39371->39344 39379 401d8c 39375->39379 39383 40f5cc ctype 2 API calls 39379->39383 39383->39344 39498 41964c __EH_prolog3 39488->39498 39489 418f66 212 API calls 39489->39498 39490 419733 39493 418f66 212 API calls 39490->39493 39491 41b3fe ctype 212 API calls 39491->39498 39492 43c079 102 API calls 39492->39498 39495 419746 ctype 39493->39495 39495->39307 39496 419015 212 API calls 39496->39498 39497 401071 ctype 212 API calls 39497->39498 39498->39489 39498->39490 39498->39491 39498->39492 39498->39496 39498->39497 39499 40f5cc EnterCriticalSection LeaveCriticalSection ctype 39498->39499 39541 418f1f 212 API calls 3 library calls 39498->39541 39499->39498 39501 413d8d __EH_prolog3 39500->39501 39502 40180c 212 API calls 39501->39502 39503 413d9e 39502->39503 39504 413dcb 39503->39504 39505 41b3fe ctype 212 API calls 39503->39505 39542 413c81 39504->39542 39505->39504 39507 413dfa 39508 413e0f ctype 39507->39508 39509 41b378 ctype 212 API calls 39507->39509 39508->39334 39509->39508 39566 4107b9 39510->39566 39512 401992 39512->39365 39518->39348 39520 40f0f0 212 API calls 39519->39520 39521 4018db 39520->39521 39521->39344 39521->39366 39523 4019ed __EH_prolog3 39522->39523 39582 41052b 39523->39582 39526 401821 212 API calls 39527 401a0c 39526->39527 39528 40f5cc ctype 2 API calls 39527->39528 39529 401a1b ctype 39528->39529 39529->39353 39531 40f0f0 212 API calls 39530->39531 39532 4010c8 39531->39532 39532->39364 39541->39498 39543 413c8d __EH_prolog3 39542->39543 39556 4135eb 39543->39556 39545 413c9e 39546 413cf8 39545->39546 39548 413cd6 RegOpenKeyExA 39545->39548 39549 413cbd 39545->39549 39547 41b3fe ctype 212 API calls 39546->39547 39550 413cd2 39547->39550 39548->39550 39549->39546 39551 413cc5 RegCreateKeyA 39549->39551 39552 413d26 39550->39552 39553 41034d 212 API calls 39550->39553 39551->39550 39554 40f5cc ctype 2 API calls 39552->39554 39553->39552 39555 413d3c ctype 39554->39555 39555->39507 39557 4135f7 __EH_prolog3 39556->39557 39558 401071 ctype 212 API calls 39557->39558 39560 413610 _strlen 39558->39560 39559 41365d ctype 39559->39545 39560->39559 39561 41363f 39560->39561 39562 40f93f 212 API calls 39560->39562 39563 40f93f 212 API calls 39561->39563 39562->39561 39564 413652 39563->39564 39565 40f4f7 ctype 212 API calls 39564->39565 39565->39559 39567 4107c5 __EH_prolog3 39566->39567 39568 401071 ctype 212 API calls 39567->39568 39571 4107f3 _strpbrk _strlen 39568->39571 39569 41086a 39570 410878 ctype 39569->39570 39578 401a6b 39569->39578 39570->39512 39571->39569 39573 401999 212 API calls 39571->39573 39574 41084e 39573->39574 39575 41034d 212 API calls 39574->39575 39576 41085e 39575->39576 39577 40f5cc ctype 2 API calls 39576->39577 39577->39569 39579 401a73 39578->39579 39580 401a7f 39578->39580 39581 40f5eb ctype 212 API calls 39579->39581 39580->39570 39581->39580 39583 40fc27 212 API calls 39582->39583 39584 4019fd 39583->39584 39584->39526 39585 432bab 39586 432bc5 39585->39586 39588 432c03 39586->39588 39636 42f337 39586->39636 39589 432c55 39588->39589 39590 42f337 79 API calls 39588->39590 39591 42f337 79 API calls 39589->39591 39594 432cab 39589->39594 39590->39588 39591->39589 39592 432cde 39621 4326fb 39592->39621 39594->39592 39596 42f337 79 API calls 39594->39596 39602 432d2a 39594->39602 39596->39594 39597 432d1d 39600 43218a 67 API calls 39597->39600 39597->39602 39598 432f80 39627 43218a 39598->39627 39600->39602 39603 4326fb 67 API calls 39604 432fc5 39603->39604 39605 433000 39604->39605 39609 432fce _printf 39604->39609 39606 4326fb 67 API calls 39605->39606 39612 43302b _printf 39606->39612 39607 433052 39631 4321aa 39607->39631 39608 432d97 39608->39598 39608->39602 39610 42f337 79 API calls 39608->39610 39609->39602 39613 43a91c _fprintf 105 API calls 39609->39613 39610->39608 39612->39607 39619 43a91c _fprintf 105 API calls 39612->39619 39615 432fee 39613->39615 39617 43218a 67 API calls 39615->39617 39616 43218a 67 API calls 39618 433074 39616->39618 39617->39602 39620 43218a 67 API calls 39618->39620 39619->39607 39620->39602 39622 432717 _memset 39621->39622 39623 437fad _malloc 67 API calls 39622->39623 39624 432a99 39622->39624 39625 432751 39622->39625 39623->39622 39624->39625 39626 43218a 67 API calls 39624->39626 39625->39597 39625->39608 39626->39625 39628 4321a6 39627->39628 39629 432192 39627->39629 39628->39603 39629->39628 39630 437ed0 ___free_lconv_mon 67 API calls 39629->39630 39630->39629 39633 4321e7 _signal 39631->39633 39632 4322ff 39632->39602 39632->39616 39633->39632 39634 42f337 79 API calls 39633->39634 39635 42f901 101 API calls 39633->39635 39634->39633 39635->39633 39637 42f341 39636->39637 39638 42f358 39636->39638 39640 43cf7e 39637->39640 39638->39586 39641 43cf8a _ctrlevent_capture@4 39640->39641 39642 43cf92 39641->39642 39643 43cfad 39641->39643 39741 4380be 67 API calls _signal 39642->39741 39644 43cfbb 39643->39644 39649 43cffc 39643->39649 39743 4380be 67 API calls _signal 39644->39743 39647 43cf97 39742 4380ab 67 API calls _signal 39647->39742 39648 43cfc0 39744 4380ab 67 API calls _signal 39648->39744 39652 43d009 39649->39652 39653 43d01d 39649->39653 39746 4380be 67 API calls _signal 39652->39746 39654 44622a __close 68 API calls 39653->39654 39657 43d023 39654->39657 39655 43cfc7 39745 440bb4 67 API calls 2 library calls 39655->39745 39660 43d030 39657->39660 39661 43d046 39657->39661 39658 43d00e 39747 4380ab 67 API calls _signal 39658->39747 39659 43cf9f _ctrlevent_capture@4 39659->39638 39670 43c9bd 39660->39670 39748 4380ab 67 API calls _signal 39661->39748 39666 43d03e 39750 43d071 LeaveCriticalSection __locking 39666->39750 39667 43d04b 39749 4380be 67 API calls _signal 39667->39749 39671 43c9f2 39670->39671 39672 43c9d7 39670->39672 39674 43ca01 39671->39674 39675 43ca28 39671->39675 39751 4380be 67 API calls _signal 39672->39751 39753 4380be 67 API calls _signal 39674->39753 39679 43ca47 39675->39679 39690 43ca5b 39675->39690 39677 43c9dc 39752 4380ab 67 API calls _signal 39677->39752 39678 43ca06 39754 4380ab 67 API calls _signal 39678->39754 39756 4380be 67 API calls _signal 39679->39756 39683 43cab3 39758 4380be 67 API calls _signal 39683->39758 39684 43ca0d 39755 440bb4 67 API calls 2 library calls 39684->39755 39686 43ca4c 39757 4380ab 67 API calls _signal 39686->39757 39688 43cab8 39759 4380ab 67 API calls _signal 39688->39759 39690->39683 39691 43c9e4 39690->39691 39694 43ca8f 39690->39694 39695 43cad4 39690->39695 39691->39666 39693 43ca53 39760 440bb4 67 API calls 2 library calls 39693->39760 39694->39683 39703 43ca9a ReadFile 39694->39703 39761 442db5 67 API calls _malloc 39695->39761 39700 43caea 39706 43caf2 39700->39706 39707 43cb10 39700->39707 39701 43cf42 GetLastError 39704 43cdc7 39701->39704 39705 43cf4f 39701->39705 39702 43cbc6 39702->39701 39710 43cbda 39702->39710 39703->39701 39703->39702 39720 43cd4c 39704->39720 39768 4380d1 67 API calls 3 library calls 39704->39768 39770 4380ab 67 API calls _signal 39705->39770 39762 4380ab 67 API calls _signal 39706->39762 39764 44830c 69 API calls 3 library calls 39707->39764 39710->39720 39721 43cbf6 39710->39721 39724 43ce0c 39710->39724 39712 43cf54 39771 4380be 67 API calls _signal 39712->39771 39713 43caf7 39763 4380be 67 API calls _signal 39713->39763 39715 43cb1c 39715->39703 39718 43cb02 39718->39691 39719 437ed0 ___free_lconv_mon 67 API calls 39719->39691 39720->39691 39720->39719 39722 43cc5c ReadFile 39721->39722 39729 43ccd9 39721->39729 39725 43cc7a GetLastError 39722->39725 39732 43cc84 39722->39732 39723 43ce87 ReadFile 39726 43cea6 GetLastError 39723->39726 39733 43ceb0 39723->39733 39724->39720 39724->39723 39725->39721 39725->39732 39726->39724 39726->39733 39727 43cd9d MultiByteToWideChar 39727->39720 39728 43cdc1 GetLastError 39727->39728 39728->39704 39729->39720 39730 43cd47 39729->39730 39731 43cd54 39729->39731 39737 43cd11 39729->39737 39766 4380ab 67 API calls _signal 39730->39766 39731->39737 39738 43cd8b 39731->39738 39732->39721 39765 44830c 69 API calls 3 library calls 39732->39765 39733->39724 39769 44830c 69 API calls 3 library calls 39733->39769 39737->39727 39767 44830c 69 API calls 3 library calls 39738->39767 39740 43cd9a 39740->39727 39741->39647 39742->39659 39743->39648 39744->39655 39746->39658 39747->39655 39748->39667 39749->39666 39750->39659 39751->39677 39752->39691 39753->39678 39754->39684 39756->39686 39757->39693 39758->39688 39759->39693 39761->39700 39762->39713 39763->39718 39764->39715 39765->39732 39766->39720 39767->39740 39768->39720 39769->39733 39770->39712 39771->39720 39772 402889 39773 402890 __EH_prolog3 39772->39773 39914 419baa 39773->39914 39775 4028d7 39776 419640 212 API calls 39775->39776 39777 4028eb 39776->39777 39778 402dd6 39777->39778 39922 41a162 39777->39922 39995 419fde EnterCriticalSection LeaveCriticalSection __EH_prolog3 ctype 39778->39995 39781 402de2 39783 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 39781->39783 39784 402e00 39783->39784 39785 4136a5 213 API calls 39786 402921 39785->39786 39948 406d1b 39786->39948 39915 419bb6 __EH_prolog3 39914->39915 39996 419a87 39915->39996 39917 419bd3 39918 419a87 212 API calls 39917->39918 39919 419be1 39918->39919 39920 40180c 212 API calls 39919->39920 39921 419bf4 _strncpy ctype 39920->39921 39921->39775 39923 41a186 __EH_prolog3 39922->39923 39924 401000 ctype 212 API calls 39923->39924 39925 41a19c 39924->39925 39926 41b378 ctype 212 API calls 39925->39926 39927 41a1b1 39926->39927 39999 40fd54 39927->39999 39930 41a208 39931 412a8a ctype 212 API calls 39930->39931 39934 41a216 39931->39934 39933 41a1d1 39935 41a1ee 39933->39935 40024 4192b9 212 API calls 2 library calls 39933->40024 39936 41b378 ctype 212 API calls 39934->39936 40025 41a117 212 API calls 39935->40025 39939 41a227 39936->39939 39941 40f5cc ctype 2 API calls 39939->39941 39940 41a1fa 40026 419fde EnterCriticalSection LeaveCriticalSection __EH_prolog3 ctype 39940->40026 39943 41a235 39941->39943 39944 40f5cc ctype 2 API calls 39943->39944 39945 41a241 39944->39945 39946 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 39945->39946 39947 402909 39946->39947 39947->39778 39947->39785 39995->39781 39997 418e3f 212 API calls 39996->39997 39998 419a95 _strncpy 39997->39998 39998->39917 40000 40fd66 ctype 39999->40000 40027 436d80 40000->40027 40003 41b378 ctype 212 API calls 40004 40fdc6 40003->40004 40086 4108b6 40004->40086 40007 40fdd8 40010 40f5eb ctype 212 API calls 40007->40010 40008 40fe3c 40009 412a8a ctype 212 API calls 40008->40009 40022 40fe34 40009->40022 40019 40fe06 40010->40019 40011 41b378 ctype 212 API calls 40012 40fe6b 40011->40012 40014 40fe80 40012->40014 40015 40f5cc ctype 2 API calls 40012->40015 40016 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 40014->40016 40015->40014 40018 40fea2 40016->40018 40017 40f81d 212 API calls 40017->40019 40018->39930 40023 419c1f 212 API calls 7 library calls 40018->40023 40019->40017 40020 40fe2e 40019->40020 40095 437a72 40019->40095 40021 437579 __fcloseall 106 API calls 40020->40021 40021->40022 40022->40011 40023->39933 40024->39935 40025->39940 40026->39930 40028 436db3 40027->40028 40029 436dd7 40027->40029 40101 4380be 67 API calls _signal 40028->40101 40029->40028 40030 436ddb 40029->40030 40098 444cdf 40030->40098 40033 436db8 40102 4380ab 67 API calls _signal 40033->40102 40036 436dbf 40103 440bb4 67 API calls 2 library calls 40036->40103 40037 436dec 40104 4380ab 67 API calls _signal 40037->40104 40040 436e22 40107 444a9d 104 API calls 5 library calls 40040->40107 40041 436e08 40041->40037 40106 444c07 102 API calls __mbctolower_l 40041->40106 40043 436df1 40105 4380be 67 API calls _signal 40043->40105 40045 436e27 FindFirstFileA 40048 436e41 40045->40048 40049 436efc 40045->40049 40047 436e1c 40047->40045 40050 444cdf 77 API calls 40048->40050 40051 436f0e FileTimeToLocalFileTime 40049->40051 40056 436f06 40049->40056 40055 436e4f 40050->40055 40053 437081 GetLastError 40051->40053 40054 436f24 FileTimeToSystemTime 40051->40054 40052 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 40057 40fdb1 40052->40057 40137 4380d1 67 API calls 3 library calls 40053->40137 40054->40053 40058 436f3a 40054->40058 40055->40037 40108 438179 111 API calls 2 library calls 40055->40108 40061 436f80 FileTimeToLocalFileTime 40056->40061 40064 436f72 40056->40064 40057->40003 40060 444834 124 API calls 40058->40060 40060->40056 40061->40053 40065 436f96 FileTimeToSystemTime 40061->40065 40063 43708d FindClose 40084 436dcf 40063->40084 40069 436ff2 FileTimeToLocalFileTime 40064->40069 40073 436fe4 FindClose 40064->40073 40065->40053 40066 436fac 40065->40066 40068 444834 124 API calls 40066->40068 40067 436ee5 40067->40037 40071 437ed0 ___free_lconv_mon 67 API calls 40067->40071 40068->40064 40069->40053 40070 437004 FileTimeToSystemTime 40069->40070 40070->40053 40075 437016 40070->40075 40071->40037 40072 436e6b _IsRootUNCName _strlen 40072->40067 40076 436e89 GetDriveTypeA 40072->40076 40079 43704d 40073->40079 40078 444834 124 API calls 40075->40078 40076->40067 40077 436e95 40076->40077 40080 436ea2 40077->40080 40082 437ed0 ___free_lconv_mon 67 API calls 40077->40082 40078->40073 40136 44477b 102 API calls 2 library calls 40079->40136 40109 444834 40080->40109 40082->40080 40084->40052 40087 41b378 ctype 212 API calls 40086->40087 40093 4108d1 __mbschr_l 40087->40093 40088 437df9 __fsopen 161 API calls 40089 41092e 40088->40089 40090 41093d 40089->40090 40091 43c4ef __output_l 67 API calls 40089->40091 40092 41b378 ctype 212 API calls 40090->40092 40091->40090 40094 40fdcf 40092->40094 40093->40088 40094->40007 40094->40008 40370 4379dc 40095->40370 40097 437a89 40097->40019 40138 444c15 40098->40138 40100 436de6 40100->40037 40100->40040 40100->40041 40101->40033 40102->40036 40104->40043 40105->40084 40106->40047 40107->40045 40108->40072 40110 444a88 40109->40110 40112 44485a 40109->40112 40268 4380ab 67 API calls _signal 40110->40268 40112->40110 40113 4448fa __gmtime64_s 40112->40113 40235 446df2 40113->40235 40115 4449d9 40243 446e82 40115->40243 40118 4449f6 40251 446eb6 40118->40251 40119 4449e7 40250 440ab8 10 API calls 3 library calls 40119->40250 40122 4449f3 40122->40118 40124 444a04 40258 440ab8 10 API calls 3 library calls 40124->40258 40125 444a13 40259 446eea 40125->40259 40128 444a10 40128->40125 40130 444a21 40266 440ab8 10 API calls 3 library calls 40130->40266 40132 436ec6 40132->40079 40133 444a2d 40134 444a30 40133->40134 40134->40132 40267 446e41 67 API calls 4 library calls 40134->40267 40136->40084 40137->40063 40145 435853 40138->40145 40142 444c50 40154 440bb4 67 API calls 2 library calls 40142->40154 40144 444c32 _strpbrk 40144->40100 40146 435862 40145->40146 40152 4358af 40145->40152 40155 43fa7d 40146->40155 40149 43588f 40149->40152 40161 44019e 69 API calls 6 library calls 40149->40161 40152->40144 40153 4380ab 67 API calls _signal 40152->40153 40153->40142 40162 43fa06 GetLastError 40155->40162 40157 43fa83 40158 435867 40157->40158 40177 439c2b 67 API calls 3 library calls 40157->40177 40158->40149 40160 4408dd 75 API calls 5 library calls 40158->40160 40160->40149 40161->40152 40178 43f8bf TlsGetValue 40162->40178 40165 43fa71 SetLastError 40165->40157 40168 43fa37 40189 43f82d 67 API calls _ctrlevent_capture@4 40168->40189 40170 43fa49 40171 43fa50 40170->40171 40172 43fa68 40170->40172 40190 43f947 40171->40190 40174 437ed0 ___free_lconv_mon 64 API calls 40172->40174 40176 43fa6e 40174->40176 40175 43fa58 GetCurrentThreadId 40175->40165 40176->40165 40177->40158 40179 43f8d2 40178->40179 40180 43f8ed 40178->40180 40204 43f82d 67 API calls _ctrlevent_capture@4 40179->40204 40180->40165 40183 442df5 40180->40183 40182 43f8dd TlsSetValue 40182->40180 40185 442df9 40183->40185 40186 43fa2f 40185->40186 40187 442e19 Sleep 40185->40187 40205 43887a 40185->40205 40186->40165 40186->40168 40188 442e2e 40187->40188 40188->40185 40188->40186 40189->40170 40218 442f7c 40190->40218 40192 43f953 GetModuleHandleA 40193 43f975 40192->40193 40194 43f9a4 InterlockedIncrement 40192->40194 40219 43f74a 67 API calls 2 library calls 40193->40219 40195 443484 __lock 63 API calls 40194->40195 40197 43f9cb 40195->40197 40220 44078d InterlockedIncrement 40197->40220 40198 43f97a 40198->40194 40199 43f97e GetProcAddress GetProcAddress 40198->40199 40199->40194 40201 43f9ea 40232 43f9fd 40201->40232 40203 43f9f7 _ctrlevent_capture@4 40203->40175 40204->40182 40206 438886 _ctrlevent_capture@4 40205->40206 40207 43889e 40206->40207 40217 4388bd _memset 40206->40217 40208 4380ab __output_l 66 API calls 40207->40208 40209 4388a3 40208->40209 40211 440bb4 __output_l 66 API calls 40209->40211 40210 43892f HeapAlloc 40210->40217 40212 4388b3 _ctrlevent_capture@4 40211->40212 40212->40185 40213 441f6a _malloc 66 API calls 40213->40217 40214 443484 __lock 66 API calls 40214->40217 40215 439948 ___sbh_alloc_block 5 API calls 40215->40217 40216 438976 __calloc_impl LeaveCriticalSection 40216->40217 40217->40210 40217->40212 40217->40213 40217->40214 40217->40215 40217->40216 40218->40192 40219->40198 40221 4407a8 InterlockedIncrement 40220->40221 40222 4407ab 40220->40222 40221->40222 40223 4407b5 InterlockedIncrement 40222->40223 40224 4407b8 40222->40224 40223->40224 40225 4407c5 40224->40225 40226 4407c2 InterlockedIncrement 40224->40226 40227 4407cf InterlockedIncrement 40225->40227 40229 4407d2 40225->40229 40226->40225 40227->40229 40228 4407e7 InterlockedIncrement 40228->40229 40229->40228 40230 4407f7 InterlockedIncrement 40229->40230 40231 440800 InterlockedIncrement 40229->40231 40230->40229 40231->40201 40233 4433ac __freefls@4 LeaveCriticalSection 40232->40233 40234 43fa04 40233->40234 40234->40203 40236 446dfe _ctrlevent_capture@4 40235->40236 40237 446e32 _ctrlevent_capture@4 40236->40237 40238 443484 __lock 67 API calls 40236->40238 40237->40115 40239 446e0f 40238->40239 40240 446e20 40239->40240 40269 446706 40239->40269 40334 446e38 LeaveCriticalSection __freefls@4 40240->40334 40244 446e8d 40243->40244 40245 4449e2 40243->40245 40364 4380ab 67 API calls _signal 40244->40364 40245->40118 40245->40119 40247 446e92 40365 440bb4 67 API calls 2 library calls 40247->40365 40250->40122 40252 446ec1 40251->40252 40253 4449ff 40251->40253 40366 4380ab 67 API calls _signal 40252->40366 40253->40124 40253->40125 40255 446ec6 40367 440bb4 67 API calls 2 library calls 40255->40367 40258->40128 40260 446ef5 40259->40260 40261 444a1c 40259->40261 40368 4380ab 67 API calls _signal 40260->40368 40261->40130 40261->40134 40263 446efa 40369 440bb4 67 API calls 2 library calls 40263->40369 40266->40133 40267->40132 40268->40132 40270 446712 _ctrlevent_capture@4 40269->40270 40271 443484 __lock 67 API calls 40270->40271 40272 44672d __tzset_nolock 40271->40272 40273 446eea __tzset_nolock 67 API calls 40272->40273 40274 446742 40273->40274 40275 446754 40274->40275 40276 446747 40274->40276 40277 446e82 __isindst_nolock 67 API calls 40275->40277 40335 440ab8 10 API calls 3 library calls 40276->40335 40280 44675d 40277->40280 40279 446751 40279->40275 40281 446762 40280->40281 40282 44676f 40280->40282 40336 440ab8 10 API calls 3 library calls 40281->40336 40284 446eb6 _cvtdate 67 API calls 40282->40284 40286 446778 40284->40286 40285 44676c 40285->40282 40287 44677d 40286->40287 40288 44678a 40286->40288 40337 440ab8 10 API calls 3 library calls 40287->40337 40338 448e44 40288->40338 40291 446787 40291->40288 40294 4467b1 40295 446837 40294->40295 40300 4467bf ___TypeMatch 40294->40300 40334->40237 40335->40279 40336->40285 40337->40291 40339 43fa7d _CallSETranslator 67 API calls 40338->40339 40340 448e49 40339->40340 40341 44678f 40340->40341 40361 4408dd 75 API calls 5 library calls 40340->40361 40343 435ef1 40341->40343 40344 435f01 40343->40344 40345 435f05 40343->40345 40344->40294 40346 435f64 40345->40346 40348 435f18 _strlen 40345->40348 40362 443279 121 API calls 3 library calls 40345->40362 40346->40294 40348->40346 40363 443262 111 API calls __mbsnbicoll_l 40348->40363 40361->40341 40362->40348 40363->40348 40364->40247 40366->40255 40368->40263 40371 4379e8 _ctrlevent_capture@4 40370->40371 40372 437a31 40371->40372 40373 437a26 _ctrlevent_capture@4 40371->40373 40375 4379fc _memset 40371->40375 40374 43b74e _fprintf 68 API calls 40372->40374 40373->40097 40377 437a39 40374->40377 40399 4380ab 67 API calls _signal 40375->40399 40383 4377d6 40377->40383 40378 437a16 40400 440bb4 67 API calls 2 library calls 40378->40400 40387 4377f2 _memset 40383->40387 40390 437810 40383->40390 40384 4377fb 40402 4380ab 67 API calls _signal 40384->40402 40386 437800 40403 440bb4 67 API calls 2 library calls 40386->40403 40387->40384 40387->40390 40396 43784f 40387->40396 40401 437a68 LeaveCriticalSection LeaveCriticalSection _fgets 40390->40401 40391 43796b _memset 40425 4380ab 67 API calls _signal 40391->40425 40392 437997 _memset 40426 4380ab 67 API calls _signal 40392->40426 40394 43c4ef __output_l 67 API calls 40394->40396 40396->40390 40396->40391 40396->40392 40396->40394 40398 43cf7e __filbuf 79 API calls 40396->40398 40404 444e3e 67 API calls 3 library calls 40396->40404 40405 444d1e 40396->40405 40398->40396 40399->40378 40401->40373 40402->40386 40404->40396 40406 444d2a 40405->40406 40410 444d47 40405->40410 40427 4380ab 67 API calls _signal 40406->40427 40408 444d2f 40428 440bb4 67 API calls 2 library calls 40408->40428 40411 444d7b 40410->40411 40419 444d3f 40410->40419 40429 44a08f 67 API calls __malloc_crt 40410->40429 40413 43c4ef __output_l 67 API calls 40411->40413 40414 444d8f 40413->40414 40415 43cf7e __filbuf 79 API calls 40414->40415 40416 444d96 40415->40416 40417 43c4ef __output_l 67 API calls 40416->40417 40416->40419 40418 444db5 40417->40418 40418->40419 40420 43c4ef __output_l 67 API calls 40418->40420 40419->40396 40425->40386 40426->40386 40427->40408 40429->40411 40528 4364aa 40583 442f7c 40528->40583 40530 4364b6 GetStartupInfoA GetProcessHeap HeapAlloc 40531 4364f5 GetVersionExA 40530->40531 40532 4364e8 40530->40532 40534 436513 GetProcessHeap HeapFree 40531->40534 40535 436505 GetProcessHeap HeapFree 40531->40535 40602 436445 67 API calls 3 library calls 40532->40602 40536 43653f 40534->40536 40537 4364ef _ctrlevent_capture@4 40535->40537 40584 44415c HeapCreate 40536->40584 40539 436580 40540 43658c 40539->40540 40603 436445 67 API calls 3 library calls 40539->40603 40604 43fc1f 78 API calls 6 library calls 40540->40604 40543 436592 40544 436596 40543->40544 40545 43659e __RTC_Initialize 40543->40545 40605 436445 67 API calls 3 library calls 40544->40605 40594 443e79 72 API calls 3 library calls 40545->40594 40547 43659d 40547->40545 40549 4365ab 40550 4365b7 GetCommandLineA 40549->40550 40551 4365af 40549->40551 40595 443d44 76 API calls 3 library calls 40550->40595 40606 439c2b 67 API calls 3 library calls 40551->40606 40554 4365c7 40607 443c8b 112 API calls 3 library calls 40554->40607 40555 4365b6 40555->40550 40557 4365d1 40558 4365d5 40557->40558 40559 4365dd 40557->40559 40608 439c2b 67 API calls 3 library calls 40558->40608 40596 443a18 111 API calls 6 library calls 40559->40596 40562 4365dc 40562->40559 40563 4365e2 40564 4365e6 40563->40564 40565 4365ee 40563->40565 40609 439c2b 67 API calls 3 library calls 40564->40609 40597 439d47 74 API calls 4 library calls 40565->40597 40568 4365ed 40568->40565 40569 4365f4 40570 436600 40569->40570 40571 4365f9 40569->40571 40598 4439bb 111 API calls 2 library calls 40570->40598 40610 439c2b 67 API calls 3 library calls 40571->40610 40574 4365ff 40574->40570 40575 436605 40576 43660a 40575->40576 40599 415700 40575->40599 40576->40575 40583->40530 40585 44417c 40584->40585 40586 44417f 40584->40586 40585->40539 40613 444101 67 API calls 3 library calls 40586->40613 40588 444184 40589 4441b2 40588->40589 40590 44418e 40588->40590 40589->40539 40614 439084 HeapAlloc 40590->40614 40592 444198 40592->40589 40593 44419d HeapDestroy 40592->40593 40593->40585 40594->40549 40595->40554 40596->40563 40597->40569 40598->40575 40615 41566a GetCommandLineA 40599->40615 40602->40537 40603->40540 40604->40543 40605->40547 40606->40555 40607->40557 40608->40562 40609->40568 40610->40574 40613->40588 40614->40592 40616 401071 ctype 212 API calls 40615->40616 40617 415699 40616->40617 40630 439034 40617->40630 40620 40f5cc ctype 2 API calls 40621 4156ae 40620->40621 40640 414879 40621->40640 40623 4156d4 40646 415564 40623->40646 40631 439044 _strlen 40630->40631 40634 4156a0 40630->40634 40632 437fad _malloc 67 API calls 40631->40632 40633 439055 40632->40633 40633->40634 40678 43ba96 67 API calls __output_l 40633->40678 40634->40620 40636 439065 40636->40634 40637 43906c 40636->40637 40679 440ab8 10 API calls 3 library calls 40637->40679 40639 439076 40639->40634 40641 414887 40640->40641 40645 4148a9 __mbschr_l _strlen 40640->40645 40642 4114d2 220 API calls 40641->40642 40643 414894 _strcat 40642->40643 40644 40f5cc ctype 2 API calls 40643->40644 40644->40645 40645->40623 40647 415570 __EH_prolog3 40646->40647 40648 401000 ctype 212 API calls 40647->40648 40649 41557b 40648->40649 40680 414b50 LoadLibraryW 40649->40680 40655 41559b 40695 43c7bd 40655->40695 40657 4155a7 40703 418355 40657->40703 40659 4155ad GetCurrentThreadId 40660 41b378 ctype 212 API calls 40659->40660 40661 4155c3 GetThreadLocale 40660->40661 40678->40636 40679->40639 40681 414ba1 40680->40681 40682 414b69 GetProcAddress 40680->40682 40887 4398a0 68 API calls __output_l 40681->40887 40684 414b95 FreeLibrary 40682->40684 40685 414b7c GetProcessHeap 40682->40685 40684->40681 40686 414bab 40684->40686 40687 414b93 40685->40687 40688 415521 40686->40688 40687->40684 40689 415529 40688->40689 40690 415563 40689->40690 40691 415558 SetUnhandledExceptionFilter 40689->40691 40692 437fad _malloc 67 API calls 40689->40692 40694 414b31 InitCommonControlsEx 40690->40694 40691->40690 40693 415552 40692->40693 40693->40691 40694->40655 40696 43c7c9 _ctrlevent_capture@4 40695->40696 40697 443484 __lock 67 API calls 40696->40697 40698 43c7d0 40697->40698 40888 43c5ae 40698->40888 40702 43c7f0 _ctrlevent_capture@4 40702->40657 40949 4129c0 40703->40949 40705 418368 __aulldiv 40705->40659 40887->40686 40889 43c5c9 40888->40889 40897 43c5c1 40888->40897 40890 43c5f1 40889->40890 40891 43c5d1 40889->40891 40893 43c5f7 40890->40893 40898 43c64f _strnlen 40890->40898 40937 4380ab 67 API calls _signal 40891->40937 40939 4482f9 77 API calls __mbschr_l 40893->40939 40894 43c5d6 40938 440bb4 67 API calls 2 library calls 40894->40938 40934 43c7f9 40897->40934 40900 43c671 40898->40900 40904 43c68e 40898->40904 40899 43c620 _strlen 40903 442df5 __calloc_crt 67 API calls 40899->40903 40941 4380ab 67 API calls _signal 40900->40941 40901 43c5ff _strnlen 40901->40899 40901->40900 40908 43c631 40903->40908 40906 442df5 __calloc_crt 67 API calls 40904->40906 40905 43c676 40942 440bb4 67 API calls 2 library calls 40905->40942 40909 43c69a 40906->40909 40908->40897 40940 43ba96 67 API calls __output_l 40908->40940 40909->40897 40943 43ba96 67 API calls __output_l 40909->40943 40911 43c647 40945 447ff3 121 API calls 11 library calls 40911->40945 40913 43c6b1 40944 43ba96 67 API calls __output_l 40913->40944 40916 43c6db 40916->40897 40917 43c6fe MultiByteToWideChar 40916->40917 40933 43c6e1 40916->40933 40918 43c785 40917->40918 40919 43c716 40917->40919 40922 437ed0 ___free_lconv_mon 67 API calls 40922->40897 40933->40897 40933->40922 40948 4433ac LeaveCriticalSection 40934->40948 40936 43c800 40936->40702 40937->40894 40939->40901 40940->40911 40941->40905 40943->40913 40944->40911 40945->40916 40948->40936 40950 4129de 40949->40950 40951 4129d0 QueryPerformanceCounter 40949->40951 40952 4129f8 QueryPerformanceFrequency 40950->40952 40953 412a06 40950->40953 40951->40950 40952->40953 40953->40705 42643 419a6b 42646 41995b 42643->42646 42645 419a73 42647 4197d1 ctype 212 API calls 42646->42647 42648 41996a 42647->42648 42649 41317f ctype 213 API calls 42648->42649 42650 419978 42648->42650 42649->42650 42650->42645 42651 41344a 42652 413456 __EH_prolog3 42651->42652 42669 438998 42652->42669 42654 413492 RegQueryValueExA 42655 4134ad 42654->42655 42656 413465 42654->42656 42657 40f906 212 API calls 42655->42657 42656->42654 42658 437ed0 ___free_lconv_mon 67 API calls 42656->42658 42663 438998 _calloc 67 API calls 42656->42663 42668 4134f0 42656->42668 42660 4134d7 42657->42660 42658->42656 42659 41b3a0 ctype 212 API calls 42661 413508 42659->42661 42676 40fbf2 212 API calls ctype 42660->42676 42664 437ed0 ___free_lconv_mon 67 API calls 42661->42664 42663->42656 42666 41350e ctype 42664->42666 42665 4134e4 42667 40f5cc ctype 2 API calls 42665->42667 42667->42668 42668->42659 42670 43887a __calloc_impl 67 API calls 42669->42670 42671 4389b0 42670->42671 42675 4389cf 42671->42675 42677 4380ab 67 API calls _signal 42671->42677 42673 4389c6 42673->42675 42678 4380ab 67 API calls _signal 42673->42678 42675->42656 42676->42665 42677->42673 42678->42675 42679 416aae 42680 416ac9 42679->42680 42681 416ae8 GetWindowLongA 42679->42681 42680->42681 42682 416acd SetWindowLongA PostMessageA 42680->42682 42683 416b44 42681->42683 42684 416af7 42681->42684 42682->42681 42685 416b08 42684->42685 42692 415b53 KiUserCallbackDispatcher 42684->42692 42693 41493a 42685->42693 42688 416b2d 42688->42683 42690 416b33 KiUserCallbackDispatcher 42688->42690 42690->42683 42692->42685 42695 414941 42693->42695 42694 414b30 42694->42688 42718 416909 42694->42718 42695->42694 42696 414977 GetAsyncKeyState GetAsyncKeyState GetAsyncKeyState 42695->42696 42697 4149a6 42696->42697 42698 414b2c 42696->42698 42697->42698 42699 4149c3 42697->42699 42700 414aee 42697->42700 42698->42694 42702 414ab1 42699->42702 42703 4149ca 42699->42703 42701 41b778 262 API calls 42700->42701 42705 414af8 Beep Sleep Beep Sleep 42701->42705 42704 41b778 262 API calls 42702->42704 42706 4149d1 42703->42706 42707 414a64 42703->42707 42709 414abb Beep Sleep Beep Sleep 42704->42709 42710 414b2a Beep 42705->42710 42711 4149d4 42706->42711 42712 414a27 42706->42712 42708 41b778 262 API calls 42707->42708 42714 414a6e 6 API calls 42708->42714 42715 414aa6 Beep Sleep 42709->42715 42710->42698 42711->42698 42716 4149db 9 API calls 42711->42716 42713 41b778 262 API calls 42712->42713 42717 414a31 Beep Sleep Beep Sleep 42713->42717 42714->42715 42715->42710 42716->42698 42717->42710 42719 416936 42718->42719 42723 41693b 42718->42723 42719->42723 42724 4169ea _memset 42719->42724 42725 41696b ___TypeMatch 42719->42725 42721 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 42722 41697c 42721->42722 42722->42688 42723->42725 42728 4161d3 42723->42728 42724->42725 42726 416a07 GetDlgItem 42724->42726 42725->42721 42726->42725 42727 416a21 GetWindowTextA 42726->42727 42727->42725 42729 4161f7 __EH_prolog3 42728->42729 42730 4164a5 42729->42730 42731 41623b 42729->42731 42754 41621e ctype 42729->42754 42734 4164b2 42730->42734 42740 41674b 42730->42740 42732 416241 42731->42732 42733 41636a 42731->42733 42742 4162d0 42732->42742 42748 416253 42732->42748 42732->42754 42738 418658 3 API calls 42733->42738 42733->42754 42736 41658c 42734->42736 42739 416541 42734->42739 42751 4164c7 42734->42751 42734->42754 42735 4168cd DefWindowProcA 42735->42754 42736->42735 42746 41660b 42736->42746 42736->42754 42768 4163f4 42736->42768 42737 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 42741 4168ff 42737->42741 42743 416381 42738->42743 42753 418658 3 API calls 42739->42753 42739->42754 42740->42735 42747 4167ab 42740->42747 42740->42748 42740->42754 42741->42725 42744 4162d4 PostMessageA 42742->42744 42742->42754 42792 41869d GetClassNameA 42743->42792 42744->42754 42806 418826 GetDlgItem GetWindowLongA SendMessageA 42746->42806 42757 419a87 212 API calls 42747->42757 42748->42735 42748->42754 42750 4164f1 42803 41e992 212 API calls 2 library calls 42750->42803 42751->42735 42751->42750 42751->42754 42761 416579 42753->42761 42754->42737 42755 41640b 42759 41869d 104 API calls 42755->42759 42756 41639c 42756->42736 42771 4163b7 42756->42771 42762 4167b5 DragQueryFileA 42757->42762 42764 41641e 42759->42764 42760 41662f GetScrollRange 42765 41b3fe ctype 212 API calls 42760->42765 42761->42736 42805 418714 104 API calls 42761->42805 42766 4167d6 DragQueryFileA 42762->42766 42767 41681d DragFinish 42762->42767 42763 4164f6 _memset 42804 41e9d0 213 API calls 5 library calls 42763->42804 42764->42768 42775 41869d 104 API calls 42764->42775 42769 416668 42765->42769 42772 401071 ctype 212 API calls 42766->42772 42767->42754 42768->42754 42783 415d0e ctype 215 API calls 42768->42783 42776 41b3fe ctype 212 API calls 42769->42776 42777 41b3fe ctype 212 API calls 42771->42777 42781 4163e1 42771->42781 42773 4167f6 42772->42773 42773->42766 42773->42767 42778 4191e2 212 API calls 42773->42778 42784 40f5cc ctype 2 API calls 42773->42784 42775->42768 42780 41667d 42776->42780 42777->42781 42778->42773 42782 41b3fe ctype 212 API calls 42780->42782 42781->42768 42800 4179e5 42781->42800 42785 416692 42782->42785 42783->42754 42784->42773 42786 41b3fe ctype 212 API calls 42785->42786 42787 4166aa 42786->42787 42788 41b3fe ctype 212 API calls 42787->42788 42789 4166bf 42788->42789 42790 41b3fe ctype 212 API calls 42789->42790 42790->42768 42793 4186c7 42792->42793 42799 4186f3 42792->42799 42807 43a5e5 102 API calls __mbsicmp_l 42793->42807 42795 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 42797 416398 42795->42797 42796 4186d1 42798 4186e0 GetWindowLongA 42796->42798 42796->42799 42797->42755 42797->42756 42798->42799 42799->42795 42808 4177c5 42800->42808 42802 4179ff 42802->42768 42803->42763 42804->42754 42805->42736 42806->42760 42807->42796 42809 4177d1 __EH_prolog3 42808->42809 42810 418658 3 API calls 42809->42810 42811 4179db ctype 42809->42811 42817 417825 42810->42817 42811->42802 42812 4179c8 42813 415d0e ctype 215 API calls 42812->42813 42813->42811 42814 418658 GetDlgItem GetWindowLongA SendMessageA 42814->42817 42815 41869d 104 API calls 42815->42817 42816 417945 GetWindowLongA 42816->42817 42817->42812 42817->42814 42817->42815 42817->42816 42818 415b1d 3 API calls 42817->42818 42821 415d0e 215 API calls ctype 42817->42821 42822 4172b5 238 API calls 2 library calls 42817->42822 42823 415b53 KiUserCallbackDispatcher 42817->42823 42818->42817 42821->42817 42822->42817 42823->42817 42824 416eb1 42825 416eba 42824->42825 42826 416ed4 42825->42826 42828 415a8e SetWindowTextA 42825->42828 42828->42825 42829 4171f3 42830 417739 42829->42830 42833 417067 42830->42833 42832 417741 42834 417073 __EH_prolog3 42833->42834 42837 415f69 42834->42837 42836 417093 ctype 42836->42832 42838 415f75 __EH_prolog3 42837->42838 42839 415f8f 42838->42839 42840 415812 ctype KiUserCallbackDispatcher 42838->42840 42841 415d0e ctype 215 API calls 42839->42841 42840->42839 42842 415f9a ctype 42841->42842 42842->42836 42843 41f015 42844 41f02c 42843->42844 42845 41f03f GetWindowLongA 42843->42845 42844->42845 42848 41f030 SetWindowLongA 42844->42848 42846 41f092 DefWindowProcA 42845->42846 42847 41f04e 42845->42847 42850 41f06e 42846->42850 42849 41493a 295 API calls 42847->42849 42848->42845 42849->42850 42851 43e237 42852 43e273 42851->42852 42884 43e26c 42851->42884 42853 43e277 42852->42853 42854 43e29e 42852->42854 42924 4380be 67 API calls _signal 42853->42924 42857 43e308 42854->42857 42858 43e2e2 42854->42858 42856 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 42860 43e7f5 42856->42860 42862 43e30e 42857->42862 42863 43e31d 42857->42863 42927 4380be 67 API calls _signal 42858->42927 42859 43e27c 42925 4380ab 67 API calls _signal 42859->42925 42930 44830c 69 API calls 3 library calls 42862->42930 42914 448848 42863->42914 42865 43e2e7 42928 4380ab 67 API calls _signal 42865->42928 42867 43e283 42926 440bb4 67 API calls 2 library calls 42867->42926 42869 43e323 42873 43e522 42869->42873 42878 43fa7d _CallSETranslator 67 API calls 42869->42878 42871 43e31a 42871->42863 42876 43e530 42873->42876 42877 43e755 WriteFile 42873->42877 42874 43e2f0 42929 440bb4 67 API calls 2 library calls 42874->42929 42880 43e5d3 42876->42880 42885 43e542 42876->42885 42879 43e77c GetLastError 42877->42879 42889 43e51d 42877->42889 42882 43e33e GetConsoleMode 42878->42882 42879->42889 42892 43e67a 42880->42892 42895 43e5dd 42880->42895 42881 43e7b6 42881->42884 42934 4380ab 67 API calls _signal 42881->42934 42882->42873 42883 43e362 42882->42883 42883->42873 42888 43e370 GetConsoleCP 42883->42888 42884->42856 42885->42881 42886 43e58d WriteFile 42885->42886 42885->42889 42886->42879 42886->42885 42888->42889 42909 43e390 42888->42909 42889->42881 42889->42884 42893 43e796 42889->42893 42890 43e7a3 42935 4380be 67 API calls _signal 42890->42935 42891 43e6d0 WideCharToMultiByte 42891->42879 42899 43e703 WriteFile 42891->42899 42892->42881 42892->42891 42897 43e7ab 42893->42897 42898 43e79e 42893->42898 42894 43e630 WriteFile 42894->42879 42896 43e655 42894->42896 42895->42881 42895->42894 42896->42889 42896->42895 42904 43e675 42896->42904 42933 4380d1 67 API calls 3 library calls 42897->42933 42932 4380ab 67 API calls _signal 42898->42932 42902 43e731 GetLastError 42899->42902 42906 43e728 42899->42906 42902->42906 42904->42889 42906->42889 42906->42892 42906->42899 42906->42904 42907 448831 79 API calls __write_nolock 42907->42909 42908 43e408 WideCharToMultiByte 42908->42889 42911 43e436 WriteFile 42908->42911 42909->42889 42909->42907 42909->42908 42910 43e457 42909->42910 42931 444665 77 API calls __isleadbyte_l 42909->42931 42910->42879 42910->42889 42910->42909 42912 44865c 11 API calls __putwch_nolock 42910->42912 42913 43e46f WriteFile 42910->42913 42911->42879 42911->42910 42912->42910 42913->42879 42913->42910 42915 448851 42914->42915 42916 44885f 42914->42916 42936 4380ab 67 API calls _signal 42915->42936 42919 44888a 42916->42919 42937 4380ab 67 API calls _signal 42916->42937 42918 448856 42918->42869 42919->42869 42921 448873 42938 440bb4 67 API calls 2 library calls 42921->42938 42924->42859 42925->42867 42927->42865 42928->42874 42930->42871 42931->42909 42932->42890 42933->42884 42934->42890 42935->42884 42936->42918 42937->42921 42939 40a575 42940 40a59c __EH_prolog3 42939->42940 42941 411530 221 API calls 42940->42941 42942 40a5c5 42941->42942 42943 401071 ctype 212 API calls 42942->42943 42944 40a5dc 42943->42944 42945 401071 ctype 212 API calls 42944->42945 42946 40a5f2 42945->42946 42947 4114d2 220 API calls 42946->42947 42948 40a606 42947->42948 42949 40183a 212 API calls 42948->42949 42950 40a616 42949->42950 42951 40f5cc ctype 2 API calls 42950->42951 42952 40a625 42951->42952 42953 401071 ctype 212 API calls 42952->42953 42954 40a62f 42953->42954 42955 401000 ctype 212 API calls 42954->42955 42956 40a640 42955->42956 42957 401000 ctype 212 API calls 42956->42957 42958 40a657 42957->42958 42959 40a672 42958->42959 42960 40a6af 42958->42960 42962 401071 ctype 212 API calls 42959->42962 42961 401071 ctype 212 API calls 42960->42961 42964 40a6b9 42961->42964 42963 40a67c 42962->42963 42965 41034d 212 API calls 42963->42965 42966 41034d 212 API calls 42964->42966 42967 40a68f 42965->42967 42968 40a6cc 42966->42968 42969 40f5cc ctype 2 API calls 42967->42969 42970 40f5cc ctype 2 API calls 42968->42970 42971 40a69b 42969->42971 42972 40a6d8 42970->42972 42973 401071 ctype 212 API calls 42971->42973 42974 401071 ctype 212 API calls 42972->42974 42975 40a6a9 42973->42975 42974->42975 42976 41034d 212 API calls 42975->42976 42977 40a6f9 42976->42977 42978 40f5cc ctype 2 API calls 42977->42978 42979 40a705 42978->42979 42980 40105b 212 API calls 42979->42980 42981 40a70f 42980->42981 42982 40b018 42981->42982 42985 410a1e 214 API calls 42981->42985 42983 410a1e 214 API calls 42982->42983 42984 40b023 42983->42984 42986 40b013 42984->42986 42988 410409 212 API calls 42984->42988 42987 40a72e 42985->42987 42990 40f5cc ctype 2 API calls 42986->42990 42987->42982 42989 40a736 42987->42989 42991 40b03a 42988->42991 42992 418658 3 API calls 42989->42992 42993 40b0b5 42990->42993 42994 40fada 212 API calls 42991->42994 42995 40a74d 42992->42995 42996 40f5cc ctype 2 API calls 42993->42996 42997 40b048 42994->42997 42998 415a9e ctype 214 API calls 42995->42998 42999 40b0c4 42996->42999 43000 40fca5 212 API calls 42997->43000 43001 40a760 42998->43001 43003 40f5cc ctype 2 API calls 42999->43003 43004 40b05e 43000->43004 43002 40f9f8 212 API calls 43001->43002 43006 40a779 43002->43006 43007 40b0d0 43003->43007 43005 413d44 214 API calls 43004->43005 43008 40b07d 43005->43008 43247 415a8e SetWindowTextA 43006->43247 43010 40f5cc ctype 2 API calls 43007->43010 43011 41340d 213 API calls 43008->43011 43013 40b0df 43010->43013 43014 40b093 43011->43014 43012 40a787 43015 418658 3 API calls 43012->43015 43016 40f5cc ctype 2 API calls 43013->43016 43473 413c6b RegCloseKey 43014->43473 43019 40a79e 43015->43019 43017 40b0ee 43016->43017 43020 40f5cc ctype 2 API calls 43017->43020 43021 411530 221 API calls 43019->43021 43022 40b0fa 43020->43022 43023 40a7b9 43021->43023 43024 40f5cc ctype 2 API calls 43022->43024 43025 415a9e ctype 214 API calls 43023->43025 43026 40b109 43024->43026 43027 40a7cf 43025->43027 43028 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 43026->43028 43029 41036c ctype 212 API calls 43027->43029 43030 40b127 43028->43030 43031 40a7e5 43029->43031 43032 4018a8 ctype 212 API calls 43031->43032 43033 40a7f9 43032->43033 43034 41036c ctype 212 API calls 43033->43034 43035 40a80f 43034->43035 43248 415a8e SetWindowTextA 43035->43248 43037 40a823 43038 40f5cc ctype 2 API calls 43037->43038 43039 40a832 43038->43039 43040 40f5cc ctype 2 API calls 43039->43040 43041 40a841 43040->43041 43042 40f5cc ctype 2 API calls 43041->43042 43043 40a850 43042->43043 43044 40f5cc ctype 2 API calls 43043->43044 43045 40a85c 43044->43045 43046 40f5cc ctype 2 API calls 43045->43046 43047 40a86b 43046->43047 43048 418658 3 API calls 43047->43048 43049 40a87f 43048->43049 43247->43012 43248->43037 43504 416ed8 43505 416ee1 43504->43505 43506 416f04 43505->43506 43508 417bf2 43505->43508 43509 417bfe __EH_prolog3 43508->43509 43510 415a9e ctype 214 API calls 43509->43510 43511 417c0c 43510->43511 43512 41034d 212 API calls 43511->43512 43513 417c19 43512->43513 43514 40f5cc ctype 2 API calls 43513->43514 43515 417c25 _memset 43514->43515 43516 417c4e ctype 43515->43516 43518 436694 103 API calls 2 library calls 43515->43518 43516->43505 43518->43516 43519 40b3fa 43520 40b409 __EH_prolog3 43519->43520 43521 41b378 ctype 212 API calls 43520->43521 43522 40b41f 43521->43522 43523 40b42b 43522->43523 43524 40b61f 43522->43524 43525 40b431 43523->43525 43526 40b60b 43523->43526 43527 40b4c9 43524->43527 43530 40b646 43524->43530 43531 40b629 43524->43531 43528 40b604 43525->43528 43529 40b43a 43525->43529 43526->43527 43579 40b12f 43526->43579 43708 40b307 212 API calls 3 library calls 43528->43708 43535 40b441 43529->43535 43536 40b4ce 43529->43536 43631 409f4a 43530->43631 43537 40b63a 43531->43537 43538 40b62e 43531->43538 43535->43527 43543 418658 3 API calls 43535->43543 43541 413d44 214 API calls 43536->43541 43710 40a2dc 242 API calls 2 library calls 43537->43710 43538->43527 43540 40b633 43538->43540 43709 40c5b6 222 API calls ctype 43540->43709 43552 40b4f8 43541->43552 43547 40b463 43543->43547 43544 40b638 43544->43527 43545 40b546 43546 40b5c0 43545->43546 43550 413d44 214 API calls 43545->43550 43549 40b5f6 43546->43549 43553 401071 ctype 212 API calls 43546->43553 43548 40b4b6 43547->43548 43551 40105b 212 API calls 43547->43551 43554 415d0e ctype 215 API calls 43548->43554 43707 413c6b RegCloseKey 43549->43707 43569 40b56b 43550->43569 43556 40b485 43551->43556 43552->43545 43557 401071 ctype 212 API calls 43552->43557 43558 40b5db 43553->43558 43554->43527 43556->43548 43563 4136a5 213 API calls 43556->43563 43560 40b52b 43557->43560 43562 41034d 212 API calls 43558->43562 43559 40b5b4 43706 413c6b RegCloseKey 43559->43706 43564 41034d 212 API calls 43560->43564 43565 40b5ea 43562->43565 43566 40b499 43563->43566 43567 40b53a 43564->43567 43568 40f5cc ctype 2 API calls 43565->43568 43705 415a8e SetWindowTextA 43566->43705 43572 40f5cc ctype 2 API calls 43567->43572 43568->43549 43569->43559 43570 401071 ctype 212 API calls 43569->43570 43573 40b599 43570->43573 43572->43545 43575 41034d 212 API calls 43573->43575 43574 40b4aa 43576 40f5cc ctype 2 API calls 43574->43576 43577 40b5a8 43575->43577 43576->43548 43578 40f5cc ctype 2 API calls 43577->43578 43578->43559 43580 40b142 __EH_prolog3 43579->43580 43581 418658 3 API calls 43580->43581 43582 40b155 43581->43582 43583 415a9e ctype 214 API calls 43582->43583 43584 40b164 43583->43584 43585 415d0e ctype 215 API calls 43584->43585 43586 40b177 43585->43586 43587 40b2e6 43586->43587 43588 41034d 212 API calls 43586->43588 43589 40f5cc ctype 2 API calls 43587->43589 43590 40b195 43588->43590 43591 40b2f2 43589->43591 43592 411530 221 API calls 43590->43592 43591->43527 43593 40b1a8 43592->43593 43594 411530 221 API calls 43593->43594 43595 40b1bf 43594->43595 43596 411530 221 API calls 43595->43596 43597 40b1d3 43596->43597 43598 4116af 221 API calls 43597->43598 43599 40b1f0 43598->43599 43600 4116af 221 API calls 43599->43600 43601 40b208 43600->43601 43602 40105b 212 API calls 43601->43602 43603 40b216 43602->43603 43604 40b25a 43603->43604 43606 402f64 220 API calls 43603->43606 43605 402f64 220 API calls 43604->43605 43607 40b265 43605->43607 43608 40b222 43606->43608 43609 40b292 43607->43609 43610 402f64 220 API calls 43607->43610 43608->43604 43611 410e95 212 API calls 43608->43611 43614 40f5cc ctype 2 API calls 43609->43614 43612 40b272 43610->43612 43613 40b233 43611->43613 43612->43609 43618 402f64 220 API calls 43612->43618 43711 4118f2 220 API calls 4 library calls 43613->43711 43615 40b2ad 43614->43615 43617 40f5cc ctype 2 API calls 43615->43617 43620 40b2bc 43617->43620 43621 40b282 43618->43621 43619 40b246 43712 410ac6 69 API calls 43619->43712 43623 40f5cc ctype 2 API calls 43620->43623 43621->43609 43626 402f64 220 API calls 43621->43626 43625 40b2c8 43623->43625 43624 40b24e 43627 40f5cc ctype 2 API calls 43624->43627 43628 40f5cc ctype 2 API calls 43625->43628 43626->43609 43627->43604 43629 40b2d7 43628->43629 43630 40f5cc ctype 2 API calls 43629->43630 43630->43587 43632 409f6b __EH_prolog3 43631->43632 43633 413d44 214 API calls 43632->43633 43634 409f8a 43633->43634 43635 413d44 214 API calls 43634->43635 43636 409fa7 43635->43636 43637 413d44 214 API calls 43636->43637 43638 409fc0 43637->43638 43639 413d44 214 API calls 43638->43639 43640 409fdc 43639->43640 43641 401000 ctype 212 API calls 43640->43641 43642 409fe9 43641->43642 43643 401000 ctype 212 API calls 43642->43643 43644 409ffe 43643->43644 43645 401000 ctype 212 API calls 43644->43645 43646 40a00e 43645->43646 43647 401000 ctype 212 API calls 43646->43647 43648 40a021 43647->43648 43649 40183a 212 API calls 43648->43649 43650 40a039 43649->43650 43651 401000 ctype 212 API calls 43650->43651 43654 40a046 43651->43654 43652 40a113 43653 4018c8 212 API calls 43652->43653 43655 40a125 43653->43655 43656 40a0b1 43654->43656 43658 41034d 212 API calls 43654->43658 43659 40a082 43654->43659 43657 4018c8 212 API calls 43655->43657 43656->43652 43660 41034d 212 API calls 43656->43660 43661 40a0e1 43656->43661 43664 40a13e 43657->43664 43658->43659 43659->43656 43662 41034d 212 API calls 43659->43662 43660->43661 43661->43652 43665 41034d 212 API calls 43661->43665 43662->43656 43663 40a14d ctype 43667 40f5cc ctype 2 API calls 43663->43667 43664->43663 43666 4018c8 212 API calls 43664->43666 43665->43652 43668 40a181 43666->43668 43669 40a248 43667->43669 43671 40a187 43668->43671 43672 40a199 43668->43672 43670 40f5cc ctype 2 API calls 43669->43670 43673 40a257 43670->43673 43713 4135ae 214 API calls ctype 43671->43713 43675 4018c8 212 API calls 43672->43675 43676 40f5cc ctype 2 API calls 43673->43676 43677 40a1a3 43675->43677 43678 40a266 43676->43678 43679 40a1a9 43677->43679 43680 40a1bb 43677->43680 43681 40f5cc ctype 2 API calls 43678->43681 43714 4135ae 214 API calls ctype 43679->43714 43680->43663 43685 419a87 212 API calls 43680->43685 43683 40a272 43681->43683 43684 40f5cc ctype 2 API calls 43683->43684 43686 40a27e 43684->43686 43687 40a1dc 43685->43687 43689 40f5cc ctype 2 API calls 43686->43689 43715 411d7a 225 API calls 2 library calls 43687->43715 43690 40a28a 43689->43690 43723 413c6b RegCloseKey 43690->43723 43693 40a224 RemoveDirectoryA 43693->43663 43695 418f66 212 API calls 43701 40a1f5 43695->43701 43701->43693 43701->43695 43716 435d86 43701->43716 43705->43574 43708->43527 43709->43544 43710->43527 43711->43619 43712->43624 43713->43672 43714->43680 43715->43701 43717 435d5c DeleteFileA 43716->43717 43718 435d72 43717->43718 43719 435d6a GetLastError 43717->43719 43720 435d83 43718->43720 43724 4380d1 67 API calls 3 library calls 43718->43724 43719->43718 43720->43701 43722 435d7e 43722->43701 43724->43722 43725 402f9c 43726 402fc3 _memset __EH_prolog3 43725->43726 43727 418658 3 API calls 43726->43727 43728 403015 43727->43728 43729 401071 ctype 212 API calls 43728->43729 43730 40302f 43729->43730 43731 401000 ctype 212 API calls 43730->43731 43732 40303f 43731->43732 43733 401000 ctype 212 API calls 43732->43733 43734 403055 43733->43734 43735 401000 ctype 212 API calls 43734->43735 43736 40306b 43735->43736 43737 401000 ctype 212 API calls 43736->43737 43738 403081 43737->43738 43739 401000 ctype 212 API calls 43738->43739 43740 403097 43739->43740 43741 4136a5 213 API calls 43740->43741 43742 4030b1 43741->43742 43743 418658 3 API calls 43742->43743 43744 4030cf 43743->43744 44013 415a8e SetWindowTextA 43744->44013 43746 4030df 43747 415d0e ctype 215 API calls 43746->43747 43748 4030f2 43747->43748 43749 40f5cc ctype 2 API calls 43748->43749 43750 4030fe 43749->43750 43751 403125 43750->43751 43752 40105b 212 API calls 43750->43752 43753 411530 221 API calls 43751->43753 43752->43751 43754 40314f 43753->43754 43755 410a1e 214 API calls 43754->43755 43756 403161 43755->43756 43757 40316a 43756->43757 43758 41292f 213 API calls 43756->43758 43759 40f5cc ctype 2 API calls 43757->43759 43758->43757 43760 40318c 43759->43760 43761 4031ef 43760->43761 43763 411530 221 API calls 43760->43763 43762 401071 ctype 212 API calls 43761->43762 43764 403204 43762->43764 43765 4031a8 43763->43765 43766 401071 ctype 212 API calls 43764->43766 44134 4183dd 220 API calls ctype 43765->44134 43768 403215 43766->43768 43770 419640 212 API calls 43768->43770 43769 4031c4 43771 40f5cc ctype 2 API calls 43769->43771 43772 403231 43770->43772 43773 4031df 43771->43773 43774 4010d1 212 API calls 43772->43774 43773->43761 43775 41b378 ctype 212 API calls 43773->43775 43776 403238 43774->43776 43775->43761 43777 40f5cc ctype 2 API calls 43776->43777 43778 403247 43777->43778 43779 401071 ctype 212 API calls 43778->43779 43780 403254 43779->43780 43781 419640 212 API calls 43780->43781 43782 40326b 43781->43782 43783 4010d1 212 API calls 43782->43783 43784 403272 43783->43784 43785 40f5cc ctype 2 API calls 43784->43785 43818 403281 ___TypeMatch 43785->43818 43786 419640 212 API calls 43786->43818 43787 402f64 220 API calls 43787->43818 43788 401071 212 API calls ctype 43788->43818 43789 4035bc 43790 419640 212 API calls 43789->43790 43791 4035c8 43790->43791 43792 41034d 212 API calls 43791->43792 43812 4035d4 43792->43812 43794 4107b9 212 API calls 43794->43812 43795 41b3fe ctype 212 API calls 43795->43818 43796 403760 43797 419640 212 API calls 43796->43797 43798 40376c 43797->43798 43799 41034d 212 API calls 43798->43799 43802 403778 43799->43802 43803 4107b9 212 API calls 43802->43803 43817 403796 43803->43817 43804 4136a5 213 API calls 43804->43818 43806 41034d 212 API calls 43806->43817 43807 40f9f8 212 API calls 43807->43818 43808 401a26 212 API calls 43808->43818 43809 411500 220 API calls 43809->43812 43810 403e34 44123 41880f SendMessageA 43810->44123 43811 401901 212 API calls 43811->43818 43812->43794 43812->43796 43812->43809 43814 411530 221 API calls 43812->43814 43824 410cca GetFileAttributesA SetFileAttributesA 43812->43824 43832 410a1e 214 API calls 43812->43832 43854 40f5cc EnterCriticalSection LeaveCriticalSection ctype 43812->43854 44140 4118f2 220 API calls 4 library calls 43812->44140 43814->43812 43815 403e3e 43816 419640 212 API calls 43815->43816 43819 403e4b 43816->43819 43817->43806 43817->43810 43863 401071 212 API calls ctype 43817->43863 43971 4107b9 212 API calls 43817->43971 43980 40f5cc EnterCriticalSection LeaveCriticalSection ctype 43817->43980 43991 4010d1 212 API calls 43817->43991 44002 40183a 212 API calls 43817->44002 44003 40f4f7 212 API calls ctype 43817->44003 44004 41338d 213 API calls 43817->44004 44005 401901 212 API calls 43817->44005 44006 40f4af 212 API calls 43817->44006 44007 41036c 212 API calls ctype 43817->44007 44008 40f93f 212 API calls 43817->44008 44009 413d44 214 API calls 43817->44009 44010 4018a8 212 API calls ctype 43817->44010 44011 40195c 212 API calls 43817->44011 44012 413c6b RegCloseKey 43817->44012 43818->43786 43818->43787 43818->43788 43818->43789 43818->43795 43818->43804 43818->43807 43818->43808 43818->43811 43820 40f5cc EnterCriticalSection LeaveCriticalSection ctype 43818->43820 43823 411530 221 API calls 43818->43823 43830 40f93f 212 API calls 43818->43830 43831 435d86 69 API calls 43818->43831 43841 4035e5 43818->43841 44014 42d5c5 43818->44014 44048 42d81a 43818->44048 44135 413fd0 222 API calls 2 library calls 43818->44135 44136 41880f SendMessageA 43818->44136 44137 42d783 EnterCriticalSection LeaveCriticalSection __EH_prolog3 ctype 43818->44137 43822 419640 212 API calls 43819->43822 43825 40413c 43819->43825 43820->43818 43827 403e5c 43822->43827 43823->43818 43824->43812 43828 4041a6 43825->43828 43833 411530 221 API calls 43825->43833 43830->43818 43831->43818 43832->43812 44138 42d783 EnterCriticalSection LeaveCriticalSection __EH_prolog3 ctype 43841->44138 43852 4035f1 43858 418658 3 API calls 43852->43858 43854->43812 43862 403608 43858->43862 44139 415b53 KiUserCallbackDispatcher 43862->44139 43863->43817 43871 403615 43872 415d0e ctype 215 API calls 43871->43872 43877 403628 43872->43877 43882 418658 3 API calls 43877->43882 43885 40432b 43882->43885 44143 415b53 KiUserCallbackDispatcher 43885->44143 43891 404338 43894 415d0e ctype 215 API calls 43891->43894 43897 40434c 43894->43897 43900 404351 PostMessageA 43897->43900 43901 40436d 43897->43901 43900->43901 43904 40f5cc ctype 2 API calls 43901->43904 43908 40437c 43904->43908 43911 40f5cc ctype 2 API calls 43908->43911 43971->43817 43980->43817 43991->43817 44002->43817 44003->43817 44004->43817 44005->43817 44006->43817 44007->43817 44008->43817 44009->43817 44010->43817 44011->43817 44012->43817 44013->43746 44015 42d5d1 __EH_prolog3 44014->44015 44016 40180c 212 API calls 44015->44016 44017 42d5ea 44016->44017 44018 40180c 212 API calls 44017->44018 44019 42d5fb _strcat 44018->44019 44020 41034d 212 API calls 44019->44020 44021 42d61c 44020->44021 44022 401a6b 212 API calls 44021->44022 44023 42d623 44022->44023 44024 41034d 212 API calls 44023->44024 44025 42d62e 44024->44025 44026 401a6b 212 API calls 44025->44026 44027 42d635 44026->44027 44028 40f9f8 212 API calls 44027->44028 44029 42d64e 44028->44029 44030 40f9f8 212 API calls 44029->44030 44031 42d65d _strcat 44030->44031 44032 437fad _malloc 67 API calls 44031->44032 44049 42d841 __EH_prolog3 44048->44049 44050 437fad _malloc 67 API calls 44049->44050 44051 42d87e 44050->44051 44052 41b3fe ctype 212 API calls 44051->44052 44053 42d89c _memset 44052->44053 44053->44053 44054 435d48 69 API calls 44053->44054 44055 42d8ca _memset _strcat 44054->44055 44056 43bdf9 69 API calls 44055->44056 44057 42d964 _strcat 44055->44057 44056->44055 44058 4107b9 212 API calls 44057->44058 44059 42d9e3 44058->44059 44060 40f5cc ctype 2 API calls 44059->44060 44061 42d9f1 44060->44061 44062 42db39 44061->44062 44070 40f4af 212 API calls 44061->44070 44072 430068 102 API calls 44061->44072 44074 43c079 102 API calls 44061->44074 44075 401071 ctype 212 API calls 44061->44075 44076 401a26 212 API calls 44061->44076 44077 4107b9 212 API calls 44061->44077 44079 401901 212 API calls 44061->44079 44083 40f93f 212 API calls 44061->44083 44084 435d48 69 API calls 44061->44084 44086 40f5cc EnterCriticalSection LeaveCriticalSection ctype 44061->44086 44063 4107b9 212 API calls 44062->44063 44064 42ddb4 44062->44064 44071 43c079 102 API calls 44062->44071 44078 401071 ctype 212 API calls 44062->44078 44080 401a26 212 API calls 44062->44080 44081 401901 212 API calls 44062->44081 44082 40f5cc EnterCriticalSection LeaveCriticalSection ctype 44062->44082 44085 40f93f 212 API calls 44062->44085 44087 435d48 69 API calls 44062->44087 44088 42dc70 44062->44088 44063->44062 44065 42ee63 235 API calls 44064->44065 44066 42ddc9 44064->44066 44065->44066 44067 437ed0 ___free_lconv_mon 67 API calls 44066->44067 44068 42dde1 44067->44068 44069 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 44068->44069 44070->44061 44071->44062 44072->44061 44074->44061 44075->44061 44076->44061 44077->44061 44078->44062 44079->44061 44080->44062 44081->44062 44082->44062 44083->44061 44084->44061 44085->44062 44086->44061 44087->44062 44089 4107b9 212 API calls 44088->44089 44090 42dc8d 44089->44090 44091 4107b9 212 API calls 44090->44091 44092 42dca0 44091->44092 44123->43815 44134->43769 44135->43818 44136->43818 44137->43818 44138->43852 44139->43871 44140->43812 44143->43891 44857 40459c 44858 4045c3 __EH_prolog3 44857->44858 44859 419640 212 API calls 44858->44859 44860 4045e9 44859->44860 44861 40105b 212 API calls 44860->44861 44862 4045f0 44861->44862 44863 4045f8 44862->44863 44864 40468c 44862->44864 44865 4136a5 213 API calls 44863->44865 44866 419640 212 API calls 44864->44866 44868 40460b 44865->44868 44867 40469d 44866->44867 44869 40183a 212 API calls 44867->44869 44870 401855 212 API calls 44868->44870 44871 4046a9 44869->44871 44872 404626 44870->44872 44873 401071 ctype 212 API calls 44871->44873 44874 41036c ctype 212 API calls 44872->44874 44875 4046c6 44873->44875 44876 40463c 44874->44876 44877 401071 ctype 212 API calls 44875->44877 45167 4183b9 220 API calls 44876->45167 44879 4046db 44877->44879 44881 419640 212 API calls 44879->44881 44880 404653 44882 40f5cc ctype 2 API calls 44880->44882 44883 4046f2 44881->44883 44884 404665 44882->44884 44885 4010d1 212 API calls 44883->44885 44886 40f5cc ctype 2 API calls 44884->44886 44887 4046f9 44885->44887 44888 404673 44886->44888 44889 40105b 212 API calls 44887->44889 44890 40f5cc ctype 2 API calls 44888->44890 44891 404700 44889->44891 44892 404682 44890->44892 44893 40f5cc ctype 2 API calls 44891->44893 44894 435782 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 44892->44894 44941 404712 44893->44941 44895 405bdb 44894->44895 44896 40f5cc EnterCriticalSection LeaveCriticalSection ctype 44896->44941 44897 404910 45152 418741 44897->45152 44898 4107b9 212 API calls 44898->44941 44901 40f4f7 ctype 212 API calls 44901->44941 44902 418741 3 API calls 44903 404948 44902->44903 44904 418741 3 API calls 44903->44904 44905 404966 44904->44905 45155 418725 44905->45155 44908 41238a 216 API calls 44909 404996 44908->44909 44910 41238a 216 API calls 44909->44910 44912 4049a7 44910->44912 44911 401a6b 212 API calls 44911->44941 44913 40f4f7 ctype 212 API calls 44912->44913 44914 4049c0 44913->44914 44916 40f4f7 ctype 212 API calls 44914->44916 44915 40f2c0 212 API calls 44915->44941 44917 4049d2 44916->44917 44919 401901 212 API calls 44917->44919 44918 401999 212 API calls 44918->44941 44920 4049e1 44919->44920 44921 4049e9 44920->44921 44922 4049fc 44920->44922 44923 41875d 220 API calls 44921->44923 44924 41875d 220 API calls 44922->44924 44925 4049f4 44923->44925 44924->44925 45158 415b77 SetFocus 44925->45158 44926 41036c 212 API calls ctype 44926->44941 44928 404a12 44930 415b1d 3 API calls 44928->44930 44929 4018a8 212 API calls ctype 44929->44941 44931 404a26 44930->44931 44932 404a3b 44931->44932 44934 401901 212 API calls 44931->44934 45159 41875d SendMessageA 44932->45159 44933 41034d 212 API calls 44933->44941 44934->44932 44937 404a69 44942 404a8e 44937->44942 45168 415b53 KiUserCallbackDispatcher 44937->45168 44938 435d48 69 API calls 44938->44937 44940 404a7c 44943 41034d 212 API calls 44940->44943 44941->44896 44941->44897 44941->44898 44941->44901 44941->44911 44941->44915 44941->44918 44941->44926 44941->44929 44941->44933 44944 40e59b 231 API calls 44942->44944 44943->44942 44945 404a96 44944->44945 44946 405b25 44945->44946 45164 41868a SendMessageA 44945->45164 44947 40f5cc ctype 2 API calls 44946->44947 44949 405b34 44947->44949 44951 40f5cc ctype 2 API calls 44949->44951 44950 404ab2 44952 401071 ctype 212 API calls 44950->44952 44953 405b43 44951->44953 44954 404acb 44952->44954 44955 415d0e ctype 215 API calls 44953->44955 44956 401071 ctype 212 API calls 44954->44956 44957 405b5d 44955->44957 44958 404ae0 CoInitialize 44956->44958 44959 415d0e ctype 215 API calls 44957->44959 45165 41868a SendMessageA 44958->45165 44961 405b72 44959->44961 44963 415d0e ctype 215 API calls 44961->44963 44962 404af6 44964 404b48 44962->44964 45169 41868a SendMessageA 44962->45169 44966 405b87 44963->44966 44965 41034d 212 API calls 44964->44965 44968 404b46 44965->44968 44970 404b05 44970->44964 44973 404b09 44970->44973 45153 418658 3 API calls 45152->45153 45154 40492a 45153->45154 45154->44902 45156 418658 3 API calls 45155->45156 45157 404984 45156->45157 45157->44908 45158->44928 45160 415e95 3 API calls 45159->45160 45161 418787 SendMessageA 45160->45161 45162 415d0e ctype 215 API calls 45161->45162 45163 404a54 45162->45163 45163->44937 45163->44938 45164->44950 45165->44962 45167->44880 45168->44940 45169->44970

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1714 40459c-4045f2 call 435791 call 419640 call 40105b 1721 4045f8-404687 call 4136a5 call 401855 call 41036c call 4183b9 call 40f5cc * 3 1714->1721 1722 40468c-404720 call 419640 call 40183a call 401071 * 2 call 419640 call 4010d1 call 40105b call 40f5cc 1714->1722 1752 405bc0-405be2 call 435782 1721->1752 1756 4048e4-40490a call 4107b9 call 40f5cc 1722->1756 1761 404910-4049e7 call 418741 * 3 call 418725 call 41238a * 2 call 40f4f7 * 2 call 401901 1756->1761 1762 404725-404758 call 4107b9 call 40f4f7 1756->1762 1806 4049e9-4049fa call 41875d 1761->1806 1807 4049fc-404a07 call 41875d 1761->1807 1771 4048d0-4048e1 call 40f5cc 1762->1771 1772 40475e-4047c8 call 4107b9 * 3 call 401a6b call 40f2c0 1762->1772 1771->1756 1797 4048a3-4048cb call 40f5cc * 3 1772->1797 1798 4047ce-40489e call 401999 call 41036c call 4018a8 call 41036c call 4018a8 call 41034d call 40f5cc * 5 1772->1798 1797->1771 1798->1797 1818 404a0d-404a2a call 415b77 call 415b1d 1806->1818 1807->1818 1827 404a46 1818->1827 1828 404a2c-404a3f call 401901 1818->1828 1831 404a48-404a5a call 41875d 1827->1831 1828->1827 1836 404a41-404a44 1828->1836 1839 404a70-404a89 call 415b53 call 41034d 1831->1839 1840 404a5c-404a6e call 435d48 1831->1840 1836->1831 1849 404a8e-404aa1 call 40e59b 1839->1849 1840->1839 1840->1849 1855 405b25-405bba call 40f5cc * 2 call 415d0e * 4 call 40f5cc * 2 1849->1855 1856 404aa7-404af8 call 41868a call 401071 * 2 CoInitialize call 41868a 1849->1856 1855->1752 1875 404b48-404b54 call 41034d 1856->1875 1876 404afa-404b07 call 41868a 1856->1876 1880 404b59-404c1f call 41238a call 41868a call 419640 call 411530 call 41034d call 40f5cc call 4114d2 call 419640 call 413d81 call 413c7c 1875->1880 1876->1875 1885 404b09-404b46 call 41034d call 401071 call 41034d call 40f5cc 1876->1885 1917 404c21-404c36 call 4018e4 1880->1917 1918 404c4a-404c51 1880->1918 1885->1880 1917->1918 1924 404c38-404c45 call 41183c 1917->1924 1920 404c60-404cc5 call 401071 * 2 call 419640 call 4010d1 call 40183a call 40f5cc 1918->1920 1921 404c53-404c5c 1918->1921 1937 404dd7-404dda 1920->1937 1938 404ccb-404d00 call 43bdf9 call 419640 call 41034d call 40105b 1920->1938 1921->1920 1924->1918 1940 404e10-404e16 1937->1940 1941 404ddc-404dee 1937->1941 1938->1937 1963 404d06-404d63 call 4136a5 call 419640 call 40183a call 40f9f8 1938->1963 1945 40564c-40566c call 4107b9 call 40f5cc 1940->1945 1943 404df0-404df9 call 40f93f 1941->1943 1944 404dfe-404e0b call 40195c 1941->1944 1943->1944 1944->1940 1956 405672-4056e2 CoUninitialize call 419640 call 40183a call 413d81 call 40f4f7 * 2 1945->1956 1957 404e1b-404e61 call 4107b9 call 401071 1945->1957 1998 4056e4-4056e7 1956->1998 1999 40572e-405740 1956->1999 1972 404e63-404e66 1957->1972 1973 404e6b-404f30 call 4107b9 * 4 call 401000 * 2 call 4019e1 call 401901 1957->1973 1995 404d73-404dd2 call 40195c call 40f93f call 419640 call 40195c call 40f93f call 40f5cc * 2 1963->1995 1996 404d65-404d6e call 40f93f 1963->1996 1976 405629-405649 call 40f5cc * 2 1972->1976 2051 404f32-404f61 call 4019e1 call 401901 1973->2051 2052 404f63 1973->2052 1976->1945 1995->1937 1996->1995 2005 405702-405729 call 41338d * 2 1998->2005 2006 4056e9-405700 call 40f0f0 1998->2006 2000 405742-405753 call 41338d 1999->2000 2001 405758-40575f 1999->2001 2000->2001 2009 405761-40576b 2001->2009 2010 40576f-40577d call 41a096 2001->2010 2005->1999 2006->1999 2006->2005 2009->2010 2024 405783-405792 call 41be4a 2010->2024 2025 405a9e-405b20 call 413c6b call 40f5cc * 3 call 413c6b call 40f5cc * 4 2010->2025 2036 405a92-405a99 call 41bf16 2024->2036 2037 405798-4057ba call 419640 call 40183a 2024->2037 2025->1855 2036->2025 2060 405a5d-405a83 call 4107b9 call 40f5cc 2037->2060 2051->2052 2058 404f66-404f71 2051->2058 2052->2058 2063 404f82-404f8d 2058->2063 2064 404f73-404f7d call 40f5cc 2058->2064 2091 405a89-405a8d call 40f5cc 2060->2091 2092 4057bf-4057e8 call 4107b9 call 4017f8 call 40f5cc 2060->2092 2069 404f9b-404f9e 2063->2069 2070 404f8f-404f96 call 40f5cc 2063->2070 2064->2063 2071 405492-4054ab CoCreateInstance 2069->2071 2072 404fa4-404faa 2069->2072 2070->2069 2081 4054b1-40550d call 4107b9 * 2 2071->2081 2082 4055cf-405624 call 40f5cc * 6 2071->2082 2077 404fb0-40506e call 401071 call 4107b9 call 4010d1 call 41034d call 40f5cc * 2 call 401071 call 4107b9 call 4010d1 call 41034d call 40f5cc * 2 2072->2077 2078 405073-405085 call 40f2c0 2072->2078 2077->2078 2099 405087-4050a8 call 41238a call 41034d 2078->2099 2100 4050ad-4050de call 4019e1 call 4010b7 call 40f5cc 2078->2100 2137 405513-40554d call 435c2a MultiByteToWideChar 2081->2137 2138 4055ab-4055c3 call 40f5cc 2081->2138 2082->1976 2091->2036 2141 405a55-405a5a 2092->2141 2142 4057ee-40582c call 419640 call 40183a call 419640 call 40183a 2092->2142 2129 405173-40517d call 40f5cc 2099->2129 2143 405182-405194 call 40f4f7 2100->2143 2146 4050e4-405127 call 435bb0 call 401999 LoadLibraryA 2100->2146 2129->2143 2159 4055a2-4055a7 2137->2159 2160 40554f-40555a 2137->2160 2171 4055c6-4055ca call 40f5cc 2138->2171 2141->2060 2192 405952-405972 call 4107b9 call 40f5cc 2142->2192 2164 405196-405199 2143->2164 2165 40519f-4051e1 CoCreateInstance call 41b3fe 2143->2165 2146->2129 2179 405129-405152 GetModuleFileNameA FreeLibrary call 401071 2146->2179 2159->2138 2173 40555e-40559d call 41036c call 40f93f call 40f5cc 2160->2173 2164->2082 2164->2165 2165->2082 2182 4051e7-405293 call 411530 call 411500 call 410ed1 call 40183a call 40f5cc * 2 2165->2182 2171->2082 2173->2159 2185 405157-40516e call 41034d call 40f5cc 2179->2185 2257 405295-4052e9 call 41036c call 4018a8 call 40105b 2182->2257 2258 405309-40531c 2182->2258 2185->2129 2214 405831-405864 call 4107b9 call 40f4f7 2192->2214 2215 405978 2192->2215 2230 40586a-4058ab call 4107b9 * 2 call 40f2c0 2214->2230 2231 40593e-40594f call 40f5cc 2214->2231 2218 4059b0-405a50 call 4107b9 call 41036c call 4018a8 call 41c0b9 call 40f5cc * 5 2215->2218 2218->2141 2249 4058e2-405921 call 4107b9 call 4018c8 call 40f5cc 2230->2249 2250 4058ad-4058dd call 401999 call 41034d call 40f5cc 2230->2250 2231->2192 2284 405923-405939 call 40f5cc * 2 2249->2284 2285 40597a-4059ab call 41034d call 40f5cc * 3 2249->2285 2250->2249 2297 4052ee-405304 call 40f5cc * 2 2257->2297 2270 405451-40546c call 41b3fe 2258->2270 2271 405322-40537b call 435c2a call 4114d2 call 411793 call 410cb5 2258->2271 2288 40546f-40548d call 40f5cc 2270->2288 2311 405389-4053a6 MultiByteToWideChar 2271->2311 2312 40537d-405388 call 411adc 2271->2312 2284->2231 2285->2218 2288->2171 2297->2258 2314 4053a8-4053ab 2311->2314 2315 4053df-405409 call 41036c 2311->2315 2312->2311 2317 405428-40544f call 40f5cc * 2 2314->2317 2318 4053ad-4053b8 2314->2318 2328 40540f-405423 call 40f93f call 40f5cc 2315->2328 2317->2288 2320 4053bc-4053dd call 41036c 2318->2320 2320->2328 2328->2317
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004045BE
                                                • Part of subcall function 00419640: __EH_prolog3.LIBCMT ref: 00419647
                                                • Part of subcall function 004136A5: __EH_prolog3_GS.LIBCMT ref: 004136AF
                                                • Part of subcall function 004136A5: LoadStringA.USER32(?,?,?,00000100), ref: 00413706
                                                • Part of subcall function 00401855: __EH_prolog3.LIBCMT ref: 0040185C
                                                • Part of subcall function 0041036C: __EH_prolog3.LIBCMT ref: 00410373
                                                • Part of subcall function 0041036C: _strlen.LIBCMT ref: 004103B5
                                                • Part of subcall function 0041036C: _strlen.LIBCMT ref: 004103E2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strlen$H_prolog3_LoadString
                                              • String ID: $PROGRAM$%PATH%\$%s\%s.LNK$%s\%s.URL$.\install.cpp$;setup.exe:1$;setup.exe;-remove $ActiveSyncInstall$AddToFirewall$AppName$DesktopIcon$IniKey$Programgroup entry or desktop icon$SUCCEEDED(hres)$Software\Microsoft\Windows\CurrentVersion\Uninstall\$StartmenuName$StartmenuOpts$StartmenuUninstall$UninstallDesktopFiles$UninstallStartmenu$UninstallStartmenuFiles$\pcinstall.ini"$http://$https://
                                              • API String ID: 602430170-2849904513
                                              • Opcode ID: b70959cc3f6bb3ac1629c1c9806d09290a2d603c25369a0d8c0fc9dc2263dca9
                                              • Instruction ID: 8c970af3518d0a7d5a58cb4cb6b63acb034bd12b84b2d9891eb5c2cfdd5ceac7
                                              • Opcode Fuzzy Hash: b70959cc3f6bb3ac1629c1c9806d09290a2d603c25369a0d8c0fc9dc2263dca9
                                              • Instruction Fuzzy Hash: 8ED26170900249EEDB11EBA5CD55BDDB7B8AF15308F1040EAE509B71C2EB785B88CF69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3681 436d80-436db1 3682 436db3-436dd2 call 4380be call 4380ab call 440bb4 3681->3682 3683 436dd7-436dd9 3681->3683 3703 437097 3682->3703 3683->3682 3684 436ddb-436dea call 444cdf 3683->3684 3691 436e02-436e06 3684->3691 3692 436dec-436dfd call 4380ab call 4380be 3684->3692 3695 436e22 call 444a9d 3691->3695 3696 436e08-436e0c 3691->3696 3692->3703 3704 436e27-436e3b FindFirstFileA 3695->3704 3700 436e13-436e20 call 444c07 3696->3700 3701 436e0e-436e11 3696->3701 3700->3704 3701->3692 3701->3700 3710 43709a-4370b1 call 435782 3703->3710 3707 436e41-436e53 call 444cdf 3704->3707 3708 436efc-436eff 3704->3708 3707->3692 3722 436e55-436e72 call 438179 3707->3722 3712 436f01-436f04 3708->3712 3713 436f0e-436f1e FileTimeToLocalFileTime 3708->3713 3712->3713 3718 436f06-436f0c 3712->3718 3715 437081-437091 GetLastError call 4380d1 FindClose 3713->3715 3716 436f24-436f34 FileTimeToSystemTime 3713->3716 3715->3703 3716->3715 3721 436f3a-436f65 call 444834 3716->3721 3720 436f68-436f6b 3718->3720 3725 436f80-436f90 FileTimeToLocalFileTime 3720->3725 3726 436f6d-436f70 3720->3726 3721->3720 3735 436ee5-436ee8 3722->3735 3736 436e74-436e7e call 435330 3722->3736 3725->3715 3731 436f96-436fa6 FileTimeToSystemTime 3725->3731 3726->3725 3730 436f72-436f7e 3726->3730 3733 436fda-436fdd 3730->3733 3731->3715 3734 436fac-436fd7 call 444834 3731->3734 3740 436ff2-437002 FileTimeToLocalFileTime 3733->3740 3741 436fdf-436fe2 3733->3741 3734->3733 3735->3692 3737 436eee-436ef7 call 437ed0 3735->3737 3750 436e80-436e87 call 436d08 3736->3750 3751 436e89-436e93 GetDriveTypeA 3736->3751 3737->3692 3740->3715 3742 437004-437014 FileTimeToSystemTime 3740->3742 3741->3740 3746 436fe4-436ff0 3741->3746 3742->3715 3748 437016-437041 call 444834 3742->3748 3747 437044-437047 FindClose 3746->3747 3754 43704d-43707f call 44477b 3747->3754 3748->3747 3750->3735 3750->3751 3751->3735 3752 436e95-436e98 3751->3752 3757 436ea3-436ee0 call 444834 3752->3757 3758 436e9a-436ea2 call 437ed0 3752->3758 3754->3710 3757->3754 3758->3757
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ./\$<self>
                                              • API String ID: 0-2752795735
                                              • Opcode ID: 6c61b2d8ab86ed15cc8f8fe62cff2ace8c9248f0a8f2fcb4e5fe1f6f377d8d2c
                                              • Instruction ID: e7ff84fc5d36c0c8e5c6d82c32746597add1f11ba7aa71e19d2bd0d1197126e0
                                              • Opcode Fuzzy Hash: 6c61b2d8ab86ed15cc8f8fe62cff2ace8c9248f0a8f2fcb4e5fe1f6f377d8d2c
                                              • Instruction Fuzzy Hash: 4DA16DB180061AAEDB20DFE5C8459AEB7F8BF0C315F10512FF558D7681E7399980CB69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3981 4381d7-438208 3982 43820a-438229 call 4380be call 4380ab call 440bb4 3981->3982 3983 43822e-438230 3981->3983 4003 43850b 3982->4003 3983->3982 3984 438232-438241 call 444cdf 3983->3984 3991 438243-438254 call 4380ab call 4380be 3984->3991 3992 438259-43825d 3984->3992 3991->4003 3995 438279 call 444a9d 3992->3995 3996 43825f-438263 3992->3996 4004 43827e-438292 FindFirstFileA 3995->4004 4000 438265-438268 3996->4000 4001 43826a-438277 call 444c07 3996->4001 4000->3991 4000->4001 4001->4004 4010 43850e-438525 call 435782 4003->4010 4007 438353-438356 4004->4007 4008 438298-4382aa call 444cdf 4004->4008 4013 438365-438375 FileTimeToLocalFileTime 4007->4013 4014 438358-43835b 4007->4014 4008->3991 4022 4382ac-4382c9 call 438179 4008->4022 4016 4384f5-438505 GetLastError call 4380d1 FindClose 4013->4016 4017 43837b-43838b FileTimeToSystemTime 4013->4017 4014->4013 4019 43835d-438363 4014->4019 4016->4003 4017->4016 4021 438391-4383b1 call 444834 4017->4021 4020 4383bf-4383c2 4019->4020 4025 4383d7-4383e7 FileTimeToLocalFileTime 4020->4025 4026 4383c4-4383c7 4020->4026 4029 4383b6-4383bc 4021->4029 4035 4382cb-4382d5 call 435330 4022->4035 4036 43833c-43833f 4022->4036 4025->4016 4031 4383ed-4383fd FileTimeToSystemTime 4025->4031 4026->4025 4030 4383c9-4383d5 4026->4030 4029->4020 4033 438431-438434 4030->4033 4031->4016 4034 438403-43842e call 444834 4031->4034 4040 438436-438439 4033->4040 4041 438449-438459 FileTimeToLocalFileTime 4033->4041 4034->4033 4050 4382e0-4382ea GetDriveTypeA 4035->4050 4051 4382d7-4382de call 436d08 4035->4051 4036->3991 4037 438345-43834e call 437ed0 4036->4037 4037->3991 4040->4041 4046 43843b-438447 4040->4046 4041->4016 4042 43845f-43846f FileTimeToSystemTime 4041->4042 4042->4016 4048 438475-4384a0 call 444834 4042->4048 4047 4384a3-4384a6 FindClose 4046->4047 4054 4384ac-4384f3 call 44477b call 439000 4047->4054 4048->4047 4050->4036 4052 4382ec-4382ef 4050->4052 4051->4036 4051->4050 4057 4382f1-4382f9 call 437ed0 4052->4057 4058 4382fa-438337 call 444834 4052->4058 4054->4010 4057->4058 4058->4054
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ./\
                                              • API String ID: 0-3176372042
                                              • Opcode ID: ceef4eaa34b6fab665cd07b4cb1b64e6bc2fd36f8451f982be12028f423f2701
                                              • Instruction ID: bd17b2a4a290f96856132e9c7d83e05b60895767ea32bdd059b6d00adc49d811
                                              • Opcode Fuzzy Hash: ceef4eaa34b6fab665cd07b4cb1b64e6bc2fd36f8451f982be12028f423f2701
                                              • Instruction Fuzzy Hash: 8AA15CB1800709AEDB20DFA6C8459AEB7B8BF0C315F14112FF518D7681EB399990CB69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • _malloc.LIBCMT ref: 004311BF
                                                • Part of subcall function 00437FAD: __FF_MSGBANNER.LIBCMT ref: 00437FD0
                                                • Part of subcall function 00437FAD: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00442DC2,?,00000001,?,0044340E,00000018,00469F50,0000000C,0044349D,?), ref: 00438025
                                              • _strlen.LIBCMT ref: 004311D0
                                              • _malloc.LIBCMT ref: 004311D9
                                              • _strcat.LIBCMT ref: 004311ED
                                              • FindFirstFileA.KERNEL32(00000000,?,?,00000001), ref: 00431204
                                              • _strcat.LIBCMT ref: 0043122F
                                                • Part of subcall function 00437ED0: __lock.LIBCMT ref: 00437EEE
                                                • Part of subcall function 00437ED0: ___sbh_find_block.LIBCMT ref: 00437EF9
                                                • Part of subcall function 00437ED0: ___sbh_free_block.LIBCMT ref: 00437F08
                                                • Part of subcall function 00437ED0: RtlFreeHeap.NTDLL(00000000,?,00469980,0000000C,00443465,00000000,00469F50,0000000C,0044349D,?,?,?,004388FB,00000004,004699E0,0000000C), ref: 00437F38
                                                • Part of subcall function 00437ED0: GetLastError.KERNEL32(?,004388FB,00000004,004699E0,0000000C,00442E08,?,?,00000000,00000000,00000000,0043FA2F,00000001,00000214,?,00000000), ref: 00437F49
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Heap_malloc_strcat$AllocateErrorFileFindFirstFreeLast___sbh_find_block___sbh_free_block__lock_strlen
                                              • String ID: /*.*
                                              • API String ID: 2393211415-1014195128
                                              • Opcode ID: 18e43807012b488647ef3b887e3e461ad87c85ccb9f7fc811f8dfb976a31b40e
                                              • Instruction ID: a0e2f963d810af93d2f59520ce96502a40403bb3dd4492aaefa3f1c77d5d02b8
                                              • Opcode Fuzzy Hash: 18e43807012b488647ef3b887e3e461ad87c85ccb9f7fc811f8dfb976a31b40e
                                              • Instruction Fuzzy Hash: 0B1106725046086AC620B772AC47AEF73ACDF8C329F10246FF541E61C1EE2CA9414A6D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _fprintf
                                              • String ID: (incomplete d-tree) $(incomplete l-tree)
                                              • API String ID: 1654120334-3591168323
                                              • Opcode ID: e907933ab87bf7202f6ef9e93de2d1da675b9480760fdc5e7afa7cdf95f8d45c
                                              • Instruction ID: 77b37662b1eab55379af4c61d1956d709ff12aeca5052708ca6ea76875f6e133
                                              • Opcode Fuzzy Hash: e907933ab87bf7202f6ef9e93de2d1da675b9480760fdc5e7afa7cdf95f8d45c
                                              • Instruction Fuzzy Hash: 28D1E432E04115ABEB15DF58DE825AD77B0FB08320F60253BD412A7251D7FC9A42EB9E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00412297
                                              • GetUserNameA.ADVAPI32(?,?), ref: 004122CD
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$NameUser_strlen
                                              • String ID:
                                              • API String ID: 379490859-0
                                              • Opcode ID: 197ebbf71497717f49edd3b26586395ca79a64f99eb8cb7c96b1d72c873f96a4
                                              • Instruction ID: 51d8c02a3e452236ea62c045287dcdd6b5c174194c0f54e7e323023768c79a7c
                                              • Opcode Fuzzy Hash: 197ebbf71497717f49edd3b26586395ca79a64f99eb8cb7c96b1d72c873f96a4
                                              • Instruction Fuzzy Hash: 2F118B71A002489BDB10EF95D945BEDB7B8FF58305F10402BE905E7281DBB89B08CB95
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 402f9c-403104 call 435791 call 435bb0 call 418658 call 401071 call 401000 * 5 call 4136a5 call 418658 call 415a8e call 415d0e call 40f5cc 29 403136-403163 call 411530 call 410a1e 0->29 30 403106-40312e call 40105b 0->30 37 403173 29->37 38 403165-403171 call 41292f 29->38 30->29 40 403177-403190 call 40f5cc 37->40 38->37 38->40 44 403192-4031e3 call 411530 call 4183dd call 40f5cc 40->44 45 4031f7-40328f call 401071 * 2 call 419640 call 4010d1 call 40f5cc call 401071 call 419640 call 4010d1 call 40f5cc 40->45 44->45 59 4031e5-4031f0 call 41b378 44->59 73 403299-40329d 45->73 59->45 74 4032ad-4032bb call 401071 73->74 75 40329f-4032ab call 419640 73->75 80 4032bf-4032c8 74->80 75->80 81 4032d6-4032da 80->81 82 4032ca-4032d1 call 40f5cc 80->82 83 4032ea-4032fb call 401071 81->83 84 4032dc-4032e8 call 419640 81->84 82->81 90 4032ff-403308 83->90 84->90 91 403319-40331f 90->91 92 40330a-403314 call 40f5cc 90->92 94 403321-403328 call 402f64 91->94 95 403336-4033c4 call 401071 * 3 call 42d5c5 call 41b3fe call 42d7b8 91->95 92->91 98 40332d-403330 94->98 122 40358c-40359d call 435b20 95->122 98->95 101 4035bc-4035e0 call 419640 call 41034d 98->101 111 403732-40375a call 4107b9 call 40f5cc 101->111 120 403760-403796 call 419640 call 41034d call 4107b9 111->120 121 40362f-40364b call 4107b9 111->121 151 403e01-403e2e call 41034d call 40f5cc 120->151 131 403652 121->131 132 40364d-403650 121->132 129 4035a3-4035b6 call 42d783 122->129 130 40346c-40347e call 42d81a 122->130 129->73 129->101 140 403483-403486 130->140 135 403654-403666 call 40f5cc 131->135 132->135 146 403725-40372f 135->146 147 40366c-4036c9 call 4107b9 call 411500 call 40f5cc call 411530 call 410a1e 135->147 143 4033c9-403466 call 4136a5 call 40f9f8 call 419640 call 40f9f8 call 4136a5 call 413fd0 call 40f5cc * 2 140->143 144 40348c-403490 140->144 143->130 251 4035e5-40362a call 42d783 call 418658 call 415b53 call 415d0e 143->251 149 403492-4034a0 call 41880f 144->149 150 4034a5-4034fc call 401071 call 401a26 call 401901 call 40f5cc * 2 144->150 146->111 203 4036d8-4036f8 call 4118f2 call 410a1e 147->203 204 4036cb-4036d3 call 410cca 147->204 149->150 207 4034fe-40350e 150->207 208 40354f-40356f call 411530 call 435d86 150->208 170 403e34-403e4e call 41880f call 419640 151->170 171 40379b-403a89 call 40f4f7 call 401071 call 4107b9 call 4010d1 call 40183a call 40f5cc * 2 call 401071 call 4107b9 call 4010d1 call 40183a call 40f5cc * 2 call 401071 call 4107b9 call 4010d1 call 40183a call 40f5cc * 2 call 401071 call 4107b9 call 4010d1 call 40183a call 40f5cc * 2 call 401071 call 4107b9 call 4010d1 call 40183a call 40f5cc * 2 call 401071 call 4107b9 call 4010d1 call 40183a call 40f5cc * 2 call 401071 call 4107b9 call 4010d1 call 40183a call 40f5cc * 2 151->171 197 403e54-4040c3 call 419640 call 41034d call 413d81 call 40f4f7 call 419640 call 41338d call 419640 call 41338d call 41036c call 419640 call 4018a8 call 41338d call 40f5cc * 2 call 41338d * 2 call 419640 call 41338d call 419640 call 41338d call 401855 call 41036c call 4018a8 call 41036c call 41338d call 40f5cc * 4 call 41338d * 3 call 419640 call 41338d call 41a096 170->197 198 40413c-404143 170->198 499 403d7f-403dfc call 40f5cc * 7 call 4107b9 171->499 500 403a8f-403a99 171->500 470 4040c5-4040da call 419640 call 41338d 197->470 471 4040df-4040ee call 41a096 197->471 200 404145-40414b 198->200 201 40414f-404156 198->201 200->201 212 404172-404176 201->212 213 404158-40416e 201->213 252 403707-403720 call 40f5cc * 2 203->252 253 4036fa-403702 call 410cca 203->253 204->203 217 403510-40351d call 40f93f 207->217 218 403522-40354d call 401071 call 40f93f 207->218 249 403575-403589 call 40f5cc call 42d7e2 208->249 224 404178-40419f call 411530 call 410a1e 212->224 225 4041af 212->225 213->212 217->218 218->249 224->225 272 4041a1-4041a9 call 41292f 224->272 229 4041b1-4041bc 225->229 237 4041c9-4041cb 229->237 238 4041be-4041c4 call 40f5cc 229->238 247 404222-40427e call 401071 call 419640 call 4010d1 call 40105b call 40f5cc call 412a6d call 415b53 237->247 248 4041cd-404221 call 411530 call 41380f call 40f5cc call 41b378 237->248 238->237 309 404317-40434f call 418658 call 415b53 call 415d0e 247->309 333 404284-404311 call 4136a5 call 418658 call 415a8e call 415d0e call 40f5cc call 401a83 call 415b63 SendMessageA 247->333 248->247 249->122 251->309 252->146 253->252 272->225 288 4041ab-4041ad 272->288 288->229 338 404351-404367 PostMessageA 309->338 339 40436d-40440f call 40f5cc * 7 call 415d0e call 435782 309->339 333->309 338->339 470->471 479 4040f0-40410a call 419640 call 40f4af 471->479 480 404122-404128 call 413378 471->480 479->480 494 40410c-40411d call 419640 call 41338d 479->494 486 40412d-404137 call 413c6b 480->486 486->198 494->480 499->151 500->499 502 403a9f-403aaf 500->502 502->499 505 403ab5-403ac5 502->505 505->499 507 403acb-403adb 505->507 507->499 509 403ae1-403bf0 call 40183a call 40f4f7 call 40f93f call 413d44 call 41338d call 413d44 call 41338d call 413d44 call 4018a8 call 41338d call 40f5cc call 401901 507->509 545 403bf6-403c69 call 41036c call 413d44 call 40f5cc call 4018a8 call 41338d 509->545 546 403c8c-403c9f call 40f4af 509->546 574 403c6e-403c87 call 40f5cc call 413c6b 545->574 551 403ca1-403cf6 call 41036c call 413d44 call 40f5cc call 41338d 546->551 552 403d0a-403d7a call 40195c call 40f93f call 40195c call 40f93f call 413c6b * 3 call 40f5cc 546->552 576 403cfb-403d05 call 413c6b 551->576 552->499 574->546 576->552
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00402FBE
                                              • _memset.LIBCMT ref: 00402FE5
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 004136A5: __EH_prolog3_GS.LIBCMT ref: 004136AF
                                                • Part of subcall function 004136A5: LoadStringA.USER32(?,?,?,00000100), ref: 00413706
                                                • Part of subcall function 00418658: GetDlgItem.USER32(?,?), ref: 00418670
                                                • Part of subcall function 00415A8E: SetWindowTextA.USER32(?,00000000), ref: 00415A95
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                                • Part of subcall function 00419640: __EH_prolog3.LIBCMT ref: 00419647
                                                • Part of subcall function 0040F9F8: _strlen.LIBCMT ref: 0040FA08
                                                • Part of subcall function 0040F9F8: _strlen.LIBCMT ref: 0040FA13
                                                • Part of subcall function 0040F9F8: _strncpy.LIBCMT ref: 0040FAA9
                                                • Part of subcall function 00413FD0: __EH_prolog3.LIBCMT ref: 00413FD7
                                                • Part of subcall function 00413FD0: MessageBoxA.USER32(00000001,?,?,00010024), ref: 00414077
                                              • PostMessageA.USER32(?,00000111,00000095,?), ref: 00404367
                                                • Part of subcall function 0042D81A: __EH_prolog3.LIBCMT ref: 0042D83C
                                                • Part of subcall function 0042D81A: _malloc.LIBCMT ref: 0042D879
                                                • Part of subcall function 0042D81A: _memset.LIBCMT ref: 0042D8A1
                                                • Part of subcall function 0042D81A: _memset.LIBCMT ref: 0042D8EA
                                                • Part of subcall function 0042D81A: _strcat.LIBCMT ref: 0042D8F9
                                                • Part of subcall function 0042D81A: _strcat.LIBCMT ref: 0042D96F
                                                • Part of subcall function 0042D81A: _strcat.LIBCMT ref: 0042D97F
                                                • Part of subcall function 0042D81A: _strcat.LIBCMT ref: 0042D98B
                                                • Part of subcall function 00411530: __EH_prolog3.LIBCMT ref: 00411537
                                                • Part of subcall function 00411530: _memset.LIBCMT ref: 00411552
                                                • Part of subcall function 00411530: _strlen.LIBCMT ref: 00411589
                                                • Part of subcall function 00410A1E: _strerror.LIBCMT ref: 00410A39
                                                • Part of subcall function 004107B9: __EH_prolog3.LIBCMT ref: 004107C0
                                                • Part of subcall function 004107B9: _strpbrk.LIBCMT ref: 00410829
                                                • Part of subcall function 004107B9: _strlen.LIBCMT ref: 00410835
                                                • Part of subcall function 004010D1: _strlen.LIBCMT ref: 004010E1
                                                • Part of subcall function 004107B9: _strpbrk.LIBCMT ref: 00410809
                                              • SendMessageA.USER32(?,00000409,00000095,00000000), ref: 00404311
                                                • Part of subcall function 0040F93F: _strlen.LIBCMT ref: 0040F95F
                                                • Part of subcall function 00413D44: __EH_prolog3.LIBCMT ref: 00413D4B
                                                • Part of subcall function 0041338D: _strlen.LIBCMT ref: 00413396
                                                • Part of subcall function 0041338D: RegSetValueExA.KERNEL32(?,?,00000000,00000001,?,00000000), ref: 004133A9
                                                • Part of subcall function 0041036C: __EH_prolog3.LIBCMT ref: 00410373
                                                • Part of subcall function 0041036C: _strlen.LIBCMT ref: 004103B5
                                                • Part of subcall function 0041036C: _strlen.LIBCMT ref: 004103E2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3_strlen$_memset_strcat$Message$_strpbrk$H_prolog3_ItemLoadPostSendStringTextValueWindow_malloc_strerror_strncpy
                                              • String ID: $FILE$$JE$$PROGRAM$.1i$.\install.cpp$/START$/STOP$0JE$<NULL>$AddToFirewall$AppName$AppVersion$AskOverwrite$CopyToDest$DefaultIcon$DisplayIcon$DisplayName$DisplayVersion$EmTec Innovative Software$Emtec Service-Control$FileTypes$IniKey$NoCopyComplete$ProtectedFiles$Publisher$SETUP::ActualCopy Application Service was restarted$SETUP::ActualCopy Application Service was stopped$Software\Microsoft\Windows\CurrentVersion\Uninstall\$StartmenuName$URLInfoAbout$UninstallEmail$UninstallFiles$UninstallFirewall$UninstallIcon$UninstallPath$UninstallProtect$UninstallRootClasses$UninstallString$Version$\Setup.exe" -remove "$\Shell\edit$\Shell\open$command$dummy.tmp$http://www.emtec.com$notepad %1$service.exe$total>0${null}${textedit}$HE
                                              • API String ID: 2694233176-2180281922
                                              • Opcode ID: 84c6aca34f0b3936eb679bd04520edeadd9020b077ec5783c4441aaf15ec6853
                                              • Instruction ID: b8973d8d56120797ba2c2e2f7acd054044bcdcef3ecf45719923b16e40596e60
                                              • Opcode Fuzzy Hash: 84c6aca34f0b3936eb679bd04520edeadd9020b077ec5783c4441aaf15ec6853
                                              • Instruction Fuzzy Hash: 95C2B470900248AEDF15EBA5CD56BEDBBB4AF15308F1040EEE549771C2DB781B88CB69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _fprintf$__ftbuf__output_l__setmode__stbuf_flsall
                                              • String ID: error: %s$ error: not enough memory for unshrink operation$ error: %s%s$ error: not enough memory to unshrink %s$ OK$ bad CRC %08lx (should be %08lx)$%-22s $%0"$%s: unknown compression method$(&$C:/Program Files (x86)/ZOC5/zocdll.dll$[binary]$[empty] $[text] $error$exploding$extracting$inflating$invalid compressed (deflated) data for $invalid compressed (imploded) data for $invalid compressed data for explode format$invalid compressed data for inflate format$not enough memory for explode operation$not enough memory for inflate operation$not enough memory to explode $not enough memory to inflate $testing$unreducing$unshrinking$warning
                                              • API String ID: 2252193178-2337029885
                                              • Opcode ID: 3a5c38b79f7d0337f7fa3d274560e002c7536fce832844044433610eb756468b
                                              • Instruction ID: f98fa1241759f8f3fd6589edfc9a9ced3c98f6cdedd0027dd89bf7be1ec3c639
                                              • Opcode Fuzzy Hash: 3a5c38b79f7d0337f7fa3d274560e002c7536fce832844044433610eb756468b
                                              • Instruction Fuzzy Hash: D6E1C9F1E04204A7DB247B569C6772B3258DB59308F24693FF81096262E77DDC508BAF
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 834 405be3-405e79 call 435d90 call 41a162 839 405ec6-405ed5 call 419640 834->839 840 405e7b-405ec1 call 4136a5 * 2 call 413ef6 call 40f5cc 834->840 846 405ed7-405eda 839->846 847 405edc 839->847 864 40643c-406445 call 40f5cc 840->864 849 405ede-405ee0 846->849 847->849 851 405ee6-405f09 call 419640 call 40183a 849->851 852 40626f-406284 call 419640 call 40105b 849->852 865 40623c-40625d call 4107b9 call 40f5cc 851->865 866 406286-4062ba call 413d81 call 413c7c 852->866 867 4062f8-406348 call 401071 call 419640 call 4010d1 call 4010b7 call 40f5cc 852->867 875 406b4d-406b71 call 435782 864->875 885 406263-40626a call 40f5cc 865->885 886 405f0e-405f36 call 4107b9 call 4010b7 865->886 888 4062c0-4062d4 866->888 889 40644a-4064a7 call 4136a5 * 2 call 413ef6 call 40f5cc * 2 866->889 915 4064d0-4064d7 867->915 916 40634e-40639e call 401071 call 419640 call 4010d1 call 4017ce call 40f5cc 867->916 885->852 909 405f46 886->909 910 405f38-405f44 call 41292f 886->910 888->889 893 4062da-4062e3 call 402f64 888->893 944 406b44-406b48 call 413c6b 889->944 893->889 903 4062e9-4062f3 call 413c6b 893->903 903->867 914 405f49-405f54 909->914 910->909 910->914 921 405f62-405f65 914->921 922 405f56-405f5d call 40f5cc 914->922 918 4064d9-4064da 915->918 919 4064de-4064e5 915->919 916->915 962 4063a4-4063b2 916->962 918->919 927 406507-406641 call 4136a5 call 406d1b call 40f5cc call 419640 call 41036c call 419640 call 4018a8 call 41034d call 40f5cc * 2 call 401071 call 419640 call 4010d1 call 40f5cc call 419640 call 413d81 call 435bb0 call 41351c 919->927 928 4064e7-4064ff call 41432e 919->928 924 406234-406239 921->924 925 405f6b-405fda call 401071 call 413d44 call 40f5cc call 401000 call 413c7c 921->925 922->921 924->865 970 406012-406079 call 401071 call 413d44 call 40f5cc call 401000 call 413c7c 925->970 971 405fdc-405fe8 925->971 1057 406643-406667 call 4114d2 call 410cb5 927->1057 1058 406669 927->1058 928->927 944->875 965 4063b8-4063c2 962->965 966 4064ac-4064c4 962->966 965->915 966->915 969 4064c6 966->969 969->915 1003 40607b-406087 970->1003 1004 40608d-4060fd call 401071 call 413d44 call 40f5cc call 401000 call 413c7c 970->1004 971->970 974 405fea-406004 call 40f93f LoadLibraryA 971->974 974->970 982 406006-40600d FreeLibrary 974->982 985 406214-40622f call 40f5cc call 413c6b 982->985 985->924 1003->1004 1006 4061c7-4061d3 1003->1006 1038 406115-406176 call 401071 call 413d44 call 40f5cc call 413c7c call 413c6b 1004->1038 1039 4060ff-406113 1004->1039 1009 4061f0-40620e call 40f5cc call 413c6b 1006->1009 1010 4061d5-4061e0 LoadLibraryA 1006->1010 1009->985 1027 4063c7-406439 call 4136a5 * 2 call 413ef6 call 40f5cc * 3 call 413c6b 1009->1027 1010->1009 1015 4061e2-4061e9 FreeLibrary 1010->1015 1015->1009 1027->864 1042 40617c-406188 1038->1042 1039->1038 1039->1042 1046 4061a9-4061c2 call 40f5cc call 413c6b 1042->1046 1047 40618a-4061a4 call 40f9f8 call 41034d 1042->1047 1046->1006 1047->1046 1057->1058 1065 40666c-406677 1057->1065 1058->1065 1069 406684-406687 1065->1069 1070 406679-40667f call 40f5cc 1065->1070 1074 4066b4-4066ce call 419640 call 40f2c0 1069->1074 1075 406689-4066af call 401071 call 41034d 1069->1075 1070->1069 1094 4066d0-4066f2 call 401999 call 41034d 1074->1094 1095 4066f4-406731 call 41238a call 4018a8 call 41034d call 40f5cc 1074->1095 1093 406737-40681e call 40f5cc call 4136a5 * 2 call 419640 call 40105b call 40e6e9 call 40f5cc * 2 call 415a9e call 419640 call 40f9f8 call 415a8e call 40eb5f 1075->1093 1133 406823-40682d 1093->1133 1094->1093 1095->1093 1134 40683e-406845 1133->1134 1135 40682f-406832 1133->1135 1137 406852-406878 call 419640 call 40183a 1134->1137 1138 406847-40684e 1134->1138 1135->1134 1136 406834-40683a 1135->1136 1136->1134 1143 40693d-40695e call 4107b9 call 40f5cc 1137->1143 1138->1137 1148 406964-406972 call 415b1d 1143->1148 1149 40687d-406899 call 4107b9 1143->1149 1156 406b11-406b3e call 40f5cc * 2 call 40e3f9 1148->1156 1157 406978-4069c4 call 401071 call 419640 call 4010d1 call 40183a call 40f5cc call 40105b 1148->1157 1154 4068a0 1149->1154 1155 40689b-40689e 1149->1155 1159 4068a2-4068b6 call 40f5cc 1154->1159 1155->1159 1156->944 1190 406a92-406aa9 call 419640 call 401901 1157->1190 1191 4069ca-406a8d call 4136a5 call 419640 call 40f9f8 call 4136a5 call 41036c call 419640 call 4018a8 call 413e1c call 40f5cc * 4 1157->1191 1168 406931-40693a 1159->1168 1169 4068b8-40692c call 4107b9 call 41036c call 4018a8 call 435d5c call 40f5cc * 3 1159->1169 1168->1143 1169->1168 1205 406af1-406af8 1190->1205 1206 406aab-406ad9 call 411500 call 410cb5 call 40f5cc 1190->1206 1191->1190 1208 406b05-406b0c call 40f5cc 1205->1208 1209 406afa-406b01 1205->1209 1206->1205 1222 406adb-406aeb ShellExecuteA 1206->1222 1208->1156 1209->1208 1222->1205
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$H_prolog3_LoadMessageString
                                              • String ID: $PROGRAM$350.dll$360.dll$4.00$ActiveSyncInstall$Advertise$AppName$AppVersion$CEAppMgr.exe$CheckDll$DAO350$DAO\dao360.dll$DeleteAfterExtract$EmTec$IdBmp$IniKey$InstallPath$NoFinalPopup$Path$Shared Tools$SharedFilesDir$Software\Microsoft$Software\Microsoft\Shared Tools$Software\Microsoft\Windows\CurrentVersion\App Paths\$Software\Microsoft\Windows\CurrentVersion\Uninstall\$UninstallPath$ZOC$dao350.dll$dao360$dao360.dll$open$setup.cfg
                                              • API String ID: 2861373015-3100200597
                                              • Opcode ID: d44c1a1f9003fb53ded10cddaef1ffa514f58d3870bea01ccf9bff98e2265c8f
                                              • Instruction ID: 9aa44ed71816b2e81ef25f1dc77192e51f0c507da4186b09ad16b9ff8ae4388d
                                              • Opcode Fuzzy Hash: d44c1a1f9003fb53ded10cddaef1ffa514f58d3870bea01ccf9bff98e2265c8f
                                              • Instruction Fuzzy Hash: 0A927170900258AEDF10EBA5CC85BEDB7B4AF55308F1041AEE509B72D2DB785B88CF59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _fprintf$_strncmp$__locking$_malloc$AllocateHeap
                                              • String ID: %s: bad file comment length$file #%d: bad local header$ skipping: %-22s %svolume label$ (attempting to re-compensate)$3$C:/Program Files (x86)/ZOC5/zocdll.dll$EOF$caution: excluded filename not matched: %s$caution: filename not matched: %s$central$hard disk $local$local header sig$lseek
                                              • API String ID: 2063179924-3552385710
                                              • Opcode ID: 4b0815d1471be1b8d330f1a29e7454fc49d2e7e8850956d712770a76f0c3f06a
                                              • Instruction ID: 7a42ba813986abdac79fdaccc26396be98ecfbd03cfb721901379eb5973ddf84
                                              • Opcode Fuzzy Hash: 4b0815d1471be1b8d330f1a29e7454fc49d2e7e8850956d712770a76f0c3f06a
                                              • Instruction Fuzzy Hash: 5922E6B1A04301ABE720AF559C56B2B72A0FB0C718F24293FF54192262E7BDD851CB5F
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1514 42e524-42e542 call 436d80 1517 42ead6-42eada 1514->1517 1518 42e548-42e55f 1514->1518 1520 42eb62-42eb6b 1517->1520 1521 42eae0-42eae6 1517->1521 1518->1517 1519 42e565-42e577 1518->1519 1522 42e57b-42e582 call 42f203 1519->1522 1523 42e579 1519->1523 1524 42eb6e-42eb72 1520->1524 1525 42eae8-42eaf4 1521->1525 1526 42eb2d-42eb38 1521->1526 1537 42e584 1522->1537 1538 42e58c-42e5a2 1522->1538 1523->1522 1530 42eb26-42eb2b 1525->1530 1531 42eaf6-42eafb 1525->1531 1527 42eb3a 1526->1527 1528 42eb3f-42eb5f call 43b677 call 43a91c 1526->1528 1527->1528 1528->1520 1532 42eb00-42eb24 call 43b677 call 43a91c 1530->1532 1531->1532 1532->1520 1539 42e586-42e587 1537->1539 1541 42e5a4-42e5b4 call 42fa3a 1538->1541 1542 42e5ca-42e5d6 1538->1542 1539->1524 1552 42e5f2-42e600 call 43d322 1541->1552 1553 42e5b6-42e5bf call 401b02 1541->1553 1546 42e5da-42e5e5 call 42fa3a 1542->1546 1547 42e5d8 1542->1547 1546->1552 1557 42e5e7-42e5f0 call 42decc 1546->1557 1547->1546 1562 42e602-42e61a call 43b677 call 43a91c 1552->1562 1563 42e61d-42e622 1552->1563 1553->1552 1564 42e5c1-42e5c8 1553->1564 1557->1552 1565 42e636-42e63e 1557->1565 1562->1563 1567 42e624-42e626 1563->1567 1568 42e62b-42e631 1563->1568 1564->1542 1564->1565 1570 42e640-42e646 1565->1570 1571 42e656-42e65c 1565->1571 1567->1524 1568->1537 1572 42e6c0-42e6cd 1570->1572 1575 42e648-42e64e call 43d322 1570->1575 1571->1572 1573 42e65e-42e667 1571->1573 1576 42e688-42e698 1572->1576 1577 42e6cf-42e6e3 call 43b677 call 43a91c 1572->1577 1578 42e6e5-42e6e8 1573->1578 1579 42e669-42e670 1573->1579 1582 42e653-42e654 1575->1582 1586 42e69a-42e6bb call 43b677 call 43a91c 1576->1586 1587 42e70c-42e70e 1576->1587 1612 42e705-42e707 1577->1612 1578->1576 1585 42e6ea-42e702 call 43b677 call 43a91c 1578->1585 1584 42e672-42e686 call 43b677 call 43a91c 1579->1584 1579->1585 1582->1567 1584->1576 1585->1612 1630 42e76f 1586->1630 1592 42e710-42e716 1587->1592 1593 42e774-42e77a 1587->1593 1600 42e751-42e76d call 43b677 call 43a91c 1592->1600 1601 42e718-42e71e 1592->1601 1597 42e7e6-42e7f6 1593->1597 1598 42e77c-42e782 1593->1598 1606 42e800-42e806 1597->1606 1607 42e7f8-42e7ff 1597->1607 1598->1597 1608 42e784-42e78a 1598->1608 1600->1630 1601->1600 1610 42e720-42e74f call 43b677 call 43a91c 1601->1610 1618 42e82b-42e831 1606->1618 1619 42e808-42e819 call 43b677 1606->1619 1607->1606 1616 42e7ae-42e7c6 call 43b677 call 43a91c 1608->1616 1617 42e78c-42e798 1608->1617 1610->1593 1626 42e8b6-42e8b7 1612->1626 1644 42e7c9-42e7d9 call 43d322 1616->1644 1627 42e79a 1617->1627 1628 42e79f-42e7ac call 43d1c9 1617->1628 1623 42e833-42e856 call 43d0ed call 43cf7e 1618->1623 1624 42e885-42e89c 1618->1624 1639 42e81b-42e826 call 43a91c 1619->1639 1653 42e85b-42e865 1623->1653 1637 42e8a1-42e8b2 call 42f28b 1624->1637 1626->1575 1627->1628 1628->1644 1630->1593 1649 42e8b4 1637->1649 1650 42e8bc-42e8c3 1637->1650 1639->1539 1644->1524 1662 42e7df-42e7e1 1644->1662 1649->1626 1654 42e8c5-42e8d3 call 438526 1650->1654 1655 42e8d9-42e8f4 1650->1655 1657 42e867-42e869 1653->1657 1658 42e86e-42e883 1653->1658 1654->1655 1666 42e9db-42e9f0 1654->1666 1660 42e8f6-42e8fd 1655->1660 1661 42e8fe-42e904 1655->1661 1657->1539 1658->1637 1660->1661 1664 42e906-42e91a call 43b677 1661->1664 1665 42e91f-42e925 1661->1665 1662->1524 1664->1639 1668 42e977-42e98e 1665->1668 1669 42e927-42e95a call 43d0ed call 43cf7e 1665->1669 1670 42e9f2-42e9f9 1666->1670 1671 42e9fa-42ea02 1666->1671 1672 42e993-42e99f call 42f28b 1668->1672 1669->1657 1687 42e960-42e975 1669->1687 1670->1671 1671->1664 1675 42ea08-42ea0e 1671->1675 1684 42e9a5-42e9b3 call 438526 1672->1684 1685 42eaad-42eacf call 43b677 call 43a91c 1672->1685 1679 42ea10-42ea42 call 43d0ed call 43cf7e 1675->1679 1680 42ea5f-42ea76 1675->1680 1679->1657 1707 42ea48-42ea5d 1679->1707 1686 42ea7b-42ea81 1680->1686 1684->1685 1703 42e9b9-42e9da call 43b677 call 43a91c 1684->1703 1685->1517 1691 42ea83-42ea88 call 42d27d 1686->1691 1692 42ea8a-42ea90 1686->1692 1687->1672 1706 42ea9e-42eaa0 1691->1706 1697 42ea92-42ea97 call 42cee1 1692->1697 1698 42ea99 call 4308f0 1692->1698 1697->1706 1698->1706 1703->1666 1706->1575 1710 42eaa6-42eaa8 1706->1710 1707->1686 1710->1575
                                              APIs
                                              Strings
                                              • %s: can't find either %s or %s, so there., xrefs: 0042EB4C
                                              • unzip, xrefs: 0042EAFB, 0042EB0D, 0042EB3A, 0042EB4B
                                              • %sEmpty zipfile., xrefs: 0042E7A0
                                              • Warning: zipfile claims to be second disk of a two-part archive; attempting to process anyway. If no further errors occur, this archive was probably created by PAK v2.51 or earlier. This bug was reported to NoGate in March 1991 and was , xrefs: 0042E672
                                              • , xrefs: 0042E793, 0042E79F
                                              • error [%s]: start of central directory not found; zipfile corrupt.%s, xrefs: 0042EAB9
                                              • error [%s]: NULL central directory offset (attempting to process anyway), xrefs: 0042E726
                                              • error [%s]: zipfile is part of multi-disk archive (sorry, not yet supported)., xrefs: 0042E6F0
                                              • Zipfile is part of a multi-disk archive, and this is not the disk on which the central zipfile directory begins., xrefs: 0042E6CF
                                              • error [%s]: reported length of central directory is %ld bytes too long (Atari STZIP zipfile? J.H.Holm ZIPSPLIT 1.1 zipfile?). Compensating..., xrefs: 0042E9C2
                                              • warning [%s]: zipfile is empty, xrefs: 0042E7B4
                                              • error [%s]: missing %ld bytes in zipfile (attempting to process anyway), xrefs: 0042E6A3
                                              • %s: can't find zipfile directory in %s, %sand can't find %s, period., xrefs: 0042EB0E
                                              • zipinfo, xrefs: 0042EB26, 0042EB33
                                              • warning [%s]: extra %ld bytes at beginning or within zipfile (attempting to process anyway), xrefs: 0042E758
                                              • note: %s may be an executable, not an archive, xrefs: 0042E608
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _fprintf$__locking$__close_strncmp$_malloc$_printf
                                              • String ID: $ Warning: zipfile claims to be second disk of a two-part archive; attempting to process anyway. If no further errors occur, this archive was probably created by PAK v2.51 or earlier. This bug was reported to NoGate in March 1991 and was $ Zipfile is part of a multi-disk archive, and this is not the disk on which the central zipfile directory begins.$error [%s]: zipfile is part of multi-disk archive (sorry, not yet supported).$%s: can't find either %s or %s, so there.$%s: can't find zipfile directory in %s, %sand can't find %s, period.$%sEmpty zipfile.$error [%s]: NULL central directory offset (attempting to process anyway)$error [%s]: missing %ld bytes in zipfile (attempting to process anyway)$error [%s]: reported length of central directory is %ld bytes too long (Atari STZIP zipfile? J.H.Holm ZIPSPLIT 1.1 zipfile?). Compensating...$error [%s]: start of central directory not found; zipfile corrupt.%s$note: %s may be an executable, not an archive$unzip$warning [%s]: extra %ld bytes at beginning or within zipfile (attempting to process anyway)$warning [%s]: zipfile is empty$zipinfo
                                              • API String ID: 482896368-4048806653
                                              • Opcode ID: 2073a6db50cbfe291eb357363d157dce9144e1d9ac85e737401658ab91b92204
                                              • Instruction ID: a788feae371d4ed795b9341df653e05f5699930aa097c3bfb151e1727980cc8a
                                              • Opcode Fuzzy Hash: 2073a6db50cbfe291eb357363d157dce9144e1d9ac85e737401658ab91b92204
                                              • Instruction Fuzzy Hash: CFE1FAB2B00120ABF720AB66FD06B393765E714718F94083FF901D63A1E6BD9851979F
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2334 40a575-40a670 call 435791 call 411530 call 401071 * 2 call 4114d2 call 40183a call 40f5cc call 401071 call 401000 * 2 2355 40a672-40a6ad call 401071 call 41034d call 40f5cc call 401071 2334->2355 2356 40a6af-40a6e6 call 401071 call 41034d call 40f5cc call 401071 2334->2356 2373 40a6ea-40a711 call 41034d call 40f5cc call 40105b 2355->2373 2356->2373 2380 40a717-40a71d 2373->2380 2381 40b018-40b025 call 410a1e 2373->2381 2380->2381 2383 40a723-40a730 call 410a1e 2380->2383 2386 40b0a2 2381->2386 2387 40b027-40b09d call 410409 call 40fada call 40fca5 call 413d44 call 41340d call 413c6b 2381->2387 2383->2381 2391 40a736-40a8bd call 418658 call 415a9e call 40f9f8 call 415a8e call 418658 call 411530 call 415a9e call 41036c call 4018a8 call 41036c call 415a8e call 40f5cc * 5 call 418658 call 40105b call 415b53 call 415d0e call 435ab2 2383->2391 2389 40b0a6-40b12e call 40f5cc * 7 call 435782 2386->2389 2387->2386 2460 40a8d3 2391->2460 2461 40a8bf-40a8d1 call 417c59 2391->2461 2463 40a8d5-40a8f2 call 416f10 call 435ab2 2460->2463 2461->2463 2469 40a8f4-40a906 call 417c59 2463->2469 2470 40a908 2463->2470 2472 40a90a-40a927 call 416f10 call 435ab2 2469->2472 2470->2472 2478 40a929-40a93b call 417c59 2472->2478 2479 40a93d 2472->2479 2481 40a93f-40a95c call 416f10 call 435ab2 2478->2481 2479->2481 2487 40a972 2481->2487 2488 40a95e-40a970 call 417c59 2481->2488 2490 40a974-40a991 call 416f10 call 435ab2 2487->2490 2488->2490 2496 40a993-40a9a5 call 417c59 2490->2496 2497 40a9a7 2490->2497 2499 40a9a9-40a9c6 call 416f10 call 435ab2 2496->2499 2497->2499 2505 40a9c8-40a9dd call 417a96 2499->2505 2506 40a9df 2499->2506 2508 40a9e1-40a9fe call 416f10 call 435ab2 2505->2508 2506->2508 2514 40aa00-40aa1c call 4180e8 2508->2514 2515 40aa1e 2508->2515 2516 40aa20-40aa61 call 416f10 call 416f4e * 2 call 41292f 2514->2516 2515->2516 2527 40aa63-40aa73 call 416f4e 2516->2527 2528 40aa78-40aa85 call 40e59b 2516->2528 2527->2528 2532 40afd8-40b013 call 415d0e call 40f5cc call 415d0e 2528->2532 2533 40aa8b-40aaa7 call 401071 call 40105b 2528->2533 2532->2389 2542 40ab55-40ab79 call 401071 call 41034d 2533->2542 2543 40aaad-40aaae 2533->2543 2567 40ab7f-40ab83 call 40f5cc 2542->2567 2545 40aab0-40aab1 2543->2545 2546 40ab29-40ab53 call 411530 call 41034d 2543->2546 2550 40aab3-40aab4 2545->2550 2551 40aafd-40ab27 call 401071 call 41034d 2545->2551 2546->2567 2554 40aab6-40aae4 call 401855 call 41034d 2550->2554 2555 40aae9-40aaf8 call 41034d 2550->2555 2551->2567 2554->2567 2570 40ab88-40ab93 call 40105b 2555->2570 2567->2570 2575 40ab95-40abc7 call 413d44 call 41338d 2570->2575 2576 40abdb-40ac04 call 410409 call 4018c8 2570->2576 2583 40abcc-40abd6 call 413c6b 2575->2583 2586 40ac32 2576->2586 2587 40ac06-40ac2c call 411530 call 410cb5 2576->2587 2583->2576 2588 40ac34-40ac3f 2586->2588 2587->2586 2601 40ac2e-40ac30 2587->2601 2590 40ac50-40ac52 2588->2590 2591 40ac41-40ac4b call 40f5cc 2588->2591 2595 40ac54-40ac87 call 411530 call 40fada call 40f5cc 2590->2595 2596 40ac8c-40ac97 call 40105b 2590->2596 2591->2590 2595->2596 2603 40aca9-40acf5 call 40fada * 3 call 410a1e 2596->2603 2604 40ac99-40aca8 call 40fada 2596->2604 2601->2588 2618 40acf7-40ad29 call 41036c CopyFileA call 40f5cc 2603->2618 2619 40ad2e-40adcd call 40fca5 call 411500 call 411adc call 40f5cc call 419640 call 40183a call 413d81 call 413580 call 435330 2603->2619 2604->2603 2618->2619 2641 40ae61 2619->2641 2642 40add3-40adf0 call 411500 call 410cb5 2619->2642 2644 40ae65-40ae70 2641->2644 2642->2641 2658 40adf2-40ae07 call 43c079 2642->2658 2646 40ae81-40ae8c 2644->2646 2647 40ae72-40ae7c call 40f5cc 2644->2647 2650 40ae9d-40aea8 2646->2650 2651 40ae8e-40ae98 call 40f5cc 2646->2651 2647->2646 2654 40aeb5-40aeb9 2650->2654 2655 40aeaa-40aeb0 call 40f5cc 2650->2655 2651->2650 2656 40af34-40af6d call 411500 call 409ab4 call 413d44 2654->2656 2657 40aebb-40af2f call 4136a5 call 435c2a call 40f5cc call 4136a5 call 413fd0 call 40f5cc 2654->2657 2655->2654 2675 40af72-40afd3 call 41340d call 413c6b call 40f5cc call 413c6b call 40f5cc * 2 2656->2675 2657->2656 2658->2641 2668 40ae09-40ae2f call 411530 call 410cb5 2658->2668 2668->2641 2681 40ae31-40ae5f call 411530 call 410cb5 2668->2681 2675->2532 2681->2641 2681->2644
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0040A597
                                                • Part of subcall function 00411530: __EH_prolog3.LIBCMT ref: 00411537
                                                • Part of subcall function 00411530: _memset.LIBCMT ref: 00411552
                                                • Part of subcall function 00411530: _strlen.LIBCMT ref: 00411589
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 004114D2: __EH_prolog3.LIBCMT ref: 004114D9
                                                • Part of subcall function 00415B53: KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 00415B5A
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                                • Part of subcall function 00435AB2: _malloc.LIBCMT ref: 00435ACA
                                                • Part of subcall function 004180E8: __EH_prolog3.LIBCMT ref: 004180EF
                                              • CopyFileA.KERNEL32(?,?,00000001), ref: 0040AD1D
                                              • _strlen.LIBCMT ref: 0040ADC0
                                              • _sprintf.LIBCMT ref: 0040AEDF
                                                • Part of subcall function 00411500: __EH_prolog3.LIBCMT ref: 00411507
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strlen$CallbackCopyDispatcherFileUser_malloc_memset_sprintf
                                              • String ID: $(PATH)$%ALLUSERPROFILE%$%APPDATA%\ZOC$%USERPROFILE%$%USERPROFILE%\$%ZOC%$%ZOCFILES%$.bak$Benutzerdateien$ConfigDataFolder="%s"$DefaultScriptFolder="%s"$IniKey$InstallerConfig=yes$Options$Script$SetupCreatedConfig=yes$SetupDefaultConfig="%s"$SetupForceWorkdir$SetupSubsystems="%.3s00000.%.3s00000"$SharedInstall=yes$Software\EmTec$Software\Emtec\$UserConfigFolder$Userfiles$ZOC Dateien$ZOC Files$ZOC5$admin.ini
                                              • API String ID: 71786742-4181063893
                                              • Opcode ID: a7cce879f70d97694e493b1a54721bac3fc74107b13e623e44bcb2702371d857
                                              • Instruction ID: 007c155dc701a5049109458118ed7e2f1e2c093a70a2f0b9d7569d682bff6e45
                                              • Opcode Fuzzy Hash: a7cce879f70d97694e493b1a54721bac3fc74107b13e623e44bcb2702371d857
                                              • Instruction Fuzzy Hash: 9C628730900249EEDF15EBA5CC55BEE77B4AF14308F1040AEE549771D2EBB81B88DB69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004123AC
                                              • _memset.LIBCMT ref: 004123D0
                                              • _memset.LIBCMT ref: 004123EB
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              • RegOpenKeyExA.KERNEL32(80000001,?,00000000,00020019,?,?,?,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,000004E4), ref: 004126F6
                                              • RegQueryValueExA.KERNEL32(?,?,00000000,?,00000400,00000400,?,?,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,000004E4), ref: 0041271A
                                              • RegCloseKey.KERNEL32(?,?,?,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,000004E4,?,?,?,?,?,00000180), ref: 00412726
                                              • ExpandEnvironmentStringsA.KERNEL32(?,?,00000400,?,?,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,000004E4,?,?,?,?,?,00000180), ref: 00412741
                                              • _strlen.LIBCMT ref: 0041274E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3_memset_strlen$CloseEnvironmentExpandOpenQueryStringsValue
                                              • String ID: .\osys_win32.cpp$AppData$Common AppData$Common Documents$Common Programs$Common Startup$Desktop$FALSE$GetSystemPath $My Pictures$Personal$ProgramFilesDir$Programs$SendTo$Software\Microsoft\Windows\CurrentVersion$Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders$Startup$rc==ERROR_SUCCESS
                                              • API String ID: 2108205713-3974988360
                                              • Opcode ID: bc3437872324f348121421e496166c824316f3774ac5d3a80130687ea5dd406a
                                              • Instruction ID: 6db50fa2c725bc0ca0d9b0a6dff28d61342c241ad251f58bc63be78fbc0b1e5f
                                              • Opcode Fuzzy Hash: bc3437872324f348121421e496166c824316f3774ac5d3a80130687ea5dd406a
                                              • Instruction Fuzzy Hash: 6ED1727480115CEECB14EB91CD55FEEBB78AF15304F5040ABE949B3182DBB81B88DB65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00409AC2
                                              • RegCreateKeyA.ADVAPI32(80000001,Software\Enterprise Alternatives\REXX\ExecOptions,?), ref: 00409F11
                                              • RegSetValueExA.KERNEL32(00000004,GlobalSCBs,00000000,00000004,?,00000004), ref: 00409F28
                                              • RegCloseKey.ADVAPI32(?), ref: 00409F31
                                                • Part of subcall function 00411530: __EH_prolog3.LIBCMT ref: 00411537
                                                • Part of subcall function 00411530: _memset.LIBCMT ref: 00411552
                                                • Part of subcall function 00411530: _strlen.LIBCMT ref: 00411589
                                                • Part of subcall function 004121F3: __EH_prolog3_GS.LIBCMT ref: 004121FA
                                                • Part of subcall function 004116AF: __EH_prolog3.LIBCMT ref: 004116BA
                                                • Part of subcall function 004116AF: _memset.LIBCMT ref: 004116D5
                                                • Part of subcall function 004116AF: _strlen.LIBCMT ref: 004116EA
                                                • Part of subcall function 004116AF: _strlen.LIBCMT ref: 004116FF
                                                • Part of subcall function 004118F2: __fread_nolock.LIBCMT ref: 004119BA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3_strlen$_memset$CloseCreateH_prolog3_Value__fread_nolock
                                              • String ID: *.*$Colortable.cfg$Colortable.ini$GlobalSCBs$Options$OptionsV4.bak$PHONEBK$Path="$Path="%ZOCFILES%$Script$Software\Enterprise Alternatives\REXX\ExecOptions$ZOCHOSTS.INI$ZocHosts.ini$script="$script="%ZOCFILES%$standard.cfg$zochosts.ini
                                              • API String ID: 4233208407-1996282527
                                              • Opcode ID: a980a060cd16fc338855aca332d4a3d56e514f8ba3601a4d8d0e6948f65ca49f
                                              • Instruction ID: 7315bcbf21e9175190a5d36dfad0cf26e73548311e56c0950ad569a6d9180a70
                                              • Opcode Fuzzy Hash: a980a060cd16fc338855aca332d4a3d56e514f8ba3601a4d8d0e6948f65ca49f
                                              • Instruction Fuzzy Hash: F9D16570800289EEDF15EFA1CD45BDD7B749F15308F1040ABB90A721D3EB785B98DAA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2953 431684-4316b4 2954 4316ba-4316c9 2953->2954 2955 43185e-431861 2953->2955 2956 4316cb-4316d3 2954->2956 2957 4316da-4316e0 call 4314fa 2954->2957 2958 431863-4318a0 call 436c10 call 437ed0 * 2 2955->2958 2959 4318a5-4318a8 2955->2959 2956->2956 2962 4316d5 2956->2962 2967 4316e5-4316e8 2957->2967 3005 431c4e-431c65 call 435782 2958->3005 2960 43196b-43196e 2959->2960 2961 4318ae-4318b9 2959->2961 2968 431974-431991 call 437fad 2960->2968 2969 431aec-431af0 2960->2969 2966 431911-431915 2961->2966 2962->2957 2974 431917-431920 2966->2974 2975 4318bb-4318d2 2966->2975 2976 4316ea-4316f4 2967->2976 2977 43170d-431719 call 43154f 2967->2977 2994 431993-431995 2968->2994 2995 43199a-4319a8 call 437fad 2968->2995 2971 431af6-431af8 2969->2971 2972 431c1d-431c20 2969->2972 2979 431afa 2971->2979 2980 431b08-431b16 call 435330 2971->2980 2988 431c22-431c28 2972->2988 2989 431c4b 2972->2989 2983 431922-431928 call 4314fa 2974->2983 2984 431941-43194d 2974->2984 2985 4318d4-43190e call 43b677 call 43a91c call 43b677 call 43bd9d 2975->2985 2986 43190f 2975->2986 2987 431701-431709 2976->2987 3004 43171a-43172d 2977->3004 2996 431afc-431b03 2979->2996 2992 431857-431859 2980->2992 3019 431b1c-431b30 call 437b68 2980->3019 3007 43192d-431930 2983->3007 3003 43195a-431962 2984->3003 2985->2986 2986->2966 2990 4316f6-4316ff 2987->2990 2991 43170b 2987->2991 2988->2992 2993 431c2e-431c46 call 437ed0 2988->2993 3000 431c4d 2989->3000 2990->2987 2991->3004 2992->3005 2993->2992 2994->3000 3025 4319aa-4319b8 call 437ed0 2995->3025 3026 4319be-4319c7 2995->3026 2996->3005 3000->3005 3008 431964-431966 3003->3008 3009 43194f-431958 3003->3009 3015 431731-431745 call 436d80 3004->3015 3016 43172f 3004->3016 3007->2984 3020 431932-43193f call 43154f 3007->3020 3008->3005 3009->3003 3036 431805-431812 3015->3036 3037 43174b-431752 3015->3037 3016->3015 3038 431b32-431b36 3019->3038 3039 431b3f-431b49 3019->3039 3020->3008 3025->3026 3033 431a74-431a7b 3026->3033 3034 4319cd-4319d4 3026->3034 3040 431a80-431a82 3033->3040 3041 431a7d-431a7e 3033->3041 3043 4319d6-4319da 3034->3043 3044 4319e8-4319ef 3034->3044 3051 431826-431828 3036->3051 3052 431814-431824 3036->3052 3053 431784-431786 3037->3053 3054 431754 3037->3054 3038->3039 3055 431b38 3038->3055 3056 431b57-431b5b 3039->3056 3057 431b4b-431b56 3039->3057 3049 431a84 3040->3049 3050 431a9f 3040->3050 3048 431a8a-431a9d call 436c10 3041->3048 3047 4319fc-431a17 GetFullPathNameA 3043->3047 3058 4319dc 3043->3058 3046 4319f1-4319f5 3044->3046 3044->3047 3046->3047 3061 4319f7-4319fa 3046->3061 3062 431a36 3047->3062 3063 431a19-431a31 call 43b677 call 43a91c 3047->3063 3082 431aa8-431ac6 3048->3082 3049->3048 3072 431aa5 3050->3072 3065 431788-4317b4 call 43b677 call 43a91c call 43b677 call 43bd9d 3051->3065 3066 43182e-431854 3051->3066 3064 4317d7-4317f8 call 43b677 call 43a91c call 43b677 call 43bd9d 3052->3064 3053->3065 3070 4317b6-4317c5 call 43bdf9 3053->3070 3067 431756-43177f call 437ed0 * 2 3054->3067 3055->3039 3068 431b6b-431b7a call 436d80 3056->3068 3069 431b5d-431b60 3056->3069 3057->3056 3073 4319df-4319e6 call 43b650 3058->3073 3061->3073 3075 431a39-431a56 3062->3075 3063->3005 3064->3067 3065->3067 3066->2992 3067->3005 3103 431b8b-431b92 3068->3103 3104 431b7c-431b89 3068->3104 3069->3068 3077 431b62-431b64 3069->3077 3105 4317c7-4317d2 3070->3105 3106 4317fd-431803 3070->3106 3072->3082 3073->3075 3088 431a58-431a5b 3075->3088 3089 431a6d 3075->3089 3091 431bd6-431be6 call 437fad 3077->3091 3092 431b66-431b69 3077->3092 3082->2992 3096 431acc-431adf 3082->3096 3088->3089 3100 431a5d-431a60 3088->3100 3089->3033 3118 431be8-431bea 3091->3118 3119 431bec-431c03 call 436c10 3091->3119 3092->3091 3096->3096 3107 431ae1-431ae7 3096->3107 3100->3072 3111 431a62-431a6b call 431410 3100->3111 3115 431b94 3103->3115 3116 431b9c-431ba6 call 43bdf9 3103->3116 3104->3103 3114 431bd1 3104->3114 3105->3064 3106->3066 3107->2992 3111->3050 3111->3089 3114->3091 3122 431b96-431b97 3115->3122 3116->3114 3132 431ba8-431bcf call 43b677 call 43a91c call 43b677 call 43bd9d 3116->3132 3118->3122 3134 431c05-431c09 3119->3134 3135 431c0a-431c18 3119->3135 3122->2996 3132->3122 3134->3135 3135->2992
                                              APIs
                                              • _fprintf.LIBCMT ref: 0043179C
                                              • _fprintf.LIBCMT ref: 004317E0
                                              • _strcat.LIBCMT ref: 0043186A
                                              • _malloc.LIBCMT ref: 0043199B
                                                • Part of subcall function 00437FAD: __FF_MSGBANNER.LIBCMT ref: 00437FD0
                                                • Part of subcall function 00437FAD: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00442DC2,?,00000001,?,0044340E,00000018,00469F50,0000000C,0044349D,?), ref: 00438025
                                                • Part of subcall function 00437ED0: __lock.LIBCMT ref: 00437EEE
                                                • Part of subcall function 00437ED0: ___sbh_find_block.LIBCMT ref: 00437EF9
                                                • Part of subcall function 00437ED0: ___sbh_free_block.LIBCMT ref: 00437F08
                                                • Part of subcall function 00437ED0: RtlFreeHeap.NTDLL(00000000,?,00469980,0000000C,00443465,00000000,00469F50,0000000C,0044349D,?,?,?,004388FB,00000004,004699E0,0000000C), ref: 00437F38
                                                • Part of subcall function 00437ED0: GetLastError.KERNEL32(?,004388FB,00000004,004699E0,0000000C,00442E08,?,?,00000000,00000000,00000000,0043FA2F,00000001,00000214,?,00000000), ref: 00437F49
                                              • _fprintf.LIBCMT ref: 004318F1
                                                • Part of subcall function 0043BD9D: _flsall.LIBCMT ref: 0043BDB1
                                              • _malloc.LIBCMT ref: 00431984
                                              Strings
                                              • checkdir warning: current dir path too long, xrefs: 00431A19
                                              • checkdir warning: path too long; truncating %s -> %s, xrefs: 004318DB
                                              • checkdir error: path too long: %s, xrefs: 0043178E
                                              • C:/Program Files (x86)/ZOC5/zocdll.dll, xrefs: 004317C7, 00431814, 004318D6
                                              • checkdir: can't create extraction directory: %s, xrefs: 00431BA9
                                              • checkdir error: %s exists but is not directory unable to process %s., xrefs: 0043181F
                                              • checkdir error: can't create %s unable to process %s., xrefs: 004317D2
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _fprintf$Heap_malloc$AllocateErrorFreeLast___sbh_find_block___sbh_free_block__lock_flsall_strcat
                                              • String ID: C:/Program Files (x86)/ZOC5/zocdll.dll$checkdir error: %s exists but is not directory unable to process %s.$checkdir error: can't create %s unable to process %s.$checkdir error: path too long: %s$checkdir warning: path too long; truncating %s -> %s$checkdir warning: current dir path too long$checkdir: can't create extraction directory: %s
                                              • API String ID: 3750816351-2062303504
                                              • Opcode ID: 7a466d29cf8b489a9ed17ad82a267ad34c260a63cea29bd4935bfefb92a53d3c
                                              • Instruction ID: c8d797e58c38e7eb2dde99da080c9dc8acf34a939e9bfa94c7b00b58a090aa04
                                              • Opcode Fuzzy Hash: 7a466d29cf8b489a9ed17ad82a267ad34c260a63cea29bd4935bfefb92a53d3c
                                              • Instruction Fuzzy Hash: 7BF148715082419EE721AB69FC4272A3B90AB1D754F64787FE881C72B2DF7D8841CB1E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3
                                              • String ID: .\windows_win32.cpp$SB_BOTTOM==SB_RIGHT$SB_LINEDOWN==SB_LINERIGHT$SB_LINEUP==SB_LINELEFT$SB_PAGEDOWN==SB_PAGEDOWN$SB_PAGEUP==SB_PAGELEFT$SB_TOP==SB_LEFT$SysListView32$SysTabControl32$SysTreeView32$pnm->iItem==-1
                                              • API String ID: 431132790-2982637157
                                              • Opcode ID: 01df3faaebb6becbacab612baab08749489cc6e1b69bcb6605e341341b348f7c
                                              • Instruction ID: 16e92b8ad4f2a20c24b511e742783f21791574b00a9db2419f24c340b4e39c09
                                              • Opcode Fuzzy Hash: 01df3faaebb6becbacab612baab08749489cc6e1b69bcb6605e341341b348f7c
                                              • Instruction Fuzzy Hash: 9312E270600219ABDB24AF54C889FFE77B4EB04715F21020BF922962D1CB78D985CB69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004028B4
                                                • Part of subcall function 00415A9E: __EH_prolog3.LIBCMT ref: 00415AA5
                                                • Part of subcall function 00415A9E: GetWindowTextLengthA.USER32(?), ref: 00415AB7
                                                • Part of subcall function 00415A9E: GetWindowTextA.USER32(?,00000000,00000001), ref: 00415AEC
                                                • Part of subcall function 00419640: __EH_prolog3.LIBCMT ref: 00419647
                                                • Part of subcall function 0040F9F8: _strlen.LIBCMT ref: 0040FA08
                                                • Part of subcall function 0040F9F8: _strlen.LIBCMT ref: 0040FA13
                                                • Part of subcall function 0040F9F8: _strncpy.LIBCMT ref: 0040FAA9
                                                • Part of subcall function 00415A8E: SetWindowTextA.USER32(?,00000000), ref: 00415A95
                                                • Part of subcall function 0041AFFC: _memset.LIBCMT ref: 0041B01E
                                                • Part of subcall function 0041AFFC: CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 0041B02E
                                                • Part of subcall function 0041AFFC: GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041B057
                                                • Part of subcall function 0041AFFC: DeleteDC.GDI32(00000000), ref: 0041B061
                                                • Part of subcall function 0041AFFC: MulDiv.KERNEL32(?,?,00000048), ref: 0041B06F
                                                • Part of subcall function 0041AFFC: _strcat.LIBCMT ref: 0041B0BF
                                                • Part of subcall function 0041AFFC: CreateFontIndirectA.GDI32(?), ref: 0041B0CB
                                              • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00402B6C
                                              • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00402B78
                                              • SendMessageA.USER32(?,00000030,?,00000001), ref: 00402B87
                                              • SendMessageA.USER32(?,00000030,?,00000001), ref: 00402B93
                                              • SendMessageA.USER32(?,00000030,00000095,00000001), ref: 00402C7E
                                              • SendMessageA.USER32(?,00000030,?,00000001), ref: 00402CFA
                                              • DeleteObject.GDI32(?), ref: 00402D05
                                              • SendMessageA.USER32(?,00000030,?,00000001), ref: 00402D11
                                              • DeleteObject.GDI32(?), ref: 00402D16
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                                • Part of subcall function 00419FDE: __EH_prolog3.LIBCMT ref: 00419FE5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: MessageSend$H_prolog3$DeleteTextWindow$CreateObject_strlen$CapsDeviceFontIndirectLength_memset_strcat_strncpy
                                              • String ID: $PROG$Advertise$AppName$Arial$Description$Product$Teaser1$Teaser2$Url
                                              • API String ID: 1348522516-2171997948
                                              • Opcode ID: 0c87df0ea48f5f6a6a72e8e9c1f70486dabcfd04d42c342bf61be375e34ab0c4
                                              • Instruction ID: 6bcfe3759cc0d5c50ebf4acbe0531e50aeb08d2d398f67e5c8dca8057c04133c
                                              • Opcode Fuzzy Hash: 0c87df0ea48f5f6a6a72e8e9c1f70486dabcfd04d42c342bf61be375e34ab0c4
                                              • Instruction Fuzzy Hash: D2F14C30900258EEDB15EBA1CD96BEDBB74AF15308F1041AEF509772C2DB781B88DB65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3502 42d81a-42d8ac call 435791 call 437fad call 41b3fe call 435bb0 3511 42d8ae-42d8bf 3502->3511 3511->3511 3512 42d8c1-42d8ce call 435d48 3511->3512 3515 42d964-42d9f6 call 436c10 * 6 call 4107b9 call 40f5cc 3512->3515 3516 42d8d4-42d907 call 435bb0 call 436c10 3512->3516 3548 42db30-42db33 3515->3548 3516->3515 3526 42d909-42d90f 3516->3526 3528 42d928-42d92b 3526->3528 3530 42d911-42d915 3528->3530 3531 42d92d-42d939 3528->3531 3530->3531 3532 42d917-42d919 3530->3532 3531->3515 3534 42d93b-42d93f 3531->3534 3532->3531 3535 42d91b-42d921 3532->3535 3537 42d953-42d962 3534->3537 3538 42d941-42d950 call 43bdf9 3534->3538 3535->3528 3537->3515 3537->3528 3538->3537 3549 42d9fb-42da40 call 4107b9 * 2 call 40f5cc call 40f4af 3548->3549 3550 42db39 3548->3550 3581 42da42-42da53 call 40f4af 3549->3581 3582 42da69-42da76 call 430068 3549->3582 3551 42db3c-42db3f 3550->3551 3554 42db41-42db62 call 4107b9 3551->3554 3555 42db64 3551->3555 3554->3555 3557 42db67-42db6b 3554->3557 3555->3557 3560 42db79-42db7c 3557->3560 3561 42db6d-42db74 call 40f5cc 3557->3561 3565 42db82-42dbe1 call 4107b9 * 2 call 43c079 call 40f5cc * 2 3560->3565 3566 42ddb4-42ddb9 3560->3566 3561->3560 3606 42dbe7-42dc2f call 401071 call 401a26 call 401901 call 40f5cc 3565->3606 3607 42dc68-42dc6b 3565->3607 3569 42ddbb-42ddc4 call 42ee63 3566->3569 3570 42ddcd-42ddd2 3566->3570 3578 42ddc9-42ddcb 3569->3578 3574 42ddd4-42ddd7 3570->3574 3575 42ddd9-42de0b call 437ed0 call 435782 3570->3575 3574->3575 3578->3570 3581->3582 3593 42da55-42da67 call 43c079 3581->3593 3592 42da79-42da7b 3582->3592 3595 42db02-42db2b call 40f5cc call 4107b9 call 40f5cc 3592->3595 3596 42da81-42dac6 call 401071 call 401a26 call 401901 call 40f5cc 3592->3596 3593->3592 3595->3548 3623 42dad7-42daf1 call 40f93f call 435d48 3596->3623 3624 42dac8-42dad2 call 40f93f 3596->3624 3630 42dc40-42dc5a call 40f93f call 435d48 3606->3630 3631 42dc31-42dc3b call 40f93f 3606->3631 3607->3551 3636 42daf3 3623->3636 3637 42daf6-42dafd call 40f5cc 3623->3637 3624->3623 3642 42dc70-42dcc4 call 4107b9 * 2 call 40f5cc * 2 3630->3642 3643 42dc5c-42dc63 call 40f5cc 3630->3643 3631->3630 3636->3637 3637->3595 3653 42dcc6-42dceb call 4136a5 call 435c2a 3642->3653 3654 42dced-42dd5e call 4107b9 * 2 call 4136a5 call 435c2a call 40f5cc * 2 3642->3654 3643->3607 3663 42dd61-42ddaf call 40f5cc call 4136a5 GetActiveWindow call 413fd0 call 40f5cc * 2 3653->3663 3654->3663 3663->3566
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0042D83C
                                              • _malloc.LIBCMT ref: 0042D879
                                                • Part of subcall function 00437FAD: __FF_MSGBANNER.LIBCMT ref: 00437FD0
                                                • Part of subcall function 00437FAD: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00442DC2,?,00000001,?,0044340E,00000018,00469F50,0000000C,0044349D,?), ref: 00438025
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              • _memset.LIBCMT ref: 0042D8A1
                                              • _memset.LIBCMT ref: 0042D8EA
                                              • _strcat.LIBCMT ref: 0042D8F9
                                              • _strcat.LIBCMT ref: 0042D96F
                                              • _strcat.LIBCMT ref: 0042D97F
                                              • _strcat.LIBCMT ref: 0042D98B
                                              • _strcat.LIBCMT ref: 0042D999
                                              • _strcat.LIBCMT ref: 0042D9A9
                                              • _strcat.LIBCMT ref: 0042D9B7
                                              • _sprintf.LIBCMT ref: 0042DCE0
                                              • _sprintf.LIBCMT ref: 0042DD3B
                                              • GetActiveWindow.USER32 ref: 0042DD87
                                                • Part of subcall function 004136A5: __EH_prolog3_GS.LIBCMT ref: 004136AF
                                                • Part of subcall function 004136A5: LoadStringA.USER32(?,?,?,00000100), ref: 00413706
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strcat$_memset$H_prolog3_sprintf$ActiveAllocateErrorH_prolog3_HeapLastLoadStringWindow__snprintf_malloc
                                              • String ID: -qq$.\unzipper.cpp$adr$unzip
                                              • API String ID: 1331862449-3161176882
                                              • Opcode ID: af13b878ad57a950adb1b6289bc2ad1736c1a39105a2284ca57bdf05322b9c25
                                              • Instruction ID: d2b0f5b27c2b28792ef0bb0d692860312c073bd0c845c37b9a1fbbea4eeee631
                                              • Opcode Fuzzy Hash: af13b878ad57a950adb1b6289bc2ad1736c1a39105a2284ca57bdf05322b9c25
                                              • Instruction Fuzzy Hash: B202A271D00249AEDF24DFA5DC41AEEBBB4AF05318F10406FE519B31D2EB781A49CB69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __invoke_watson.LIBCMT ref: 0043D91D
                                              • __invoke_watson.LIBCMT ref: 0043D938
                                              • CreateFileA.KERNEL32(00000080,?,00000080,0000000C,00000001,00000080,00000000,00000109,00000000,00000000), ref: 0043DB21
                                              • CreateFileA.KERNEL32(00000080,7FFFFFFF,00000001,0000000C,00000001,00000080,00000000), ref: 0043DB5A
                                              • GetLastError.KERNEL32 ref: 0043DB7F
                                              • __dosmaperr.LIBCMT ref: 0043DB86
                                              • GetFileType.KERNEL32(?), ref: 0043DB9B
                                              • GetLastError.KERNEL32 ref: 0043DBC0
                                              • __dosmaperr.LIBCMT ref: 0043DBC9
                                              • CloseHandle.KERNEL32(?), ref: 0043DBD2
                                              • __chsize_nolock.LIBCMT ref: 0043DCB6
                                              • CloseHandle.KERNEL32(?), ref: 0043DE35
                                              • CreateFileA.KERNEL32(00000080,?,00000001,0000000C,00000003,00000080,00000000), ref: 0043DE52
                                              • GetLastError.KERNEL32 ref: 0043DE61
                                              • __dosmaperr.LIBCMT ref: 0043DE68
                                              • __lseeki64_nolock.LIBCMT ref: 0043DE9B
                                              • __lseeki64_nolock.LIBCMT ref: 0043DEB0
                                              • __lseeki64_nolock.LIBCMT ref: 0043DF1F
                                              • __lseeki64_nolock.LIBCMT ref: 0043DF30
                                              • __locking.LIBCMT ref: 0043DFDF
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: File__lseeki64_nolock$CreateErrorLast__dosmaperr$CloseHandle__invoke_watson$Type__chsize_nolock__locking
                                              • String ID:
                                              • API String ID: 2633173609-0
                                              • Opcode ID: d8040c86cb3a28e60c162474d9205a84b198881dd3af79134630275512dbe264
                                              • Instruction ID: 8e681b210d4972a56b21e1eb7acd70b5558bd8f129ccf8d57a887fc025425b5b
                                              • Opcode Fuzzy Hash: d8040c86cb3a28e60c162474d9205a84b198881dd3af79134630275512dbe264
                                              • Instruction Fuzzy Hash: FB222471C002099BEF259F68EC817AEBBB0EF09318F24656BE451972E1C77D8E44CB09
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00406B7C
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 0041521D: __EH_prolog3.LIBCMT ref: 0041523F
                                              • SetCurrentDirectoryA.KERNEL32(00000000,?,<self>), ref: 00406C2E
                                                • Part of subcall function 00408A2B: __EH_prolog3.LIBCMT ref: 00408A47
                                              • LoadLibraryA.KERNEL32(SETUPHOOK), ref: 00406C53
                                              • GetProcAddress.KERNEL32(00000000,SetupHook), ref: 00406C6B
                                              • GetProcAddress.KERNEL32(00000000,NewSetupHook), ref: 00406C93
                                              • FreeLibrary.KERNEL32(00000000), ref: 00406CE1
                                                • Part of subcall function 004114D2: __EH_prolog3.LIBCMT ref: 004114D9
                                                • Part of subcall function 00411793: __EH_prolog3.LIBCMT ref: 0041179A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$AddressLibraryProc$CurrentDirectoryFreeLoad_strlen
                                              • String ID: .\main.cpp$1.00$<self>$AUTODIR$NewSetupHook$ORDER$REMOVE$SETUPHOOK$SetupHook$fpSetupHook$setup
                                              • API String ID: 1123998232-1543003652
                                              • Opcode ID: 309c18d1e9187a1de4a3b385ffc00c14d983b356608c7d0228972f04a937a735
                                              • Instruction ID: e8c8bde4a98b13452dfdff08d359d4cf8d57635ee00e0135ba212ed533105224
                                              • Opcode Fuzzy Hash: 309c18d1e9187a1de4a3b385ffc00c14d983b356608c7d0228972f04a937a735
                                              • Instruction Fuzzy Hash: 86419231904258FEDB11EBE1CC46AEE7BB4AF04319F10007FF546B21D2EA785A58CA59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strcat$_strlen$H_prolog3_malloc_memset_strncpy
                                              • String ID: .1i$.\unzipper.cpp$DGE$admin$$$.ini$adr$error==FALSE$unzip
                                              • API String ID: 2404639941-3044078425
                                              • Opcode ID: 957441c5de656a85fb750a52ccfeb8806d87f0b682fa1fbbe5595e5da2277911
                                              • Instruction ID: 32aec924aa9dd4281c4c8890f05ff9182bcf5fc8e8766424d228b77d24c0e3ef
                                              • Opcode Fuzzy Hash: 957441c5de656a85fb750a52ccfeb8806d87f0b682fa1fbbe5595e5da2277911
                                              • Instruction Fuzzy Hash: 0B4126B1A00209BBEB15AB61CC42BEE7765AF54308F10443FF656B61D2DBBC1A488A5D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 4176 42ee63-42eef1 call 43d4e4 * 3 call 43c990 4185 42eef3-42eef8 4176->4185 4186 42eefa 4176->4186 4187 42eefb-42ef0d call 42f899 4185->4187 4186->4187 4190 42ef59-42ef5b 4187->4190 4191 42ef0f-42ef21 call 42f899 4187->4191 4193 42ef5c-42ef6a call 42c69c 4190->4193 4191->4190 4197 42ef23-42ef29 4191->4197 4196 42ef6f-42ef74 4193->4196 4198 42ef7a-42ef7c 4196->4198 4199 42f1fe-42f202 4196->4199 4200 42ef44-42ef57 call 42e0b8 4197->4200 4201 42ef2b-42ef42 call 438526 4197->4201 4198->4199 4202 42ef82-42ef8c 4198->4202 4200->4196 4201->4193 4201->4200 4205 42efb5-42efd4 4202->4205 4206 42ef8e-42ef92 4202->4206 4211 42efda-42efef 4205->4211 4212 42f19e 4205->4212 4209 42efa6-42efb0 4206->4209 4210 42ef94-42ef97 4206->4210 4209->4206 4216 42efb2 4209->4216 4213 42ef99 4210->4213 4214 42ef9c-42ef9f 4210->4214 4215 42f1a4-42f1cd call 437fad * 2 4211->4215 4217 42eff5 4211->4217 4212->4215 4213->4214 4214->4210 4218 42efa1 4214->4218 4234 42f1e6-42f1fd call 43b677 call 43a91c 4215->4234 4235 42f1cf-42f1d1 4215->4235 4216->4205 4220 42eff8-42effe 4217->4220 4218->4209 4222 42f004-42f014 call 435b20 4220->4222 4223 42f0d9-42f0dc 4220->4223 4222->4223 4232 42f01a-42f027 4222->4232 4224 42f15b-42f163 4223->4224 4225 42f0de-42f0ee call 435b20 4223->4225 4224->4220 4228 42f169 4224->4228 4239 42f0f0-42f0fc 4225->4239 4240 42f154 4225->4240 4228->4215 4236 42f040-42f043 4232->4236 4237 42f029-42f03e 4232->4237 4234->4199 4235->4234 4241 42f1d3-42f1df call 42eb73 4235->4241 4242 42f057-42f05f 4236->4242 4244 42f045-42f052 4236->4244 4237->4242 4245 42f129-42f133 4239->4245 4246 42f0fe-42f103 4239->4246 4240->4224 4248 42f1e4 4241->4248 4250 42f187-42f19c call 43b677 call 43a91c 4242->4250 4251 42f065-42f06b 4242->4251 4244->4242 4254 42f139-42f152 4245->4254 4252 42f105-42f10b 4246->4252 4253 42f10d-42f110 4246->4253 4248->4199 4250->4215 4257 42f092-42f0a6 call 43b677 call 43a91c 4251->4257 4258 42f06d-42f08a call 431684 4251->4258 4252->4245 4252->4253 4253->4254 4259 42f112-42f127 4253->4259 4254->4224 4269 42f0a7-42f0af 4257->4269 4258->4199 4267 42f090 4258->4267 4259->4254 4267->4269 4269->4224 4271 42f0b5-42f0b7 4269->4271 4272 42f16b-42f185 4271->4272 4273 42f0bd-42f0d4 4271->4273 4272->4215 4273->4224
                                              APIs
                                              • _signal.LIBCMT ref: 0042EEC9
                                                • Part of subcall function 0043D4E4: __malloc_crt.LIBCMT ref: 0043D56D
                                                • Part of subcall function 0043D4E4: _siglookup.LIBCMT ref: 0043D593
                                              • _signal.LIBCMT ref: 0042EED1
                                                • Part of subcall function 0043D4E4: __lock.LIBCMT ref: 0043D5D8
                                                • Part of subcall function 0043D4E4: SetConsoleCtrlHandler.KERNEL32(0043D408,00000001,00469C28,00000010,0042EECE,00000002,0042F3DD), ref: 0043D5FB
                                              • _signal.LIBCMT ref: 0042EED9
                                                • Part of subcall function 0043D4E4: GetLastError.KERNEL32 ref: 0043D617
                                              • _strrchr.LIBCMT ref: 0042EEE5
                                              • _strncmp.LIBCMT ref: 0042EF38
                                              • _fprintf.LIBCMT ref: 0042F0A0
                                              • _fprintf.LIBCMT ref: 0042F195
                                              • _malloc.LIBCMT ref: 0042F1A9
                                              • _malloc.LIBCMT ref: 0042F1BA
                                              • _fprintf.LIBCMT ref: 0042F1F4
                                              Strings
                                              • caution: not extracting; -d ignored, xrefs: 0042F092
                                              • error: can't allocate unzip buffers, xrefs: 0042F1E6
                                              • error: must specify directory to which to extract with -d option, xrefs: 0042F187
                                              • zipinfo, xrefs: 0042EEFD
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _fprintf_signal$_malloc$ConsoleCtrlErrorHandlerLast__lock__malloc_crt_siglookup_strncmp_strrchr
                                              • String ID: caution: not extracting; -d ignored$error: can't allocate unzip buffers$error: must specify directory to which to extract with -d option$zipinfo
                                              • API String ID: 260867003-1707212946
                                              • Opcode ID: 8101a4e038595a8e9cc9da8e5d87a5cb9226bdafc190ef794c413989a87484cb
                                              • Instruction ID: 4c2d0009dc099c0dc5bc90f541f4d195f47c623783734b31cd90596527ce5627
                                              • Opcode Fuzzy Hash: 8101a4e038595a8e9cc9da8e5d87a5cb9226bdafc190ef794c413989a87484cb
                                              • Instruction Fuzzy Hash: 08A1A1B1E04210EFEB20DF25ED916697BB0FB04358BE4443FE5498B261E7789854CB4E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00401B35
                                                • Part of subcall function 00419640: __EH_prolog3.LIBCMT ref: 00419647
                                              • LoadIconA.USER32(?,?), ref: 00401BDD
                                              • SendMessageA.USER32(?,00000170,?,00000000), ref: 00401C0D
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                                • Part of subcall function 00413E1C: __EH_prolog3.LIBCMT ref: 00413E23
                                                • Part of subcall function 00413E1C: MessageBoxA.USER32(?,?,?,00010040), ref: 00413EC4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$Message$IconLoadSend
                                              • String ID: AppName$AppVersion$DisplayVersion$IdIcon$IniKey$ShowOnly=$Software\Microsoft\Windows\CurrentVersion\Uninstall\$UninstallPath$WelcomeMsg$WelcomeWarning
                                              • API String ID: 831752224-2724193708
                                              • Opcode ID: df62f5ab7ebbfb7d53c8abcd936854994903d512c62255d430043d4503c4fe13
                                              • Instruction ID: 34ff89323dce27f664638b238515818973703aab81bcf003097b097a6ad95923
                                              • Opcode Fuzzy Hash: df62f5ab7ebbfb7d53c8abcd936854994903d512c62255d430043d4503c4fe13
                                              • Instruction Fuzzy Hash: D322A231500288EEDF05EFA5C995BDD7BA4AF14308F14407FF909A72D2DB789A88CB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e03be929b5d5a9e371779c1354725785aa455f7a6c2e0fbf340785b18a907974
                                              • Instruction ID: d5fec7be551cc96bc293c832a5d02dff1b7bb159eba3024a327cd5f8782dcf68
                                              • Opcode Fuzzy Hash: e03be929b5d5a9e371779c1354725785aa455f7a6c2e0fbf340785b18a907974
                                              • Instruction Fuzzy Hash: 9B1205709043859FDB218F68C8C47BABBF0BF0A304F14659FE462A7392D7799841CB5A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              • End-of-central-directory signature not found. Either this file is not a zipfile, or it constitutes one disk of a multi-part archive. In the latter case the central directory and zipfile comment will be found on the last disk(s) of this archive., xrefs: 0042FCD9
                                              • [%s], xrefs: 0042FCC3
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __locking$_fprintf_strncpy$_strncmp
                                              • String ID: End-of-central-directory signature not found. Either this file is not a zipfile, or it constitutes one disk of a multi-part archive. In the latter case the central directory and zipfile comment will be found on the last disk(s) of this archive.$[%s]
                                              • API String ID: 412722063-500558242
                                              • Opcode ID: 31b314e144904c50220397e85762526db0884c6962cb05372dea83a1738b7501
                                              • Instruction ID: f544aa839883e0c3ce1e639c4db42a4baef456d43b9c75a2e4656c0257978362
                                              • Opcode Fuzzy Hash: 31b314e144904c50220397e85762526db0884c6962cb05372dea83a1738b7501
                                              • Instruction Fuzzy Hash: 6381D672A00215AFE710EF65FC85E1A37B4F714718F94083FE50192261E6ACD8159B9F
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CreateFileA.KERNEL32(C:/Program Files (x86)/ZOC5/zocdll.dll,40000000,00000000,00000000,00000003,00000080,00000000,C:/Program Files (x86)/ZOC5/zocdll.dll,00008000,-001FD774,00000003,00430F6C,0028A470,0048A840,00000000), ref: 00431389
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0042EA9E), ref: 00431396
                                              • _fprintf.LIBCMT ref: 004313AB
                                              • SetFileAttributesA.KERNEL32(C:/Program Files (x86)/ZOC5/zocdll.dll,00000020,?,?,?,?,?,?,?,?,?,?,?,0042EA9E), ref: 004313E4
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,0042EA9E,?,?,?,?,?,00000000), ref: 004313F0
                                              • _fprintf.LIBCMT ref: 00431405
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ErrorFileLast_fprintf$AttributesCreate
                                              • String ID: CreateFile error %d when trying set file time$warning (%d): could not set file attributes$C:/Program Files (x86)/ZOC5/zocdll.dll
                                              • API String ID: 2104769620-120512618
                                              • Opcode ID: ad61ad5d791f19e2f3d679cfb2a535000703b2f1eae252de4471ca324d1cbe7d
                                              • Instruction ID: e64aa020561fe7ccdf9ce283c7363267b77e2e95360494611876f853f49e9ced
                                              • Opcode Fuzzy Hash: ad61ad5d791f19e2f3d679cfb2a535000703b2f1eae252de4471ca324d1cbe7d
                                              • Instruction Fuzzy Hash: 3811E7B2900300BBE7106776BC0EE5B3B6CEB89715F10153BF911D61B2E778CA54866E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041523F
                                              • LoadLibraryA.KERNEL32(00000000,000004E4,?,000000FF,?,?,00000000), ref: 0041546E
                                              • _sprintf.LIBCMT ref: 004154B5
                                              • MessageBoxA.USER32(00000000,00000000,EmTec Application,00000010), ref: 004154D2
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$LibraryLoadMessage_sprintf_strlen
                                              • String ID: DLL not found:%s$EmTec Application$english.dll$french.dll$german.dll$hungarian.dll
                                              • API String ID: 3044484357-2825539391
                                              • Opcode ID: 7facaacf8897e9dcaa5e2f84fbc5dce7ed0496547414fb29263d5ae84b56bb82
                                              • Instruction ID: caee6c0818efe8c79d9e7f05dd004153da4021b7e6c5c3daa0d2e77bb3257f0e
                                              • Opcode Fuzzy Hash: 7facaacf8897e9dcaa5e2f84fbc5dce7ed0496547414fb29263d5ae84b56bb82
                                              • Instruction Fuzzy Hash: 7091627190025CEEDB14EBA5CC55BDDBBB4AF14304F14406FE409A72D2EB785B88CB99
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strcat$_strrchr$_fprintf_malloc_strncpy
                                              • String ID: setup.fil$warning: can't allocate wildcard buffers
                                              • API String ID: 786024269-1425694948
                                              • Opcode ID: dda1e4e3a06c0037d19c95b80a85899eff6ed4aa450ff7646fb03de6c61145e4
                                              • Instruction ID: 18ac241aa0d7ea889e3a1dd735a7e58231b9b450c1dc438301554538f913c340
                                              • Opcode Fuzzy Hash: dda1e4e3a06c0037d19c95b80a85899eff6ed4aa450ff7646fb03de6c61145e4
                                              • Instruction Fuzzy Hash: B041D675A40502ABD7205FA5BC81A1E3799F71D318FA02EBFF40593271EF39A8418B5D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004025E5
                                                • Part of subcall function 004136A5: __EH_prolog3_GS.LIBCMT ref: 004136AF
                                                • Part of subcall function 004136A5: LoadStringA.USER32(?,?,?,00000100), ref: 00413706
                                                • Part of subcall function 0040FD54: __fread_nolock.LIBCMT ref: 0040FE13
                                              • SendMessageA.USER32(?,000000B1,00000000,00000001), ref: 00402800
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$H_prolog3_LoadMessageSendString__fread_nolock_strlen
                                              • String ID: $PROGRAM$AppName$AppVersion$LICENSE.TXT$LICENSEFR.TXT$LIZENZ.TXT$pGE
                                              • API String ID: 2466698719-672165625
                                              • Opcode ID: 35dd1014dd1343a6626b53a4b0ce40fa464973a44094ac7941f290fc375fcb94
                                              • Instruction ID: 54cd47cb418e1c3dc02692ebe4f2bb76fd78c876bf86f448694d473ef40962ba
                                              • Opcode Fuzzy Hash: 35dd1014dd1343a6626b53a4b0ce40fa464973a44094ac7941f290fc375fcb94
                                              • Instruction Fuzzy Hash: 9B71B031D00248AADB10EBA5CD96ADD7B78AF55308F24407FF4057B1D2EB785A8CC769
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00402E0F
                                              • GetSysColor.USER32 ref: 00402E1D
                                              • #8.COMCTL32(00000816,00000000,000000FF,00000001,?,?,?,?,?,0000000F,00000060), ref: 00402E3A
                                                • Part of subcall function 00415A9E: __EH_prolog3.LIBCMT ref: 00415AA5
                                                • Part of subcall function 00415A9E: GetWindowTextLengthA.USER32(?), ref: 00415AB7
                                                • Part of subcall function 00415A9E: GetWindowTextA.USER32(?,00000000,00000001), ref: 00415AEC
                                                • Part of subcall function 00419640: __EH_prolog3.LIBCMT ref: 00419647
                                                • Part of subcall function 0040F9F8: _strlen.LIBCMT ref: 0040FA08
                                                • Part of subcall function 0040F9F8: _strlen.LIBCMT ref: 0040FA13
                                                • Part of subcall function 0040F9F8: _strncpy.LIBCMT ref: 0040FAA9
                                                • Part of subcall function 00415A8E: SetWindowTextA.USER32(?,00000000), ref: 00415A95
                                                • Part of subcall function 00418658: GetDlgItem.USER32(?,?), ref: 00418670
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                              • GetWindowLongA.USER32(?,000000F0), ref: 00402EFD
                                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00402F0F
                                              • SendMessageA.USER32(?,00000172,00000000,?), ref: 00402F22
                                                • Part of subcall function 0040E59B: KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,00000000), ref: 0040E5D8
                                                • Part of subcall function 0040E59B: IsDialogMessageA.USER32(?,?), ref: 0040E5F1
                                                • Part of subcall function 0040E59B: TranslateMessage.USER32(?), ref: 0040E60A
                                                • Part of subcall function 0040E59B: DispatchMessageA.USER32(?), ref: 0040E614
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Window$H_prolog3Message$Text$Long_strlen$CallbackColorDialogDispatchDispatcherItemLengthSendTranslateUser_strncpy
                                              • String ID: $PROG$AppName$FinishMsg
                                              • API String ID: 2718829098-2729695692
                                              • Opcode ID: 14aca872e501e2063403c2fe2db6b65d2236df510477297815c4dfcd245777c7
                                              • Instruction ID: dd115fd670843b040f317d0be7bcd77409c6acb632aca4a462e1d58c627aecca
                                              • Opcode Fuzzy Hash: 14aca872e501e2063403c2fe2db6b65d2236df510477297815c4dfcd245777c7
                                              • Instruction Fuzzy Hash: A0418D31900248EFDB01EFA4CC55BED7B74AF58318F10816AF9156B2E2DB785A84CB68
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041858D
                                              • IsWindow.USER32(?), ref: 004185CA
                                              • CreateWindowExA.USER32(?,?,?,?,?,?,00000000,00000000,?,?,00000000,00000000), ref: 00418601
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 0041863F
                                              • SendMessageA.USER32(?,00000030,00000000,00000000), ref: 0041864C
                                              Strings
                                              • CONTROL::CONTROL %d, xrefs: 004185D1
                                              • .\wincontrols_win32.cpp, xrefs: 0041860F
                                              • CONTROL::CONTROL %08x, %d, %s, %s, %x, %x, xrefs: 004185BA
                                              • this->hWnd, xrefs: 00418614
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3MessageSendWindow$CreateErrorLast__snprintf_memset
                                              • String ID: .\wincontrols_win32.cpp$CONTROL::CONTROL %08x, %d, %s, %s, %x, %x$CONTROL::CONTROL %d$this->hWnd
                                              • API String ID: 3039607043-3666184733
                                              • Opcode ID: e51b4bc71262457816b80ba3681f367c1ffd1169e973fee25f46f8f0158dd32b
                                              • Instruction ID: bfb03d9ba6dc6b579895633e7b42553cd21b1fa58aaa631bcac9200ef742379b
                                              • Opcode Fuzzy Hash: e51b4bc71262457816b80ba3681f367c1ffd1169e973fee25f46f8f0158dd32b
                                              • Instruction Fuzzy Hash: 9D216DB110020CFFDF126F90CC42EEE3B69FF48759F14401AFD1866262C77999A09BA8
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              • STRINGARRAY::Load %s (%d bytes), xrefs: 004193B2
                                              • STRINGARRAY::Load returns %d, %s, xrefs: 004195AC
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _fgets_memset_strlen$H_prolog3__fsopen
                                              • String ID: STRINGARRAY::Load %s (%d bytes)$STRINGARRAY::Load returns %d, %s
                                              • API String ID: 2336206254-3875633859
                                              • Opcode ID: 43de06a475613c8e072310ed28bb711f99a251f2799ff6c037a94bc3d39d8a9e
                                              • Instruction ID: c88afed420bd98e741b6f5d0c50e692a235cae4ce1e4e6f562f32ceb3fdd75bb
                                              • Opcode Fuzzy Hash: 43de06a475613c8e072310ed28bb711f99a251f2799ff6c037a94bc3d39d8a9e
                                              • Instruction Fuzzy Hash: FE815E7180424DAEDF11EF95CC55AEEBB78BF04308F14416FE915A3282EB385B49CB69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0040E945
                                                • Part of subcall function 00418658: GetDlgItem.USER32(?,?), ref: 00418670
                                                • Part of subcall function 00415A8E: SetWindowTextA.USER32(?,00000000), ref: 00415A95
                                              • SendMessageA.USER32(?,00000030,00000000,00000001), ref: 0040E9C8
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                              • SendMessageA.USER32(?,00000030,00000000,00000001), ref: 0040EA02
                                              • GetWindowLongA.USER32(?,000000F0), ref: 0040EACD
                                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 0040EAE6
                                                • Part of subcall function 0041AFFC: _memset.LIBCMT ref: 0041B01E
                                                • Part of subcall function 0041AFFC: CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 0041B02E
                                                • Part of subcall function 0041AFFC: GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041B057
                                                • Part of subcall function 0041AFFC: DeleteDC.GDI32(00000000), ref: 0041B061
                                                • Part of subcall function 0041AFFC: MulDiv.KERNEL32(?,?,00000048), ref: 0041B06F
                                                • Part of subcall function 0041AFFC: _strcat.LIBCMT ref: 0041B0BF
                                                • Part of subcall function 0041AFFC: CreateFontIndirectA.GDI32(?), ref: 0041B0CB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Window$CreateH_prolog3LongMessageSend$CapsDeleteDeviceFontIndirectItemText_memset_strcat
                                              • String ID: .\setupdialog.cpp$Arial$this->pSubDlg
                                              • API String ID: 507083552-2553413345
                                              • Opcode ID: 3b1c11b8771c1552004c54d56913645068d0359fb264b7425f502cac77ced9dc
                                              • Instruction ID: b32403f3f6014818c1e2370725d451914b7d4ab88d46bb359e13a3ff4ba19f29
                                              • Opcode Fuzzy Hash: 3b1c11b8771c1552004c54d56913645068d0359fb264b7425f502cac77ced9dc
                                              • Instruction Fuzzy Hash: E751BF70900648EBEB15EBA5CC86FEEBBB1BF54308F24451EF425272D2DB781A55CB08
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0040B13D
                                                • Part of subcall function 00415A9E: __EH_prolog3.LIBCMT ref: 00415AA5
                                                • Part of subcall function 00415A9E: GetWindowTextLengthA.USER32(?), ref: 00415AB7
                                                • Part of subcall function 00415A9E: GetWindowTextA.USER32(?,00000000,00000001), ref: 00415AEC
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                                • Part of subcall function 00411530: __EH_prolog3.LIBCMT ref: 00411537
                                                • Part of subcall function 00411530: _memset.LIBCMT ref: 00411552
                                                • Part of subcall function 00411530: _strlen.LIBCMT ref: 00411589
                                                • Part of subcall function 004116AF: __EH_prolog3.LIBCMT ref: 004116BA
                                                • Part of subcall function 004116AF: _memset.LIBCMT ref: 004116D5
                                                • Part of subcall function 004116AF: _strlen.LIBCMT ref: 004116EA
                                                • Part of subcall function 004116AF: _strlen.LIBCMT ref: 004116FF
                                                • Part of subcall function 00402F64: __EH_prolog3.LIBCMT ref: 00402F6B
                                                • Part of subcall function 00410E95: __EH_prolog3.LIBCMT ref: 00410E9C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strlen$TextWindow_memset$Length
                                              • String ID: admin.ini$admin.ini.bak$options$phonebk$standard.cfg$standard.zoc$zoc.exe
                                              • API String ID: 773487468-3981018562
                                              • Opcode ID: eb46cc07b069481cb8a1f6ddd389c194247f7f4ed6f9e4aa51eb6367e72fdf5a
                                              • Instruction ID: ce1fb0557bdbb7dc8e251ddc77d285dacf2b9803592dbffd902ef7ade15c1e18
                                              • Opcode Fuzzy Hash: eb46cc07b069481cb8a1f6ddd389c194247f7f4ed6f9e4aa51eb6367e72fdf5a
                                              • Instruction Fuzzy Hash: E0516230814299EADF15EBA1DD09BDD7760AF14308F1080AEF90A721C2DB7C5B48DB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00416CD2
                                              • CreateDialogParamA.USER32(?,?,?,Function_00016AAE), ref: 00416D13
                                              • GetWindowLongA.USER32(?,000000F0), ref: 00416D66
                                              • GetWindowLongA.USER32(?,000000F4), ref: 00416DA3
                                              • SetWindowLongA.USER32(?,000000F4,?), ref: 00416DAF
                                              • GetWindowLongA.USER32(?,000000F4), ref: 00416DBA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: LongWindow$CreateDialogH_prolog3Param
                                              • String ID: .\windows_win32.cpp$this->hWnd
                                              • API String ID: 297077043-3646067943
                                              • Opcode ID: 9dbf0b744e162af840913ba6ff93459948ec2e821aabb19e05bdf269fda12992
                                              • Instruction ID: a49eb8f7bcde1c9b398493ab274794857bd83e1a26a050c027d0c700141b2ea4
                                              • Opcode Fuzzy Hash: 9dbf0b744e162af840913ba6ff93459948ec2e821aabb19e05bdf269fda12992
                                              • Instruction Fuzzy Hash: D721A270604208EFDB10EF65CD42FDDBBA4AF14718F10811EF869672E2DB799A548B68
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041556B
                                                • Part of subcall function 00414B50: LoadLibraryW.KERNEL32(kernel32), ref: 00414B5D
                                                • Part of subcall function 00414B50: GetProcAddress.KERNEL32(00000000,HeapSetInformation), ref: 00414B70
                                                • Part of subcall function 00414B50: GetProcessHeap.KERNEL32(00000000,?,00000004), ref: 00414B8A
                                                • Part of subcall function 00414B50: FreeLibrary.KERNEL32(00000000), ref: 00414B96
                                                • Part of subcall function 00415521: _malloc.LIBCMT ref: 0041554D
                                                • Part of subcall function 00415521: SetUnhandledExceptionFilter.KERNEL32(00414BB3,00415596,00000000,00000000,00000018,004156E5,00000000,?,?,?,00000000), ref: 0041555D
                                                • Part of subcall function 00414B31: InitCommonControlsEx.COMCTL32(?), ref: 00414B48
                                                • Part of subcall function 0043C7BD: __lock.LIBCMT ref: 0043C7CB
                                                • Part of subcall function 0043C7BD: __putenv_helper.LIBCMT ref: 0043C7DA
                                                • Part of subcall function 00418355: __aulldiv.LIBCMT ref: 00418377
                                                • Part of subcall function 00418355: __aulldiv.LIBCMT ref: 00418384
                                              • GetCurrentThreadId.KERNEL32 ref: 004155AD
                                              • GetThreadLocale.KERNEL32(00000018,004156E5,00000000,?,?,?,00000000), ref: 004155C6
                                                • Part of subcall function 00414341: __EH_prolog3.LIBCMT ref: 00414363
                                                • Part of subcall function 00414341: GetCurrentThreadId.KERNEL32 ref: 00414386
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              • FreeLibrary.KERNEL32(00000000), ref: 0041561C
                                              • FreeLibrary.KERNEL32(10000000), ref: 00415636
                                              Strings
                                              • pfnAppMain, xrefs: 004155EA
                                              • EMTECAPP instance=%08x gMainThreadId= %08x, xrefs: 004155B9
                                              • .\emtec_win32.cpp, xrefs: 004155E5
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Library$FreeH_prolog3Thread$Current__aulldiv$AddressCommonControlsErrorExceptionFilterHeapInitLastLoadLocaleProcProcessUnhandled__lock__putenv_helper__snprintf_malloc_memset
                                              • String ID: .\emtec_win32.cpp$EMTECAPP instance=%08x gMainThreadId= %08x$pfnAppMain
                                              • API String ID: 234219793-1724602731
                                              • Opcode ID: 40c3708ad4fc6a225fae895fc3ab7424863eeba68b93c117ec1d513506cd3cb1
                                              • Instruction ID: 379517ac88fc450d4aa335f4aad9d258f321ab61482eb10b10ea367b35ec3128
                                              • Opcode Fuzzy Hash: 40c3708ad4fc6a225fae895fc3ab7424863eeba68b93c117ec1d513506cd3cb1
                                              • Instruction Fuzzy Hash: 3521D3F0502618EBDB01BF62DC069DE7724EF44709B14442BF918A6163CB7C99D08BEC
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00409F66
                                                • Part of subcall function 00413D44: __EH_prolog3.LIBCMT ref: 00413D4B
                                              • RemoveDirectoryA.KERNEL32(80000002,00000000), ref: 0040A22A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$DirectoryRemove
                                              • String ID: UninstallPath$UninstallStartmenu$ZOC$ZOC4$ZOC5
                                              • API String ID: 2811140049-1288986489
                                              • Opcode ID: 58a93489e64ab4c88a6b6f8653953070633bc7b1f743d2ba428b4ddf36151a8d
                                              • Instruction ID: 17799c386a6660d65fa2cbda4ba8ed48106aefcb7ca43bf0960c163977319091
                                              • Opcode Fuzzy Hash: 58a93489e64ab4c88a6b6f8653953070633bc7b1f743d2ba428b4ddf36151a8d
                                              • Instruction Fuzzy Hash: A5B15231500249DADB10EFA5DD56FDE77A4AF15308F10407EF805A7182EB789B98CBAA
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0040B404
                                                • Part of subcall function 004136A5: __EH_prolog3_GS.LIBCMT ref: 004136AF
                                                • Part of subcall function 004136A5: LoadStringA.USER32(?,?,?,00000100), ref: 00413706
                                                • Part of subcall function 00415A8E: SetWindowTextA.USER32(?,00000000), ref: 00415A95
                                                • Part of subcall function 00409F4A: __EH_prolog3.LIBCMT ref: 00409F66
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$H_prolog3_LoadStringTextWindow
                                              • String ID: %ZOC%$HomePath$SETUP::NewSetupHookZOC %d %d %08x$Software\EmTec$ZOC4$ZOC5
                                              • API String ID: 1060891849-3215198484
                                              • Opcode ID: e1886ffbe4f27b0528293e069cb4d24d3b475411508254f4a7dfc75dc243af25
                                              • Instruction ID: 4f68fd279c41a3709d75f51d946629c1b8aeedb0769f2e78b68e025d57b8369a
                                              • Opcode Fuzzy Hash: e1886ffbe4f27b0528293e069cb4d24d3b475411508254f4a7dfc75dc243af25
                                              • Instruction Fuzzy Hash: 2D51B331910249EADB14EFA5CC56BDD7760EB15308F10407BF815B32D2E77C5A88CA9E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CreateErrorLastLoadMenuWindow_sprintf_strcat
                                              • String ID: AppWindow%d
                                              • API String ID: 3803719263-4127035878
                                              • Opcode ID: 4eff66900bdb46257b2e5daf22bb038aa1524260acc938ce3af280d767851b55
                                              • Instruction ID: 00001478ee587ac556fc9e5331d2cb77abfdefb01eb15b3c1b1510a79b121a01
                                              • Opcode Fuzzy Hash: 4eff66900bdb46257b2e5daf22bb038aa1524260acc938ce3af280d767851b55
                                              • Instruction Fuzzy Hash: FF318C72A00209EFDB10CFA5DC45FDE7BB8FB48319F10842AF905A6251D734E8958B58
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • LoadIconA.USER32(10000000,?), ref: 0041EEC7
                                              • LoadIconA.USER32(00000001), ref: 0041EEDC
                                              • LoadIconA.USER32(00000001), ref: 0041EEEC
                                              • LoadIconA.USER32(00007F00), ref: 0041EEFB
                                              • LoadCursorA.USER32(?,00007F00), ref: 0041EF08
                                              • GetStockObject.GDI32(00000001), ref: 0041EF2F
                                              • RegisterClassA.USER32(00000000), ref: 0041EF42
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Load$Icon$ClassCursorObjectRegisterStock
                                              • String ID:
                                              • API String ID: 3152414977-0
                                              • Opcode ID: 65f1a97166fdc4bad636716a1bf88e99dfbe8a812eeff1e2b6fad7fbbafd9a52
                                              • Instruction ID: a34adbc610476f3c7aa2a167c691e13a6c69084eb958ebb2691a92e62715e4dc
                                              • Opcode Fuzzy Hash: 65f1a97166fdc4bad636716a1bf88e99dfbe8a812eeff1e2b6fad7fbbafd9a52
                                              • Instruction Fuzzy Hash: B5212CB590131A9BDF01DF69D844AEE7BF9EB88351F10042AF905E7350DB75D980CB98
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetFullPathNameA.KERNEL32(C:/Program Files (x86)/ZOC5/zocdll.dll,00000104,?,?,C:/Program Files (x86)/ZOC5/zocdll.dll,?), ref: 0043147F
                                              • _strncpy.LIBCMT ref: 00431495
                                              • GetVolumeInformationA.KERNEL32(?,?,00000104,?,?,?,?,00000104), ref: 004314BE
                                              • _strncmp.LIBCMT ref: 004314D6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: FullInformationNamePathVolume_strncmp_strncpy
                                              • String ID: C:/Program Files (x86)/ZOC5/zocdll.dll$FAT
                                              • API String ID: 300000528-853928189
                                              • Opcode ID: f3e5ce56735d64cfa7cf56430faf00c072666d44408ced056fb609970bfa8d11
                                              • Instruction ID: 7cae300389a8a9512f72b03f9bca2bc52884c746f5ab3e413ea8d6c422272b49
                                              • Opcode Fuzzy Hash: f3e5ce56735d64cfa7cf56430faf00c072666d44408ced056fb609970bfa8d11
                                              • Instruction Fuzzy Hash: 4A2193B290414C6EEB21DBF5EC45EEF77BCAF09304F14402BB649D7142EA749208CB65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0040969F
                                                • Part of subcall function 00411530: __EH_prolog3.LIBCMT ref: 00411537
                                                • Part of subcall function 00411530: _memset.LIBCMT ref: 00411552
                                                • Part of subcall function 00411530: _strlen.LIBCMT ref: 00411589
                                                • Part of subcall function 00410A1E: _strerror.LIBCMT ref: 00410A39
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 004136A5: __EH_prolog3_GS.LIBCMT ref: 004136AF
                                                • Part of subcall function 004136A5: LoadStringA.USER32(?,?,?,00000100), ref: 00413706
                                                • Part of subcall function 00419AB4: __EH_prolog3.LIBCMT ref: 00419ABB
                                                • Part of subcall function 00419AB4: _strncpy.LIBCMT ref: 00419AF9
                                                • Part of subcall function 00435AB2: _malloc.LIBCMT ref: 00435ACA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strlen$H_prolog3_LoadString_malloc_memset_strerror_strncpy
                                              • String ID: 11#$12#$21#$admin.ini
                                              • API String ID: 3746180839-1320473499
                                              • Opcode ID: 4ed3db8a0ac14692245e977456ab6b374e6a484e509c0598ae217674cf50cc60
                                              • Instruction ID: 2ed0038b6a0cbd0d3c2753c9ed9d29faa43c6d59a70b05251dd027d4924237d0
                                              • Opcode Fuzzy Hash: 4ed3db8a0ac14692245e977456ab6b374e6a484e509c0598ae217674cf50cc60
                                              • Instruction Fuzzy Hash: DFC17430604289EEDB14EBA5C855BDE77A49F15308F1040BFF549A72C2EB7C9E48CB5A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __sopen_s
                                              • String ID: UNICODE$UTF-16LE$UTF-8$ccs=
                                              • API String ID: 2693426323-2506416105
                                              • Opcode ID: 5c676a497ea259d6ba67d3304560f541b80692a9d651f236e122c2b11dbb30ec
                                              • Instruction ID: 61f98a9b1ffd488aaf4cb3c19d4b21d652dd0f86e8c427e2dc33e185fb3fe84a
                                              • Opcode Fuzzy Hash: 5c676a497ea259d6ba67d3304560f541b80692a9d651f236e122c2b11dbb30ec
                                              • Instruction Fuzzy Hash: 6F71B1B1C04B09ABFF158F59C4492AA7BB0AF05318F24C46FE8569A253D7BC8A41CF0D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00419ABB
                                                • Part of subcall function 00418E3F: __EH_prolog3.LIBCMT ref: 00418E46
                                                • Part of subcall function 00418E3F: _memset.LIBCMT ref: 00418E77
                                              • _strncpy.LIBCMT ref: 00419AF9
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_memset$ErrorLast__snprintf_strncpy
                                              • String ID: .\stringarray.cpp$STRINGARRAY$source.NotNull()
                                              • API String ID: 359228034-4264967866
                                              • Opcode ID: dc407a318df4dc39bed25a18fcf4e34dcefca314e4881d55c6b7eaf175c6a5e1
                                              • Instruction ID: 42805d2052de11cc6a1284fa6eb2b07591b50b0f5546ef0636ec4dbc94d43a22
                                              • Opcode Fuzzy Hash: dc407a318df4dc39bed25a18fcf4e34dcefca314e4881d55c6b7eaf175c6a5e1
                                              • Instruction Fuzzy Hash: BF21D5B0504289AFDB10DF65C815BDE7BA4AF49304F14405FF845A7282D778AA44CB69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00413451
                                              • _calloc.LIBCMT ref: 00413460
                                                • Part of subcall function 00438998: __calloc_impl.LIBCMT ref: 004389AB
                                              • _calloc.LIBCMT ref: 0041348A
                                              • RegQueryValueExA.KERNEL32(?,?,00000000,?,00000000,?,?,?,00000400,00000001,Function_0001344A), ref: 004134A4
                                              Strings
                                              • REGISTRY::Read key=%s, ok=%d, error=%d, xrefs: 004134FC
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _calloc$H_prolog3QueryValue__calloc_impl
                                              • String ID: REGISTRY::Read key=%s, ok=%d, error=%d
                                              • API String ID: 3081351211-2483465850
                                              • Opcode ID: f7c9373ed7f7b3f174f1f690531e208e3dc5fc196cd9bc62e760b12cccc67613
                                              • Instruction ID: 7d92f945dd14ae9b537a0f45a31a942d9c6e563a861cd8578a77ff594b1b85c3
                                              • Opcode Fuzzy Hash: f7c9373ed7f7b3f174f1f690531e208e3dc5fc196cd9bc62e760b12cccc67613
                                              • Instruction Fuzzy Hash: 38218971D0021AEBDF21AF90CC42BEEBB74BF04719F10542AB6147A182DB795A548B99
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __calloc_crt.LIBCMT ref: 00438F1B
                                              • CreateThread.KERNEL32(?,?,VYj,00000000,?,?), ref: 00438F5F
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 00438F69
                                              • __dosmaperr.LIBCMT ref: 00438F81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CreateErrorLastThread__calloc_crt__dosmaperr
                                              • String ID: VYj
                                              • API String ID: 84609068-2400733075
                                              • Opcode ID: 73db33790426ccd2ebf2c4a8a44ac526a0356d27c3abd7b13d409dec45daacd1
                                              • Instruction ID: 7ca23f6e9706a0627d4aa147206bbc548581a7cd3dfe87978e4df070516c1e47
                                              • Opcode Fuzzy Hash: 73db33790426ccd2ebf2c4a8a44ac526a0356d27c3abd7b13d409dec45daacd1
                                              • Instruction Fuzzy Hash: 0A11EF72605308AFEB10BFA5DC8299FB7A6FF08328F20013FF50192191DB3999008A69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00412AA9
                                              • GetLastError.KERNEL32(00000008), ref: 00412ACB
                                              • _memset.LIBCMT ref: 00412AED
                                              • FormatMessageA.KERNEL32(00001000,00000000,FFFFED99,00000000,00000000,00000100,00000000,?,?,00000008), ref: 00412B0C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ErrorFormatH_prolog3LastMessage_memset
                                              • String ID: <no error>
                                              • API String ID: 1789954729-1181488366
                                              • Opcode ID: 57e955d7412a2bcc2b51c7457fb2bcb921a37ccfb0daafc4dab1b30ac7e5b93f
                                              • Instruction ID: 0e8155c76f8187e68df4c12ac45065b7397ebe3c11ec7ed2401be82d8e1975d8
                                              • Opcode Fuzzy Hash: 57e955d7412a2bcc2b51c7457fb2bcb921a37ccfb0daafc4dab1b30ac7e5b93f
                                              • Instruction Fuzzy Hash: D0215E7590024CAFDB21EF95DC82BEE77A4FB0C309F40442EAA589B281D7F45A48CB54
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00413C88
                                                • Part of subcall function 004135EB: __EH_prolog3.LIBCMT ref: 004135F2
                                                • Part of subcall function 004135EB: _strlen.LIBCMT ref: 00413622
                                              • RegCreateKeyA.ADVAPI32(?,?), ref: 00413CCC
                                              • RegOpenKeyExA.KERNEL32(?,?,00000000,-00020007,?,00000000,004545D8,00000000,?,?,00000140), ref: 00413CF0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$CreateOpen_strlen
                                              • String ID: .\osys_win32.cpp$FALSE
                                              • API String ID: 3117078595-21605568
                                              • Opcode ID: ef382b0e8a39a9bd7de653f807daa500d0dd5debef5fd4895f80ad225809bf0c
                                              • Instruction ID: d04a97daceca04a96a64942b6765013f253ac0c1ac35ce23de7e7430db78ae3b
                                              • Opcode Fuzzy Hash: ef382b0e8a39a9bd7de653f807daa500d0dd5debef5fd4895f80ad225809bf0c
                                              • Instruction Fuzzy Hash: 82112972900209BBDB24DF60CC829DE37A5EF44316F20813BF916661D1EB3D9F9197A8
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • FindCloseChangeNotification.KERNEL32 ref: 004131AD
                                              • _sprintf.LIBCMT ref: 004131C4
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ChangeCloseErrorFindH_prolog3LastNotification__snprintf_memset_sprintf
                                              • String ID: .\osys_win32.cpp$MUTEXSEM::MUTEXSEM delete %08x$handle= %08x
                                              • API String ID: 1202404192-3579570256
                                              • Opcode ID: 967b2eca234d2c0599882fb784fcdd1642c13698ce73eb1db1e76c7807933af8
                                              • Instruction ID: ca53f6a99890a1538eed478a8e3697152db93273f32b545b8d2b1d59201a5b34
                                              • Opcode Fuzzy Hash: 967b2eca234d2c0599882fb784fcdd1642c13698ce73eb1db1e76c7807933af8
                                              • Instruction Fuzzy Hash: F6F0CD717402087BD710AB519C03F9B77B8EB44B0AF10056FFD45E61C2EBB85B54879A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00415AA5
                                              • GetWindowTextLengthA.USER32(?), ref: 00415AB7
                                                • Part of subcall function 00435AB2: _malloc.LIBCMT ref: 00435ACA
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              • GetWindowTextA.USER32(?,00000000,00000001), ref: 00415AEC
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$TextWindow$ErrorLastLength__snprintf_malloc_memset_strlen
                                              • String ID: .\windows_win32.cpp$txt
                                              • API String ID: 3340050389-4102185663
                                              • Opcode ID: e5e728fcf6a7811284672095e3f792bf8600da6424630fbb7e7d7cfa2b27859c
                                              • Instruction ID: 4e45828bd5e964f62361749d79f87ea796dcb99cfe0af80ed8ae87d7a6e45c5e
                                              • Opcode Fuzzy Hash: e5e728fcf6a7811284672095e3f792bf8600da6424630fbb7e7d7cfa2b27859c
                                              • Instruction Fuzzy Hash: B0F0C2B5640344FBD710BB61CC4BFAE7674EB44B0AF10941ABA053A1E3C7BC9A4487AC
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset$__filbuf_memcpy_s
                                              • String ID:
                                              • API String ID: 2885843685-0
                                              • Opcode ID: cac8cc74f53462be6e7a85d0e7f9c1900b07443b8ac96e572148be52177315ed
                                              • Instruction ID: 1f389d0f8b6cf4a85dc384b70e4664b8ee27b78ec3c9cf330c4f0b32099c9cf9
                                              • Opcode Fuzzy Hash: cac8cc74f53462be6e7a85d0e7f9c1900b07443b8ac96e572148be52177315ed
                                              • Instruction Fuzzy Hash: 795108B0904605EBDF349F69CC48A9FBBB5EF49320F24961BF4A562290D7389A01CF59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __lock.LIBCMT ref: 00437EEE
                                                • Part of subcall function 00443484: __mtinitlocknum.LIBCMT ref: 00443498
                                                • Part of subcall function 00443484: __amsg_exit.LIBCMT ref: 004434A4
                                                • Part of subcall function 00443484: EnterCriticalSection.KERNEL32(?,?,?,004388FB,00000004,004699E0,0000000C,00442E08,?,?,00000000,00000000,00000000,0043FA2F,00000001,00000214), ref: 004434AC
                                              • ___sbh_find_block.LIBCMT ref: 00437EF9
                                              • ___sbh_free_block.LIBCMT ref: 00437F08
                                              • RtlFreeHeap.NTDLL(00000000,?,00469980,0000000C,00443465,00000000,00469F50,0000000C,0044349D,?,?,?,004388FB,00000004,004699E0,0000000C), ref: 00437F38
                                              • GetLastError.KERNEL32(?,004388FB,00000004,004699E0,0000000C,00442E08,?,?,00000000,00000000,00000000,0043FA2F,00000001,00000214,?,00000000), ref: 00437F49
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                              • String ID:
                                              • API String ID: 2714421763-0
                                              • Opcode ID: f413bb8a916d11123bb10b42326439379acc1e8d8534f1446e3fb11749551f51
                                              • Instruction ID: ef2c5642fba062339a10148400668541c54fc01c812a85ed4dcd4ecf1aae9f16
                                              • Opcode Fuzzy Hash: f413bb8a916d11123bb10b42326439379acc1e8d8534f1446e3fb11749551f51
                                              • Instruction Fuzzy Hash: 7701F771809305AAEF346B71AC0975F77B0BF08769F24111FF144562D1CF7C89449A5D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0040EB6A
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                                • Part of subcall function 004136A5: __EH_prolog3_GS.LIBCMT ref: 004136AF
                                                • Part of subcall function 004136A5: LoadStringA.USER32(?,?,?,00000100), ref: 00413706
                                                • Part of subcall function 0040E93E: __EH_prolog3.LIBCMT ref: 0040E945
                                                • Part of subcall function 0040E93E: SendMessageA.USER32(?,00000030,00000000,00000001), ref: 0040E9C8
                                                • Part of subcall function 0040E93E: SendMessageA.USER32(?,00000030,00000000,00000001), ref: 0040EA02
                                                • Part of subcall function 00418658: GetDlgItem.USER32(?,?), ref: 00418670
                                                • Part of subcall function 00415B1D: ShowWindow.USER32(?,?,?,?,0040E5BE,00000001), ref: 00415B48
                                                • Part of subcall function 00415A8E: SetWindowTextA.USER32(?,00000000), ref: 00415A95
                                                • Part of subcall function 00401A83: GetWindowLongA.USER32(?,000000F0), ref: 00401A8B
                                                • Part of subcall function 00401A83: SetWindowLongA.USER32(?,000000F0,?), ref: 00401A9B
                                                • Part of subcall function 00415B63: InvalidateRect.USER32(63736544,?,?,00402848,00000000,00000000,00000000,?,00000095), ref: 00415B6E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Window$H_prolog3$LongMessageSend$ErrorH_prolog3_InvalidateItemLastLoadRectShowStringText__snprintf_memset
                                              • String ID: .\setupdialog.cpp$FALSE$steps[step].idstep!=0
                                              • API String ID: 3387891783-1049168567
                                              • Opcode ID: 60259771c8b67eef73968983ae732e9a2d1e6bea9a5a8b2deeaa484bee4b6a9d
                                              • Instruction ID: 8cbc58493551dba24c4b364f7cfd7d6db8bfef9abb38e9ea9c3295fdc10a4c86
                                              • Opcode Fuzzy Hash: 60259771c8b67eef73968983ae732e9a2d1e6bea9a5a8b2deeaa484bee4b6a9d
                                              • Instruction Fuzzy Hash: 8AA18C71A00249EFDB14EF61C982EED77A4AF14314F10452EFD15632D2DB78AA54CB98
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004021EC
                                                • Part of subcall function 00419640: __EH_prolog3.LIBCMT ref: 00419647
                                                • Part of subcall function 00411500: __EH_prolog3.LIBCMT ref: 00411507
                                                • Part of subcall function 00411793: __EH_prolog3.LIBCMT ref: 0041179A
                                                • Part of subcall function 0040F93F: _strlen.LIBCMT ref: 0040F95F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strlen
                                              • String ID: ActiveSyncInstall$AppName$DGE
                                              • API String ID: 3239654323-390940481
                                              • Opcode ID: 468862d83c5854072f1d462579b01f04f6e6e04a0c2532caa4a39dffbaba8e64
                                              • Instruction ID: d0267a21f03077d5019387b17c8dbe5447e42eb08972eadb201e5dd54c21565c
                                              • Opcode Fuzzy Hash: 468862d83c5854072f1d462579b01f04f6e6e04a0c2532caa4a39dffbaba8e64
                                              • Instruction Fuzzy Hash: A961C130A00244AADB04FBE5CD56BEE76E45B58318F1441BFE509B72C2EFBC5A48876D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004160C1
                                              • FindWindowExA.USER32(?,00000000,00000000,00000000), ref: 004160DD
                                              • GetWindowLongA.USER32(?,000000F0), ref: 00416100
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Window$FindH_prolog3Long
                                              • String ID: STATIC
                                              • API String ID: 700960635-1882779555
                                              • Opcode ID: e85cb15b67b3c6a2a446bf95c2105637d5012dde26bd22f2da91d15c55f4a1d0
                                              • Instruction ID: 7029a361e118ae793ebdb74637e11e463e56ca73055d190ccd6696bfe8b3a3ad
                                              • Opcode Fuzzy Hash: e85cb15b67b3c6a2a446bf95c2105637d5012dde26bd22f2da91d15c55f4a1d0
                                              • Instruction Fuzzy Hash: 8231CF71C04249EFCF10DFA5C844ADEBBB4AF05328F15422EE811B72D2CB389A85CB58
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0040FCAC
                                                • Part of subcall function 004108B6: __fsopen.LIBCMT ref: 00410929
                                                • Part of subcall function 0040F07D: _getenv.LIBCMT ref: 0040F08B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3__fsopen_getenv
                                              • String ID: BINARY::Save %s$BINARY::Save returns %08x, %d bytes, %s$STRING::Save
                                              • API String ID: 2299599311-3174717632
                                              • Opcode ID: 121db116028f96b10ad388207ac67b08e47cfcd60519601ee01594cff73d72eb
                                              • Instruction ID: 5349615037152d6dfca5f805b8324474dcfef9878c4ea0233a7416020db0d3ff
                                              • Opcode Fuzzy Hash: 121db116028f96b10ad388207ac67b08e47cfcd60519601ee01594cff73d72eb
                                              • Instruction Fuzzy Hash: E211E531800309EBDB20BBA58C46FDE7A64AF04728F14023FF865761D2DBBD8968865D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00413D88
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              Strings
                                              • REGISTRY::Constructor failed for app=%s, basekey=%s, user=%d, xrefs: 00413E05
                                              • .\osys_win32.cpp, xrefs: 00413DBB
                                              • app[0]!='<', xrefs: 00413DC0
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$ErrorLast__snprintf_memset
                                              • String ID: .\osys_win32.cpp$REGISTRY::Constructor failed for app=%s, basekey=%s, user=%d$app[0]!='<'
                                              • API String ID: 4251183321-992221689
                                              • Opcode ID: 4839a2a600c51c62cedf98ed14fc204aad8e1a8268170fb70fbd31cd538ad280
                                              • Instruction ID: 3db50c9e2d149d88cbbf6bcb1561818c7d971b06136cf0b1ce46fa9176146c38
                                              • Opcode Fuzzy Hash: 4839a2a600c51c62cedf98ed14fc204aad8e1a8268170fb70fbd31cd538ad280
                                              • Instruction Fuzzy Hash: 0801D275B00309EBDB21AF558C42EAF7A91AB40705F24440FFD54A7282C77D8EA0C35E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetFileAttributesA.KERNEL32(DGE,00000000), ref: 00435CFC
                                              • GetLastError.KERNEL32 ref: 00435D07
                                              • __dosmaperr.LIBCMT ref: 00435D0E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: AttributesErrorFileLast__dosmaperr
                                              • String ID: DGE
                                              • API String ID: 1932490781-828149971
                                              • Opcode ID: 54a3f60cf624be24ca461592a16c2c3a5de0b92e513de29b307f67725d8e87b4
                                              • Instruction ID: ac241e7f3626720d6eafc294c19b611df1cee1af7331488348519f32a4b12397
                                              • Opcode Fuzzy Hash: 54a3f60cf624be24ca461592a16c2c3a5de0b92e513de29b307f67725d8e87b4
                                              • Instruction Fuzzy Hash: 31018670014B105EDB253B75EC0935B77B0AF89339F12655FF4604E2A2CF3D88868B6A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CreateMutexA.KERNEL32(00000000,00000000,?,?,0041B1B5,00000000,00000000,E5C332AE,?,000001FF,00000000), ref: 00413140
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CreateErrorH_prolog3LastMutex__snprintf_memset
                                              • String ID: .\osys_win32.cpp$MUTEXSEM::MUTEXSEM created %08x, name= %s$this->hmux
                                              • API String ID: 3119763698-2287203105
                                              • Opcode ID: 25252f86a56b1eb42d35cb9c96674f781d6d210482007860c17c9ee8f2760872
                                              • Instruction ID: c4d8f1792cfeb8cbb6223ab1420c5a97f74edf8826c17fcea1056d2b077d6660
                                              • Opcode Fuzzy Hash: 25252f86a56b1eb42d35cb9c96674f781d6d210482007860c17c9ee8f2760872
                                              • Instruction Fuzzy Hash: 64E06D31684300BFE3105B218C07F56B6A4EB44B1BF15882ABD9CA51D2D2B958A49BAE
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetWindowLongA.USER32(?,000000EB,?), ref: 00416AD4
                                              • PostMessageA.USER32(?,00000501,00000000,00000000), ref: 00416AE2
                                              • GetWindowLongA.USER32(?,000000EB), ref: 00416AEB
                                              • KiUserCallbackDispatcher.NTDLL(00000002,?,?), ref: 00416B3E
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: LongWindow$CallbackDispatcherMessagePostUser
                                              • String ID:
                                              • API String ID: 4134389970-0
                                              • Opcode ID: 231a1ce65a30375c6fc2bf70feab2b9405ba34f371658c75ce3f511b5efff89d
                                              • Instruction ID: c25146fd359c7207954cdb449ed60caee1acf02d6e7708ffb1f88a43a2397dd2
                                              • Opcode Fuzzy Hash: 231a1ce65a30375c6fc2bf70feab2b9405ba34f371658c75ce3f511b5efff89d
                                              • Instruction Fuzzy Hash: 0B117C71600218BBCF218F66CC48DDFBBB9EF89721F01851AF91596261C234D950CB64
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00415B1D: ShowWindow.USER32(?,?,?,?,0040E5BE,00000001), ref: 00415B48
                                                • Part of subcall function 004160BA: __EH_prolog3.LIBCMT ref: 004160C1
                                                • Part of subcall function 004160BA: FindWindowExA.USER32(?,00000000,00000000,00000000), ref: 004160DD
                                                • Part of subcall function 004160BA: GetWindowLongA.USER32(?,000000F0), ref: 00416100
                                              • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,00000000), ref: 0040E5D8
                                              • IsDialogMessageA.USER32(?,?), ref: 0040E5F1
                                              • TranslateMessage.USER32(?), ref: 0040E60A
                                              • DispatchMessageA.USER32(?), ref: 0040E614
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: MessageWindow$CallbackDialogDispatchDispatcherFindH_prolog3LongShowTranslateUser
                                              • String ID:
                                              • API String ID: 12264550-0
                                              • Opcode ID: fcc6488865a8700f6b9d2a1c0831e60515a05ddd74f867c5afb41a4ee7ccffac
                                              • Instruction ID: 90b08ff7e076a266c3855cb06ac5ab85bc5cfd3ae9ebbf9201b9f6da1b58b202
                                              • Opcode Fuzzy Hash: fcc6488865a8700f6b9d2a1c0831e60515a05ddd74f867c5afb41a4ee7ccffac
                                              • Instruction Fuzzy Hash: A6111971A00209EFDB00EFA5E898EEE77B9FB44309F100875F901EB265DB34A945CB24
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 0043F8BF: TlsGetValue.KERNEL32(?,00438E66), ref: 0043F8C6
                                                • Part of subcall function 0043F8BF: TlsSetValue.KERNEL32(00000000,00438E66), ref: 0043F8E7
                                                • Part of subcall function 0043F8A4: TlsGetValue.KERNEL32(?,00438E71,00000000), ref: 0043F8AE
                                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 00438E89
                                              • ExitThread.KERNEL32 ref: 00438E90
                                              • GetCurrentThreadId.KERNEL32 ref: 00438E96
                                              • __freefls@4.LIBCMT ref: 00438EB7
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Value$Thread$CurrentErrorExitLast__freefls@4
                                              • String ID:
                                              • API String ID: 3657912857-0
                                              • Opcode ID: 2eb80bad42e85dd36758a326ff2621cda8dcc3a9d213b6cb427d90fda558b6d1
                                              • Instruction ID: 43a95a8d74b78fb8902c56c190684b4374ba402502624cdf101ccd003bdac401
                                              • Opcode Fuzzy Hash: 2eb80bad42e85dd36758a326ff2621cda8dcc3a9d213b6cb427d90fda558b6d1
                                              • Instruction Fuzzy Hash: D30121344007019FD708BB71D90A50F77A4AF4C309F20547EB90587262DB7CC8868A5E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 00406D25
                                              • _strlen.LIBCMT ref: 00406D34
                                                • Part of subcall function 00418F66: _memset.LIBCMT ref: 00418FAD
                                                • Part of subcall function 00418F66: _sprintf.LIBCMT ref: 00418FCA
                                                • Part of subcall function 00401A26: __EH_prolog3.LIBCMT ref: 00401A2D
                                                • Part of subcall function 00419640: __EH_prolog3.LIBCMT ref: 00419647
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$H_prolog3__memset_sprintf_strlen
                                              • String ID: %s_%d
                                              • API String ID: 4104334662-1933919280
                                              • Opcode ID: c8e8857e42805affa9e69c6b1954f022bff71b8c47be9b99a5ec28da28535272
                                              • Instruction ID: d4933194c617eb94cb1017760cd36be50ef7af7a441f46dc76cff4f05281cc73
                                              • Opcode Fuzzy Hash: c8e8857e42805affa9e69c6b1954f022bff71b8c47be9b99a5ec28da28535272
                                              • Instruction Fuzzy Hash: FA517074A003499FCF15EFE5C891AEDBBB9AF58308F04402EE406B7282DB3C5995DB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __fread_nolock.LIBCMT ref: 0040FE13
                                                • Part of subcall function 00412A8A: __EH_prolog3.LIBCMT ref: 00412AA9
                                                • Part of subcall function 00412A8A: GetLastError.KERNEL32(00000008), ref: 00412ACB
                                                • Part of subcall function 00412A8A: _memset.LIBCMT ref: 00412AED
                                                • Part of subcall function 00412A8A: FormatMessageA.KERNEL32(00001000,00000000,FFFFED99,00000000,00000000,00000100,00000000,?,?,00000008), ref: 00412B0C
                                              Strings
                                              • BINARY::Load %s (%d bytes), xrefs: 0040FDBC
                                              • BINARY::Load returns %8x, %d bytes, %s, xrefs: 0040FE61
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ErrorFormatH_prolog3LastMessage__fread_nolock_memset
                                              • String ID: BINARY::Load %s (%d bytes)$BINARY::Load returns %8x, %d bytes, %s
                                              • API String ID: 2872010135-701840451
                                              • Opcode ID: 1bd51d6ae867132dd4bc130e5b39254b41afeffd2c5a034013890346fc90df36
                                              • Instruction ID: 66e30b803e40f794b78be5c228ae4a0b428c8e4a2381642daf79d9341a46e9be
                                              • Opcode Fuzzy Hash: 1bd51d6ae867132dd4bc130e5b39254b41afeffd2c5a034013890346fc90df36
                                              • Instruction Fuzzy Hash: EC41B632900249ABDB20DB95CC41BEF77A8FF44714F14463EF915A72C2DB789A088B59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              • FILENAME::fsopen(%s, %s, %d), xrefs: 004108C7
                                              • FILENAME::fsopen(%s, %s, %d) returns f= %08x, fd= %d, xrefs: 0041094A
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __fsopen
                                              • String ID: FILENAME::fsopen(%s, %s, %d)$FILENAME::fsopen(%s, %s, %d) returns f= %08x, fd= %d
                                              • API String ID: 3646066109-618868067
                                              • Opcode ID: 41e9a1897c323f9567159d2b1dfea4594c69c7ed4517174ec08e4936d5c6e437
                                              • Instruction ID: a084173e7b20bd82d0c04f90eaed976f86ef40041ff390ac9cadff746f9e38ed
                                              • Opcode Fuzzy Hash: 41e9a1897c323f9567159d2b1dfea4594c69c7ed4517174ec08e4936d5c6e437
                                              • Instruction Fuzzy Hash: 4D113A7364822536F62030675C42DFB6B5CCF4AB78F15421BFE18A61C2EA9D4CD112DD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00415D15
                                                • Part of subcall function 00415A9E: __EH_prolog3.LIBCMT ref: 00415AA5
                                                • Part of subcall function 00415A9E: GetWindowTextLengthA.USER32(?), ref: 00415AB7
                                                • Part of subcall function 00415A9E: GetWindowTextA.USER32(?,00000000,00000001), ref: 00415AEC
                                                • Part of subcall function 00415812: KiUserCallbackDispatcher.NTDLL(?,?,00415D56,?,?,?,?,?,0040E288,?), ref: 0041F1C3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3TextWindow$CallbackDispatcherLengthUser
                                              • String ID: ._A$WINDOW::~WINDOW auto-destroying %s %d
                                              • API String ID: 2199925783-1616064182
                                              • Opcode ID: 62edb1e4c9d5bc4a4ae7da9edd183e6c9f81ed8e75b6cc79ff54ea8b1f03051f
                                              • Instruction ID: f93058108eb8c5dd938239ea88d316022870af8d2a8c30aaacef40bdbaaef868
                                              • Opcode Fuzzy Hash: 62edb1e4c9d5bc4a4ae7da9edd183e6c9f81ed8e75b6cc79ff54ea8b1f03051f
                                              • Instruction Fuzzy Hash: D3F0F630800788DBCB20FBA1C40A7CC7AB0AF04325F14451EE455632C2C7BC4688D769
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • _strlen.LIBCMT ref: 00413396
                                              • RegSetValueExA.KERNEL32(?,?,00000000,00000001,?,00000000), ref: 004133A9
                                              Strings
                                              • REGISTRY::Write String value= %s; data=%s, error=%08x, xrefs: 004133B8
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Value_strlen
                                              • String ID: REGISTRY::Write String value= %s; data=%s, error=%08x
                                              • API String ID: 3056571664-783069814
                                              • Opcode ID: c920a5e635ce3a70a902645fc12082b549a9882381ee13445927ac9d60f59064
                                              • Instruction ID: 7e61f05cd10e624271fe7cca08c3808ac3dcce2c47f1d62ab78c74bd5b50fec1
                                              • Opcode Fuzzy Hash: c920a5e635ce3a70a902645fc12082b549a9882381ee13445927ac9d60f59064
                                              • Instruction Fuzzy Hash: BEE01237540228BBDF212EA1DC06FDABF29EF087B4F118016FE4859191D6B7D96097E4
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              • error: can't open zipfile [ %s ], xrefs: 0042F224
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __open_fprintf
                                              • String ID: error: can't open zipfile [ %s ]
                                              • API String ID: 2397098119-490673178
                                              • Opcode ID: 7edd1610342b3cf6c7ca33c88155f1f83e01b6e7abf2b2500f50b8efe8dbe0f3
                                              • Instruction ID: b3aa37ab76c710b9a88f3d08675967784487a0eaae712bf691c78030f242be8b
                                              • Opcode Fuzzy Hash: 7edd1610342b3cf6c7ca33c88155f1f83e01b6e7abf2b2500f50b8efe8dbe0f3
                                              • Instruction Fuzzy Hash: 79D05BF375560165FB1127726D0771522E4A728304F18147FF511D00A1FEAE94165A1E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __invoke_watson
                                              • String ID:
                                              • API String ID: 3648217671-0
                                              • Opcode ID: d8b949001d8c47f8977c71c5924173e39385eaa4798ef9556d0638b29c39d55c
                                              • Instruction ID: 0ced8b98219d9ee8ae140f4242dc454246a52aaaaa04a8b9706c453e2c1cea16
                                              • Opcode Fuzzy Hash: d8b949001d8c47f8977c71c5924173e39385eaa4798ef9556d0638b29c39d55c
                                              • Instruction Fuzzy Hash: 9E71A2B5B007099BEB14DEBDCC817AA73EAEB88368F15852AF914D3350E778DD008759
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetWindowLongA.USER32(?,000000EB), ref: 0041F036
                                              • GetWindowLongA.USER32(?,000000EB), ref: 0041F042
                                              • DefWindowProcA.USER32(?,00000001,?,?), ref: 0041F09A
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Window$Long$Proc
                                              • String ID:
                                              • API String ID: 3468714886-0
                                              • Opcode ID: 1a6cd706a8c5c37a67967d7fa375e70ac6c87cb1fa8ca4424396bfa51bdb7c44
                                              • Instruction ID: 2a18902c380b6b0829200df20d6c3ad4e61d103b88e18afc0032b1f2c5c8fd03
                                              • Opcode Fuzzy Hash: 1a6cd706a8c5c37a67967d7fa375e70ac6c87cb1fa8ca4424396bfa51bdb7c44
                                              • Instruction Fuzzy Hash: 27116731600208BFCF218F66CC48D9B7FB9FF89721B10882AF91A96262D735D951DF64
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • FindCloseChangeNotification.KERNEL32(00000000,00000000,00000109,0043DFFF,00000109), ref: 0043D2D9
                                              • GetLastError.KERNEL32 ref: 0043D2E3
                                              • __dosmaperr.LIBCMT ref: 0043D312
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                              • String ID:
                                              • API String ID: 490808831-0
                                              • Opcode ID: 88f49b5288914f81e164e942763d8cc7f54db9dcc7ccecb8cdb5f460294e8fab
                                              • Instruction ID: 9bcf908137145d33db6d147d1368f159bcccc99d98a74b10a048d5fced0a3d82
                                              • Opcode Fuzzy Hash: 88f49b5288914f81e164e942763d8cc7f54db9dcc7ccecb8cdb5f460294e8fab
                                              • Instruction Fuzzy Hash: 3901F93390522055D62522397D05B5B27884F8B738F1A159FFD21D76E3CE6CCC82815E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __close__flush__freebuf
                                              • String ID:
                                              • API String ID: 3722736141-0
                                              • Opcode ID: 414d6acc784b4ba750f289462bd0048cf33c0e6a9a5d890fcf3e0de11862eb39
                                              • Instruction ID: 4f44819c263fe5c2b31c02208096e6c6fe4148869dd3a7e1bb45803d218af7a1
                                              • Opcode Fuzzy Hash: 414d6acc784b4ba750f289462bd0048cf33c0e6a9a5d890fcf3e0de11862eb39
                                              • Instruction Fuzzy Hash: E9F028B2D087002ED6342B7F4C4151BA2D84E59338F14961FF6E4D26D2DA3CD90106AD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetFilePointer.KERNEL32(00000000,00004000,00000000,00000109,00004000,00000109,0043DF9F,00000109,00000000,00000000), ref: 0043D0A8
                                              • GetLastError.KERNEL32 ref: 0043D0B5
                                              • __dosmaperr.LIBCMT ref: 0043D0C4
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ErrorFileLastPointer__dosmaperr
                                              • String ID:
                                              • API String ID: 2336955059-0
                                              • Opcode ID: c9cf3a8b02c71cee2872045a8785f7c250c376ae1f0b6df9c92c8e9132b3d1ba
                                              • Instruction ID: 348edbf9250ebf09a197b7b2a95d6233d97b3dd5e695b8c390fd372a0197bb8e
                                              • Opcode Fuzzy Hash: c9cf3a8b02c71cee2872045a8785f7c250c376ae1f0b6df9c92c8e9132b3d1ba
                                              • Instruction Fuzzy Hash: 07F02833915A2156C6251B7CBC0454A7A745F8A738F22271BF130CB2F2DF34C886426A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00417BF9
                                                • Part of subcall function 00415A9E: __EH_prolog3.LIBCMT ref: 00415AA5
                                                • Part of subcall function 00415A9E: GetWindowTextLengthA.USER32(?), ref: 00415AB7
                                                • Part of subcall function 00415A9E: GetWindowTextA.USER32(?,00000000,00000001), ref: 00415AEC
                                              • _memset.LIBCMT ref: 00417C32
                                              • __snprintf.LIBCMT ref: 00417C49
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3TextWindow$Length__snprintf_memset
                                              • String ID:
                                              • API String ID: 2898785052-0
                                              • Opcode ID: b05517545052e475b43d3d12ef15264e39fa8a52741ba6220bf9784e4832eb78
                                              • Instruction ID: c12d38675c08e413c3bea9045cba4f565b1a4942ac6f9a98d6a5ad991de7b21d
                                              • Opcode Fuzzy Hash: b05517545052e475b43d3d12ef15264e39fa8a52741ba6220bf9784e4832eb78
                                              • Instruction Fuzzy Hash: 6DF06831500B049BCB24EBA1C946F9AB3F4BF0C314F501A5EF58597591DA39FD10D758
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • OpenFile.KERNEL32(00461874,?,00000040), ref: 0043151A
                                              • GetLastError.KERNEL32 ref: 00431525
                                              • _lclose.KERNEL32(00000000), ref: 0043153A
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ErrorFileLastOpen_lclose
                                              • String ID:
                                              • API String ID: 2717909932-0
                                              • Opcode ID: 754965397b30d2d29bba25a312543eb917514aed83775729724602742bb666b1
                                              • Instruction ID: 384cb28fe535bb3eb090dd9fcb86b0dfd8f7cd1919867c843e50bc9326ab6741
                                              • Opcode Fuzzy Hash: 754965397b30d2d29bba25a312543eb917514aed83775729724602742bb666b1
                                              • Instruction Fuzzy Hash: B4F0A770510108AFCB00DFB8EC4DA6E77F8AB5C345F505A65F117D71A0EE38DA404729
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CreateDirectoryA.KERNEL32(00461874,00000000,00431BA2,00000000,00454616,00461874,00000040), ref: 0043BDFF
                                              • GetLastError.KERNEL32 ref: 0043BE09
                                              • __dosmaperr.LIBCMT ref: 0043BE18
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CreateDirectoryErrorLast__dosmaperr
                                              • String ID:
                                              • API String ID: 42539052-0
                                              • Opcode ID: 5a528a8fb86dacea2c4ee75187e7f0688dde6160ed4474cdd192512c62e815fc
                                              • Instruction ID: b6e57d29ae80253693b0c0cdc4dde857cee21c583823038f01b55a99f6af3e86
                                              • Opcode Fuzzy Hash: 5a528a8fb86dacea2c4ee75187e7f0688dde6160ed4474cdd192512c62e815fc
                                              • Instruction Fuzzy Hash: 83D0A73020070161DB501735DC0931766A8EB44365F601535B220C81E1FF28C8815049
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • DeleteFileA.KERNEL32(00000000,00410ACD,?,00401796,00000000,004545D8,00000000,004545D8,00000000,?,?,00000140), ref: 00435D60
                                              • GetLastError.KERNEL32(?,?,00000140), ref: 00435D6A
                                              • __dosmaperr.LIBCMT ref: 00435D79
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: DeleteErrorFileLast__dosmaperr
                                              • String ID:
                                              • API String ID: 1545401867-0
                                              • Opcode ID: 733faec8937750481c0697402ca1d1155b99644dba426a08194df184539b0f81
                                              • Instruction ID: 111c3a9a3289340ea5aad4a02370d1bd50e92b20e0323b3724824d429055c1f5
                                              • Opcode Fuzzy Hash: 733faec8937750481c0697402ca1d1155b99644dba426a08194df184539b0f81
                                              • Instruction Fuzzy Hash: B2D01230211F0196DB551F72EC0C11B76E87F84766F549B7EB069C41E1FF2CC881A519
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • RegQueryValueExA.KERNEL32(?,?,00000000,?,?,?), ref: 00413540
                                              Strings
                                              • REGISTRY::Read key=%s, ok=%d, error=%d, xrefs: 00413568
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: QueryValue
                                              • String ID: REGISTRY::Read key=%s, ok=%d, error=%d
                                              • API String ID: 3660427363-2483465850
                                              • Opcode ID: 27251e4b459a72fe4fb64967b7558cbeb323381c3d8df022c407d2ce510f7337
                                              • Instruction ID: 589e9e0ef2ca21d7a06e96ac66a286135cf87189765b562f8c92b9429b044d96
                                              • Opcode Fuzzy Hash: 27251e4b459a72fe4fb64967b7558cbeb323381c3d8df022c407d2ce510f7337
                                              • Instruction Fuzzy Hash: BF018B7220020EBFEB118F59CC80DFB77AEFF54658B24842EF96587201D271EE508BA0
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • RegSetValueExA.KERNEL32(?,80000001,00000000,00000004,?,00000004,?,0040B093,SetupForceWorkdir,00000001,80000001,Software\EmTec,ZOC5,00000101,?,004598AC), ref: 0041341F
                                              Strings
                                              • REGISTRY::Write DWORD value= %s; data=%ld, error=%08x, xrefs: 00413430
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Value
                                              • String ID: REGISTRY::Write DWORD value= %s; data=%ld, error=%08x
                                              • API String ID: 3702945584-31729106
                                              • Opcode ID: cb4a1bfe68d0dd57bc4cba9a3ab3df2359f092c96d6c98418d77ce0d61db9ffc
                                              • Instruction ID: cff67fd6b5b341513b5ffe3f0fb5673008b03afa05cb1283b66c75e31f4a4628
                                              • Opcode Fuzzy Hash: cb4a1bfe68d0dd57bc4cba9a3ab3df2359f092c96d6c98418d77ce0d61db9ffc
                                              • Instruction Fuzzy Hash: 28E026725043217BD310EE608C06FA7BE94FF44B24F040819BB40890E2C321C828C7A6
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • RegDeleteValueA.KERNEL32(?,004545D8,004545D8,004015FE,00000000,00000000,00000001,004545D8,00000000,?,Software\Emtec\,00000000,?,00000000,004545D8,00000000), ref: 00413587
                                              Strings
                                              • REGISTRY::delete value= %s, error=%d, xrefs: 00413594
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: DeleteValue
                                              • String ID: REGISTRY::delete value= %s, error=%d
                                              • API String ID: 1108222502-2413015584
                                              • Opcode ID: 1f20b3e1e7b9a737246411968a4a5b252f901b4d0fca4758ff2cb79291322471
                                              • Instruction ID: 80e1e2f5173f069e3279bcda81f90de90a366ca8b1c6934605b5244976bf1045
                                              • Opcode Fuzzy Hash: 1f20b3e1e7b9a737246411968a4a5b252f901b4d0fca4758ff2cb79291322471
                                              • Instruction Fuzzy Hash: 42D0A7378003307BD6113A709C0AD977E50DF44774F158425BD4C45162D23188A086D6
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00418E3F: __EH_prolog3.LIBCMT ref: 00418E46
                                                • Part of subcall function 00418E3F: _memset.LIBCMT ref: 00418E77
                                              • _strncpy.LIBCMT ref: 00419AA6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3_memset_strncpy
                                              • String ID: STRINGARRAY
                                              • API String ID: 750080963-3326178087
                                              • Opcode ID: a703a858ce71882267a6947c8b2525473058b805b000dce08417588b350d5b88
                                              • Instruction ID: 30a5051644ca16f01d054944a8abd7c4050b685dfc0ba830371e6e46f2e6f413
                                              • Opcode Fuzzy Hash: a703a858ce71882267a6947c8b2525473058b805b000dce08417588b350d5b88
                                              • Instruction Fuzzy Hash: 51D0A77224431066C120A6115C02F97B684CB54751F00842FBF88E2182D778D414569D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetCommandLineA.KERNEL32(000004E4), ref: 00415687
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              • __strdup.LIBCMT ref: 0041569B
                                                • Part of subcall function 00414879: _strcat.LIBCMT ref: 0041489A
                                                • Part of subcall function 00414879: _strlen.LIBCMT ref: 004148B6
                                                • Part of subcall function 00414879: _strlen.LIBCMT ref: 00414915
                                                • Part of subcall function 00415564: __EH_prolog3.LIBCMT ref: 0041556B
                                                • Part of subcall function 00415564: GetCurrentThreadId.KERNEL32 ref: 004155AD
                                                • Part of subcall function 00415564: GetThreadLocale.KERNEL32(00000018,004156E5,00000000,?,?,?,00000000), ref: 004155C6
                                                • Part of subcall function 00415564: FreeLibrary.KERNEL32(00000000), ref: 0041561C
                                                • Part of subcall function 00415564: FreeLibrary.KERNEL32(10000000), ref: 00415636
                                                • Part of subcall function 00437ED0: __lock.LIBCMT ref: 00437EEE
                                                • Part of subcall function 00437ED0: ___sbh_find_block.LIBCMT ref: 00437EF9
                                                • Part of subcall function 00437ED0: ___sbh_free_block.LIBCMT ref: 00437F08
                                                • Part of subcall function 00437ED0: RtlFreeHeap.NTDLL(00000000,?,00469980,0000000C,00443465,00000000,00469F50,0000000C,0044349D,?,?,?,004388FB,00000004,004699E0,0000000C), ref: 00437F38
                                                • Part of subcall function 00437ED0: GetLastError.KERNEL32(?,004388FB,00000004,004699E0,0000000C,00442E08,?,?,00000000,00000000,00000000,0043FA2F,00000001,00000214,?,00000000), ref: 00437F49
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Free_strlen$H_prolog3LibraryThread$CommandCurrentErrorHeapLastLineLocale___sbh_find_block___sbh_free_block__lock__strdup_strcat
                                              • String ID:
                                              • API String ID: 3845007995-0
                                              • Opcode ID: be49588d7133a9464e767cf412dff28836f6b9125eda6918b8502a011cbe779c
                                              • Instruction ID: a05ac1617d2914af050b41238ec6537526c56e1512b01a4540008a2877f3cf4c
                                              • Opcode Fuzzy Hash: be49588d7133a9464e767cf412dff28836f6b9125eda6918b8502a011cbe779c
                                              • Instruction Fuzzy Hash: E40192B2901118ABD714EB66DC46DEE73BCAF49304F0004AFF545E7192EAB49E848F98
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • FindNextFileA.KERNELBASE(?,?,00000000), ref: 00431296
                                              • _strcat.LIBCMT ref: 004312AB
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: FileFindNext_strcat
                                              • String ID:
                                              • API String ID: 2180751025-0
                                              • Opcode ID: 0879bb149a71a5b3740afaf247f3bb87889684eac1e59cd44174e09843cbe108
                                              • Instruction ID: 7ecc5d95fdfc4b989bedcf129f547f1d47eab75e28f0d412e38e4a26b23186bc
                                              • Opcode Fuzzy Hash: 0879bb149a71a5b3740afaf247f3bb87889684eac1e59cd44174e09843cbe108
                                              • Instruction Fuzzy Hash: 89F01D316002089FDB14DB65D945BEA73FCAB0C305F4014AAE546D7160EB78AA858B58
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • HeapCreate.KERNEL32(00000000,00001000,00000000,00436580,00000001), ref: 0044416D
                                              • HeapDestroy.KERNEL32 ref: 004441A3
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Heap$CreateDestroy
                                              • String ID:
                                              • API String ID: 3296620671-0
                                              • Opcode ID: 00e54bc5601c8db1dcecbcf9c641cf8ef01e5e5097b4c788e156fca9b670e511
                                              • Instruction ID: e060f76ab7e2b11ae6d26f336b23b2be498a8be5a77c88f0096aeaa6eaba9101
                                              • Opcode Fuzzy Hash: 00e54bc5601c8db1dcecbcf9c641cf8ef01e5e5097b4c788e156fca9b670e511
                                              • Instruction Fuzzy Hash: 5CE065316243419EFB609B356C0D33A36D4A7E03C6F08483AF501C80A0EBB888C09B0D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __lock.LIBCMT ref: 00446E0A
                                                • Part of subcall function 00443484: __mtinitlocknum.LIBCMT ref: 00443498
                                                • Part of subcall function 00443484: __amsg_exit.LIBCMT ref: 004434A4
                                                • Part of subcall function 00443484: EnterCriticalSection.KERNEL32(?,?,?,004388FB,00000004,004699E0,0000000C,00442E08,?,?,00000000,00000000,00000000,0043FA2F,00000001,00000214), ref: 004434AC
                                              • __tzset_nolock.LIBCMT ref: 00446E1B
                                                • Part of subcall function 00446706: __lock.LIBCMT ref: 00446728
                                                • Part of subcall function 00446706: __invoke_watson.LIBCMT ref: 0044674C
                                                • Part of subcall function 00446706: __invoke_watson.LIBCMT ref: 00446767
                                                • Part of subcall function 00446706: __invoke_watson.LIBCMT ref: 00446782
                                                • Part of subcall function 00446706: ____lc_codepage_func.LIBCMT ref: 0044678A
                                                • Part of subcall function 00446706: _strlen.LIBCMT ref: 004467EA
                                                • Part of subcall function 00446706: __malloc_crt.LIBCMT ref: 004467F1
                                                • Part of subcall function 00446706: _strlen.LIBCMT ref: 00446807
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __invoke_watson$__lock_strlen$CriticalEnterSection____lc_codepage_func__amsg_exit__malloc_crt__mtinitlocknum__tzset_nolock
                                              • String ID:
                                              • API String ID: 4249203040-0
                                              • Opcode ID: db620c7abce4ea8f708a32fe8a1b1da0a1ac05e43bb6c9a1a82e80c0e7bad6cc
                                              • Instruction ID: d3f92b9b270753a169238a8157663aae7681bcb10ec3ade69c26bdc673fde170
                                              • Opcode Fuzzy Hash: db620c7abce4ea8f708a32fe8a1b1da0a1ac05e43bb6c9a1a82e80c0e7bad6cc
                                              • Instruction Fuzzy Hash: 9BE08634541B10DAE7256FA5960221EB1A06F59B29BB5411FB24026192CA7C0981C75F
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __freeptd.LIBCMT ref: 00438E0E
                                              • ExitThread.KERNEL32 ref: 00438E18
                                                • Part of subcall function 00447170: __FindPESection.LIBCMT ref: 004471C9
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ExitFindSectionThread__freeptd
                                              • String ID:
                                              • API String ID: 3875298718-0
                                              • Opcode ID: 2a086f67785f3dcdd18eeb00772fde28312441a9031e6542cef63d4706be480b
                                              • Instruction ID: 2ba03650aec0e360532fa300027b164fda42a2f1c5362d1cb1d16bda50141788
                                              • Opcode Fuzzy Hash: 2a086f67785f3dcdd18eeb00772fde28312441a9031e6542cef63d4706be480b
                                              • Instruction Fuzzy Hash: B6D06772505702ABEB5467B2EE0A61A6655AB0431DF14143EF800C87A2EFAC8D84D55E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00404419
                                                • Part of subcall function 00415EEF: GetWindowRect.USER32(?,?), ref: 00415F12
                                                • Part of subcall function 00415EEF: GetWindow.USER32(?,00000004), ref: 00415F34
                                                • Part of subcall function 00415EEF: ScreenToClient.USER32(?,?), ref: 00415F4A
                                                • Part of subcall function 00415EEF: ScreenToClient.USER32(?,?), ref: 00415F51
                                                • Part of subcall function 00415812: KiUserCallbackDispatcher.NTDLL(?,?,00415D56,?,?,?,?,?,0040E288,?), ref: 0041F1C3
                                                • Part of subcall function 00418658: GetDlgItem.USER32(?,?), ref: 00418670
                                                • Part of subcall function 00415B77: SetFocus.USER32(?,00416194), ref: 00415B7A
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                                • Part of subcall function 00415B53: KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 00415B5A
                                                • Part of subcall function 0040E59B: KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,00000000), ref: 0040E5D8
                                                • Part of subcall function 0040E59B: IsDialogMessageA.USER32(?,?), ref: 0040E5F1
                                                • Part of subcall function 0040E59B: TranslateMessage.USER32(?), ref: 0040E60A
                                                • Part of subcall function 0040E59B: DispatchMessageA.USER32(?), ref: 0040E614
                                                • Part of subcall function 0041376D: __EH_prolog3.LIBCMT ref: 00413774
                                                • Part of subcall function 0041376D: WaitForSingleObject.KERNEL32(?,?), ref: 004137BA
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherH_prolog3MessageUser$ClientScreenWindow$DialogDispatchFocusItemObjectRectSingleTranslateWait
                                              • String ID:
                                              • API String ID: 710369278-0
                                              • Opcode ID: 3ec58e391bd5617d19a80e14ff3a37f326c996788d20ab31b7695582ee7f8f4f
                                              • Instruction ID: 900d354aa22bc8bf2a7884c79a46028e557fbf2354a5ea99fd5c80bd1b31f396
                                              • Opcode Fuzzy Hash: 3ec58e391bd5617d19a80e14ff3a37f326c996788d20ab31b7695582ee7f8f4f
                                              • Instruction Fuzzy Hash: 5B41A031901748EADB05EBA1D996FDDBBB4AF54304F20815EF4196B2C2DF782B44CB54
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID:
                                              • API String ID: 2102423945-0
                                              • Opcode ID: cd0d892c84ea565f5f1e8675416b74c864f42473c1b8e10ac000afd0213ebfd6
                                              • Instruction ID: 060cc01450a76f1771a5a7c36a06da5d7a8aa35285ee1a8878e6a665a2545c83
                                              • Opcode Fuzzy Hash: cd0d892c84ea565f5f1e8675416b74c864f42473c1b8e10ac000afd0213ebfd6
                                              • Instruction Fuzzy Hash: 7A0180B1804209EBDF21BF95CC0298F7B70AF08764F40911BF96415151D7398761DBD9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00415734
                                                • Part of subcall function 0041F0CA: _strcat.LIBCMT ref: 0041F108
                                                • Part of subcall function 0041F0CA: LoadMenuA.USER32(?), ref: 0041F15D
                                                • Part of subcall function 0041F0CA: CreateWindowExA.USER32(00000000,?,?,?,?,?,?,?,?,?), ref: 0041F18E
                                                • Part of subcall function 0041F0CA: GetLastError.KERNEL32 ref: 0041F197
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CreateErrorH_prolog3LastLoadMenuWindow_strcat
                                              • String ID:
                                              • API String ID: 425637439-0
                                              • Opcode ID: 6945bf4231a791310581be158e5b8294eb03d0268fb4041af27ed8b18ce2dadb
                                              • Instruction ID: 2ddf42b7de0b2eba909cdf8f5fd2ff9184a60789823cdc2b7e2f5418f9a88917
                                              • Opcode Fuzzy Hash: 6945bf4231a791310581be158e5b8294eb03d0268fb4041af27ed8b18ce2dadb
                                              • Instruction Fuzzy Hash: D5F0B235100649EBCF125F91CC01ADE3EB2FF08358F01860AFD5426261C77A89B5EF88
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • ShowWindow.USER32(?,?,?,?,0040E5BE,00000001), ref: 00415B48
                                                • Part of subcall function 00415A2E: GetWindowPlacement.USER32(?,00000000,?), ref: 00415A4C
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Window$PlacementShow
                                              • String ID:
                                              • API String ID: 139272362-0
                                              • Opcode ID: 6fe29604f408f3e3991dcf88b7f3797402f0e01163f28d51bfb0c4928cf2bdcf
                                              • Instruction ID: b57afe279b2d9a9a7325506455be9162ac02819e91c1667c4c4b5291934d78f1
                                              • Opcode Fuzzy Hash: 6fe29604f408f3e3991dcf88b7f3797402f0e01163f28d51bfb0c4928cf2bdcf
                                              • Instruction Fuzzy Hash: 23E0C232308A01DAC6301A279D06FDBE6588FD0B61F05412FBA029A290DB68EDC280A9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetWindowPlacement.USER32(?,00000000,?), ref: 00415A7C
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: PlacementWindow
                                              • String ID:
                                              • API String ID: 2154376794-0
                                              • Opcode ID: cab5ff8a2c25f07afb483366d6f7c7a116ca7bf6d0b397d4e82a57bafbee6cbd
                                              • Instruction ID: 663ffef3a0f8331c8cf7d63ede1c08316def65d09f9e8476dca324b7fe78176d
                                              • Opcode Fuzzy Hash: cab5ff8a2c25f07afb483366d6f7c7a116ca7bf6d0b397d4e82a57bafbee6cbd
                                              • Instruction Fuzzy Hash: 70E08C32A04208ABDF049B78C909BCAFBF9AB8C725F008524D000BA090E671E5498AA9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetWindowPlacement.USER32(?,00000000,?), ref: 00415A4C
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: PlacementWindow
                                              • String ID:
                                              • API String ID: 2154376794-0
                                              • Opcode ID: 9512f8b6d37a034c731d6b4ec949dd33e3f80179afbeec0b4624028038123db4
                                              • Instruction ID: 96de784f7552564a2be36dbec5e51b8b3765cf97bf07c4c7806a9efd87af41d4
                                              • Opcode Fuzzy Hash: 9512f8b6d37a034c731d6b4ec949dd33e3f80179afbeec0b4624028038123db4
                                              • Instruction Fuzzy Hash: 14E08C32A04208ABDF049B78C90ABCABBF9AB8C725F00C524D000BA090E671E4498A69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004176F7
                                                • Part of subcall function 004171FE: __EH_prolog3.LIBCMT ref: 00417205
                                                • Part of subcall function 00416CCB: __EH_prolog3.LIBCMT ref: 00416CD2
                                                • Part of subcall function 00416CCB: CreateDialogParamA.USER32(?,?,?,Function_00016AAE), ref: 00416D13
                                                • Part of subcall function 00416CCB: GetWindowLongA.USER32(?,000000F0), ref: 00416D66
                                                • Part of subcall function 00416CCB: GetWindowLongA.USER32(?,000000F4), ref: 00416DA3
                                                • Part of subcall function 00416CCB: SetWindowLongA.USER32(?,000000F4,?), ref: 00416DAF
                                                • Part of subcall function 00416CCB: GetWindowLongA.USER32(?,000000F4), ref: 00416DBA
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: LongWindow$H_prolog3$CreateDialogParam
                                              • String ID:
                                              • API String ID: 1530400305-0
                                              • Opcode ID: 8cdfa2c6853abcee6e972212f1604ebe68b5d9213d744201b92a88c709dc2913
                                              • Instruction ID: 479f7807814a2dbd7cb25b4561db6a86fe101a313bb8b41a855eebaf7c71437d
                                              • Opcode Fuzzy Hash: 8cdfa2c6853abcee6e972212f1604ebe68b5d9213d744201b92a88c709dc2913
                                              • Instruction Fuzzy Hash: 23E01A7510060AEBCB05AF50C801B9DBBB1EF18309F10880AF8552B252DBB896699B8D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00413D4B
                                                • Part of subcall function 00413C81: __EH_prolog3.LIBCMT ref: 00413C88
                                                • Part of subcall function 00413C81: RegCreateKeyA.ADVAPI32(?,?), ref: 00413CCC
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$Create
                                              • String ID:
                                              • API String ID: 1257125548-0
                                              • Opcode ID: 4d599b041bb927843855f8bc59cc8e9cf08fd41dfaad6fd9acf5ae1649d0131c
                                              • Instruction ID: 0ca82d7b148914a2aa659bb97544b74ed51aab1e5687bb7c407e00b6a73e0290
                                              • Opcode Fuzzy Hash: 4d599b041bb927843855f8bc59cc8e9cf08fd41dfaad6fd9acf5ae1649d0131c
                                              • Instruction Fuzzy Hash: 80E08679500259DBCF16BF01CC0179D3B61BF04315F10841EF9952A1A2CB795A20DB98
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041706E
                                                • Part of subcall function 00415F69: __EH_prolog3.LIBCMT ref: 00415F70
                                                • Part of subcall function 00416E40: __EH_prolog3.LIBCMT ref: 00416E47
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3
                                              • String ID:
                                              • API String ID: 431132790-0
                                              • Opcode ID: 7dde4096cd7f88ca9e2f8cb5133e91e1cbc27f9b6f2b707e6aee7d3ac7305f22
                                              • Instruction ID: c32932c00371641da59e638642824845f122e4919ef3072c9965b820ed86fa03
                                              • Opcode Fuzzy Hash: 7dde4096cd7f88ca9e2f8cb5133e91e1cbc27f9b6f2b707e6aee7d3ac7305f22
                                              • Instruction Fuzzy Hash: 2CE08CB4400604DBD718AF61C40228C7AA0EB04329F50864EE8A5662C2CB780705CA8D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(?,?,00415D56,?,?,?,?,?,0040E288,?), ref: 0041F1C3
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID:
                                              • API String ID: 2492992576-0
                                              • Opcode ID: c332340674d53c7ca49a75574e02eea224ff6e03a2a99dfa70eb9dac218337dc
                                              • Instruction ID: c8d94f3e03e482a1f7156431f3b4eae287662b2c3f5c73da6804fbb0778682c6
                                              • Opcode Fuzzy Hash: c332340674d53c7ca49a75574e02eea224ff6e03a2a99dfa70eb9dac218337dc
                                              • Instruction Fuzzy Hash: 95C0123A325232A38A285628B8245FB63E48B8C75230548BFB903E6600C998CC82928C
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SendMessageA.USER32(?,?,00000000,?), ref: 00418879
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 87703bffb22cc554ef9922a84ca37afffc30438472d4a8a56763474846d5fbff
                                              • Instruction ID: ab8dfda2887aa2d109e95f0a3c42112a518b04e4bb15feffb8aff13da82515ba
                                              • Opcode Fuzzy Hash: 87703bffb22cc554ef9922a84ca37afffc30438472d4a8a56763474846d5fbff
                                              • Instruction Fuzzy Hash: 68C080B33541007BDB004F20DE03F257B90D77070AF148024F508C40B1D23AC512D611
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • RegCloseKey.KERNEL32(00000000,?,00413C73,004545D8,00401616,00000000,00000000,00000001,004545D8,00000000,?,Software\Emtec\,00000000,?,00000000,004545D8), ref: 00413382
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Close
                                              • String ID:
                                              • API String ID: 3535843008-0
                                              • Opcode ID: 8218f39c5a9b26a62017d4192a7bc4d6cefc427bcfde67b9ecec0a30dccdbd39
                                              • Instruction ID: fe8bd42333294984027d440e480179507402378d6e9669c4babb6abc3611c917
                                              • Opcode Fuzzy Hash: 8218f39c5a9b26a62017d4192a7bc4d6cefc427bcfde67b9ecec0a30dccdbd39
                                              • Instruction Fuzzy Hash: 16C04C3151831147D7745F18F80479676E86F44713F25096EA991D6180DB64C8C0865C
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SendMessageA.USER32(?,00000402,00000000,00000000), ref: 0041881D
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 635ade492d735b2c15f141b97cbc4f930b453c45bbf91d7f6bf62d1bad89e414
                                              • Instruction ID: 9734eced35650e0ebd38f1c2332c880e58fe14df20ea2bd269fb286416386e13
                                              • Opcode Fuzzy Hash: 635ade492d735b2c15f141b97cbc4f930b453c45bbf91d7f6bf62d1bad89e414
                                              • Instruction Fuzzy Hash: C7B092B1244200BADA014B00CE0AF09BE61ABA4706F50C028B708280F2C2B28462EA08
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • PostMessageA.USER32(?,000004F1,?,00000000), ref: 00415C31
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: f5ac47f764229e571dcaf820ff7b864e1bdfddbc82daa509caa4bae1608098de
                                              • Instruction ID: 25f8cffb7e657dd689ecdddf6987baa777a5ff65df4b86da0cea7a142fb7daa4
                                              • Opcode Fuzzy Hash: f5ac47f764229e571dcaf820ff7b864e1bdfddbc82daa509caa4bae1608098de
                                              • Instruction Fuzzy Hash: ECB09271284302BADA014B00CD06F19BE21AB94B46F11C024B704580B1C6B280A1DA09
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __fsopen
                                              • String ID:
                                              • API String ID: 3646066109-0
                                              • Opcode ID: 055dc9a24320d0e20a7ad1509cf530b65dfebbf7f2211ed701ea3541cf98e005
                                              • Instruction ID: 33960f5baa2aca3f65b6118caf62d108932fd6fba44321be8dffc04e717ae0b7
                                              • Opcode Fuzzy Hash: 055dc9a24320d0e20a7ad1509cf530b65dfebbf7f2211ed701ea3541cf98e005
                                              • Instruction Fuzzy Hash: A4B012B98082007FCA121601AC02B1977526F84710F80C418B79C10170927B8124960B
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetFileAttributesA.KERNEL32(?,00000000,00410CF0,00000000,0046F8B0,000004E4,00403707,00000000,?,00000001,?,00000000,?,00000002,004545D8,00000000), ref: 00410A62
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 8c251f913b04e4dffa1600ca6ad3dcf33aa2748749671557e8ce813dfc5546dd
                                              • Instruction ID: 391563293cf73ded635ea3aac7bae0c6d7ddde7eddef31d3fa809ebab3ce1da4
                                              • Opcode Fuzzy Hash: 8c251f913b04e4dffa1600ca6ad3dcf33aa2748749671557e8ce813dfc5546dd
                                              • Instruction Fuzzy Hash: 69B012F81003009BC604CB20CA08C067B61ABE4305700442DA005451208A32C960EA14
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetWindowTextA.USER32(?,00000000), ref: 00415A95
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: TextWindow
                                              • String ID:
                                              • API String ID: 530164218-0
                                              • Opcode ID: a5cab1bff98598f0f40dfea58dbfaf53af51ccea0dcb8066abf6c0ed6eaf4249
                                              • Instruction ID: 08597d0c9d303428cf68483acbf88390fa76c0a3ccdc83a6bb1cb2bf19fee1ad
                                              • Opcode Fuzzy Hash: a5cab1bff98598f0f40dfea58dbfaf53af51ccea0dcb8066abf6c0ed6eaf4249
                                              • Instruction Fuzzy Hash: E0A00275505100ABCB015B50DE05805FE75BB95715715C465F54545035C733C461EB55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 00415B5A
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID:
                                              • API String ID: 2492992576-0
                                              • Opcode ID: 49452f0df876d2921145f80f2659cb7c28c3b5c6a61844039bd69f04a6fb0d7b
                                              • Instruction ID: 0d376ba1d5f85dbd6538efd23592feec9f7b3b6684acc25b0c8d468798200c8a
                                              • Opcode Fuzzy Hash: 49452f0df876d2921145f80f2659cb7c28c3b5c6a61844039bd69f04a6fb0d7b
                                              • Instruction Fuzzy Hash: 7FA00275504100ABCA015B60DE05809BE71BB95705715C465B54545035C733C562EB55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetFileAttributesA.KERNEL32(00000000,00410CBA,004174BE,000000FF,000000FF,Edit,000000FF,000000FF,000000FF,ListBox,000000FF,000000FF,000000FF,Button,00000002,00000003), ref: 00410A54
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 3818b7f3ebfb4b59dcb850460bba6183bbb7aad9fe0dc26ddc05c567580d3388
                                              • Instruction ID: 0aaa1ea1bbe1ea872f2fa118823579279c0563fc2acb6f4538e39f58630a55df
                                              • Opcode Fuzzy Hash: 3818b7f3ebfb4b59dcb850460bba6183bbb7aad9fe0dc26ddc05c567580d3388
                                              • Instruction Fuzzy Hash:
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • Sleep.KERNEL32(00000000,00414766,00000000,00000000,00000000,?,?), ref: 00412A71
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: a1c7110af78753c66d51254993860c29953dfe5dd1b2ea723a78d83534657eed
                                              • Instruction ID: 63fe59d21c3204bb36956304e6465891f91a8d1c33931cdb4260937e994dfdac
                                              • Opcode Fuzzy Hash: a1c7110af78753c66d51254993860c29953dfe5dd1b2ea723a78d83534657eed
                                              • Instruction Fuzzy Hash: 1C9002705442119BCE015B51DF094097A61ABC0746F0054A4B04D4403187318850FA16
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetAsyncKeyState.USER32(00000011), ref: 00414983
                                              • GetAsyncKeyState.USER32(00000010), ref: 00414991
                                              • GetAsyncKeyState.USER32(00000012), ref: 0041499A
                                              • Beep.KERNEL32(00000370,00000064), ref: 004149EA
                                              • Sleep.KERNEL32(0000000A,?,?,00416B17,00000110,?,?), ref: 004149F4
                                              • Beep.KERNEL32(00000294,00000064), ref: 004149FC
                                              • Sleep.KERNEL32(0000000A,?,?,00416B17,00000110,?,?), ref: 00414A00
                                              • Beep.KERNEL32(000001B8,00000064), ref: 00414A09
                                              • Sleep.KERNEL32(0000000A,?,?,00416B17,00000110,?,?), ref: 00414A0D
                                              • Beep.KERNEL32(000001B8,00000064), ref: 00414A11
                                              • Sleep.KERNEL32(0000000A,?,?,00416B17,00000110,?,?), ref: 00414A15
                                              • Beep.KERNEL32(00000370,00000064), ref: 00414A41
                                              • Sleep.KERNEL32(0000000A,?,?,00416B17,00000110,?,?), ref: 00414A4B
                                              • Beep.KERNEL32(00000294,00000064), ref: 00414A53
                                              • Sleep.KERNEL32(0000000A,?,?,00416B17,00000110,?,?), ref: 00414A57
                                              • Beep.KERNEL32(000001B8,00000064), ref: 00414A19
                                                • Part of subcall function 0041B778: __EH_prolog3.LIBCMT ref: 0041B786
                                              • Beep.KERNEL32(00000370,00000064), ref: 00414B2A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Beep$Sleep$AsyncState$H_prolog3
                                              • String ID: /LOGIT$/LOGIT:CONSOLE$/LOGITCLOSE$/LOGITHARD$N
                                              • API String ID: 1557865341-3950210016
                                              • Opcode ID: 9eb3dea194acf08c6233e1d54fff39ce2a6dc6fff11a7d789a5eab56f7a89def
                                              • Instruction ID: c5a87f36db212c0bb9e2267d1d77396f30cbf22b73af2f515c19b316c2819d68
                                              • Opcode Fuzzy Hash: 9eb3dea194acf08c6233e1d54fff39ce2a6dc6fff11a7d789a5eab56f7a89def
                                              • Instruction Fuzzy Hash: 3741957178431CBEF12077B69C46FAB3A5CDBC5FA6F150017B6085E1C18AA4AC81CA7B
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0042396C
                                              • _memset.LIBCMT ref: 00423992
                                              • _memset.LIBCMT ref: 004239AA
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              • _strcat.LIBCMT ref: 004239DB
                                              • _strcat.LIBCMT ref: 00423A03
                                              • _strlen.LIBCMT ref: 00423A19
                                              • _strlen.LIBCMT ref: 00423A31
                                              • _memset.LIBCMT ref: 00423AD8
                                              • htons.WS2_32(?), ref: 00423AF9
                                              • inet_ntoa.WS2_32(?), ref: 00423B07
                                              • bind.WS2_32(?,00000002,00000010), ref: 00423B30
                                              • getsockname.WS2_32(?,00000010,00000010), ref: 00423B7C
                                                • Part of subcall function 0042286C: _memset.LIBCMT ref: 004228FC
                                              • htons.WS2_32(?), ref: 00423B8C
                                                • Part of subcall function 0042286C: _memset.LIBCMT ref: 00422A33
                                                • Part of subcall function 0042286C: _memset.LIBCMT ref: 00422A98
                                                • Part of subcall function 0042286C: _memset.LIBCMT ref: 00422AB3
                                                • Part of subcall function 0042286C: _memset.LIBCMT ref: 00422AD4
                                                • Part of subcall function 0042286C: htons.WS2_32(?), ref: 00422B19
                                                • Part of subcall function 0042286C: _strcat.LIBCMT ref: 00422B52
                                              Strings
                                              • TCP::Bind before getsockname(), xrefs: 00423B5A
                                              • hnm, xrefs: 00423AAE
                                              • TCP::Bind after bind() error=%d, xrefs: 00423B37
                                              • .\tcpio.cpp, xrefs: 00423AA9
                                              • TCP::Bind finished, error=%d, xrefs: 00423B9E
                                              • TCP::Bind skt= %d bind to %08x %s %d, xrefs: 00423B17
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset$_strcat_strlenhtons$H_prolog3$bindgetsocknameinet_ntoa
                                              • String ID: .\tcpio.cpp$TCP::Bind after bind() error=%d$TCP::Bind before getsockname()$TCP::Bind finished, error=%d$TCP::Bind skt= %d bind to %08x %s %d$hnm
                                              • API String ID: 2758594260-3944163508
                                              • Opcode ID: 93df0d3a80120af3b001fa63fd6018506adb0642e512ce4edb052ef7572d4360
                                              • Instruction ID: a5c210a97aa25492a5f6b20a739c8426c0cc40936e51197e807548abf7265a6c
                                              • Opcode Fuzzy Hash: 93df0d3a80120af3b001fa63fd6018506adb0642e512ce4edb052ef7572d4360
                                              • Instruction Fuzzy Hash: 467180B2A0024DAFDB20DF95DC85EEF77B8FF08308F50052BF94596192E7789A148B59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00423BFF
                                                • Part of subcall function 00413B91: GetCurrentThreadId.KERNEL32 ref: 00413B9A
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 00423C94
                                              • listen.WS2_32(?,00000020), ref: 00423CD0
                                              Strings
                                              • i<ARRAYMAX(TCPIPIO::InSockets), xrefs: 00423D54
                                              • TCPIPIO::MakeAcceptSocket allocate index i= %d for skt %d, ourid/port= %d, xrefs: 00423D15
                                              • TCPIPIO::MakeAcceptSocket bind ok, xrefs: 00423CC0
                                              • TCPIPIO::MakeAcceptSocket this= %08x, this->OurId= %d/'%s', xrefs: 00423C23
                                              • TCPIPIO::MakeAcceptSocket InSockets[%d].Port is %d, xrefs: 00423C4E
                                              • TCPIPIO::MakeAcceptSocket i= %d, xrefs: 00423C77
                                              • .\tcpio.cpp, xrefs: 00423D4B
                                              • TCPIPIO::MakeAcceptSocket listen ok, xrefs: 00423CDE
                                              • TCPIPIO::MakeAcceptSocket done skt= %d (lasterrorstring= %s), xrefs: 00423E07
                                              • TCPIPIO::MakeAcceptSocket skt=%d bind already done, for i= %d InUse= %d now, xrefs: 00423DE7
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CurrentH_prolog3Threadlistensocket
                                              • String ID: .\tcpio.cpp$TCPIPIO::MakeAcceptSocket InSockets[%d].Port is %d$TCPIPIO::MakeAcceptSocket allocate index i= %d for skt %d, ourid/port= %d$TCPIPIO::MakeAcceptSocket bind ok$TCPIPIO::MakeAcceptSocket done skt= %d (lasterrorstring= %s)$TCPIPIO::MakeAcceptSocket i= %d$TCPIPIO::MakeAcceptSocket listen ok$TCPIPIO::MakeAcceptSocket skt=%d bind already done, for i= %d InUse= %d now$TCPIPIO::MakeAcceptSocket this= %08x, this->OurId= %d/'%s'$i<ARRAYMAX(TCPIPIO::InSockets)
                                              • API String ID: 4193879955-1995298848
                                              • Opcode ID: f522312f3af26f4c5700e36975618d175f4e22eb4e58c10bc0b57361031a16cc
                                              • Instruction ID: f9ecec055b21c823d514bc3d1397ed7d267f8e741ecb02b5bbe852918508ba3f
                                              • Opcode Fuzzy Hash: f522312f3af26f4c5700e36975618d175f4e22eb4e58c10bc0b57361031a16cc
                                              • Instruction Fuzzy Hash: E451C471A00319AFEB04AF95DC82BBE7374FF04305F50012BF915AA2D2DBB85A54C65D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00411C62
                                                • Part of subcall function 004114D2: __EH_prolog3.LIBCMT ref: 004114D9
                                              • _calloc.LIBCMT ref: 00411D00
                                              • FindFirstFileA.KERNEL32(000000FF,00454616), ref: 00411D28
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$FileFindFirst_calloc
                                              • String ID: .\osysfile.cpp$this->pResult
                                              • API String ID: 988821745-615981670
                                              • Opcode ID: 6ea00ff5a1ddfa8962ea28a2249b242aab0ac198c25c437bae0bb072a254e399
                                              • Instruction ID: 7215fe4e75dcef66e8f6694abb576f356704c49b40295f3efc1474d727aafa4d
                                              • Opcode Fuzzy Hash: 6ea00ff5a1ddfa8962ea28a2249b242aab0ac198c25c437bae0bb072a254e399
                                              • Instruction Fuzzy Hash: 5F21F730900304ABCB10EB66CC45BDEB7E0AF54718F10451EF499A72D2DBB85A88CB9D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetLocalTime.KERNEL32(?,00000000,000001FF,00000000), ref: 00412BDF
                                              • _memset.LIBCMT ref: 00412BF8
                                              • GetLocaleInfoA.KERNEL32(00000400,00001003,?,00000040), ref: 00412C11
                                              • GetTimeFormatA.KERNEL32(00000400,00000000,?,?,?,00000040), ref: 00412C28
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Time$FormatH_prolog3InfoLocalLocale_memset_strlen
                                              • String ID: HH:mm:ss
                                              • API String ID: 3034557402-22277939
                                              • Opcode ID: a734b880e691f433aca6e3be4a1f37c3fe29db6f398860c97c5f975782edf330
                                              • Instruction ID: afadd402ac702130e147f99cdf85fff6fe393bb2bab189aa30bdbb142d9987b2
                                              • Opcode Fuzzy Hash: a734b880e691f433aca6e3be4a1f37c3fe29db6f398860c97c5f975782edf330
                                              • Instruction Fuzzy Hash: A5113372A00248ABD710DF94DC45FEF73ACBB48705F50043AFB15AA181D775E6488769
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • IsDebuggerPresent.KERNEL32 ref: 0043FF45
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043FF5A
                                              • UnhandledExceptionFilter.KERNEL32(004625E0), ref: 0043FF65
                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 0043FF81
                                              • TerminateProcess.KERNEL32(00000000), ref: 0043FF88
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                              • String ID:
                                              • API String ID: 2579439406-0
                                              • Opcode ID: c6d9dc96ee7dd945e580811be8c017f80d99e4ae875b5a97247acdb81e62bca7
                                              • Instruction ID: 81ef6ff9f59dde6cee9de8962edf0fe043e1e3e32b542e34c5fffc1bb9d59061
                                              • Opcode Fuzzy Hash: c6d9dc96ee7dd945e580811be8c017f80d99e4ae875b5a97247acdb81e62bca7
                                              • Instruction Fuzzy Hash: 4121E2B4811B05EFD700DF65FC89AAC3BA4BB08315F18187EE919A6261E7B45D80CF0E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strcat$H_prolog3_memset
                                              • String ID:
                                              • API String ID: 4125001314-0
                                              • Opcode ID: f04c460f3c66b323f4c0ca6465695677bb205fabe6da3b1cefd484406b309b04
                                              • Instruction ID: 78cdb62ee02f727c3d5821de16f14d9f3e6c1036ee375c8447cf9d0573f4aad1
                                              • Opcode Fuzzy Hash: f04c460f3c66b323f4c0ca6465695677bb205fabe6da3b1cefd484406b309b04
                                              • Instruction Fuzzy Hash: 3C714B32504284DFDB15CF29C4816E9BBA2AF99304F28C19FE8954F3C2DB75E949CB54
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %0"$(&
                                              • API String ID: 0-2241329031
                                              • Opcode ID: 5e519d904099b938a685834d18427809c74232f1a8917cf1e6af2f0603190e44
                                              • Instruction ID: ad8138867f8276061344c13e4e95954faf2e4ff1dbc3f2bff0971e52c4c14990
                                              • Opcode Fuzzy Hash: 5e519d904099b938a685834d18427809c74232f1a8917cf1e6af2f0603190e44
                                              • Instruction Fuzzy Hash: B0F11530A04255EFEB14CF98D9815ED7BB0FB89320F10157BD85293691C37CAA51EB9E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %0"$(&
                                              • API String ID: 0-2241329031
                                              • Opcode ID: 7a7aa4377836b73b11d3aaa628385ff9120efbf8dbe8250d5486a8d568e9c7c9
                                              • Instruction ID: ac8616b35a1fa8161ef6695b231064841a51b8297868f0c235f5eb63214136ea
                                              • Opcode Fuzzy Hash: 7a7aa4377836b73b11d3aaa628385ff9120efbf8dbe8250d5486a8d568e9c7c9
                                              • Instruction Fuzzy Hash: F4F11630E04255DFEB14CF94D9815ADBBB0FB48311F5015BBE852A3691C37CAA41EB9E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID: %0"$(&
                                              • API String ID: 2102423945-2241329031
                                              • Opcode ID: bc44f4ddac3258f813b4c1e7d02d9470337ff6db7d37890511765db1f4a62d23
                                              • Instruction ID: 1b8ae8a40bbc1579eafbd238087e04f1fb5445504c0ca23ab72ea00a29679695
                                              • Opcode Fuzzy Hash: bc44f4ddac3258f813b4c1e7d02d9470337ff6db7d37890511765db1f4a62d23
                                              • Instruction Fuzzy Hash: 4DE11630A04254DFEB14DFA8D9806EDBBB0FB85320F10557BD452A3691C3BCAA51EB5D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID: %0"$(&
                                              • API String ID: 2102423945-2241329031
                                              • Opcode ID: ffe7dcf2a75b5bc65ad97fb74f7de2cf02280730d7bf55522d47d65e0ef31bc6
                                              • Instruction ID: ef76c328d074b477158c660fa1aac62972363026b575b6b432f9e022bfdf0150
                                              • Opcode Fuzzy Hash: ffe7dcf2a75b5bc65ad97fb74f7de2cf02280730d7bf55522d47d65e0ef31bc6
                                              • Instruction Fuzzy Hash: 48E10631A04215DFEB14CFA8D9815EDBBB0FB85320F14157BE412A3691C37CAA52EB9D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID: %0"$C:/Program Files (x86)/ZOC5/zocdll.dll
                                              • API String ID: 2102423945-3168916105
                                              • Opcode ID: 2f08bc05a081b4e17c60e2f96c4941d2c00e39604466be69670b36dbdb6f2c25
                                              • Instruction ID: e645e24651784129920d70c45f2bf3f3c4073f50e25921057c9caf7dba3133ad
                                              • Opcode Fuzzy Hash: 2f08bc05a081b4e17c60e2f96c4941d2c00e39604466be69670b36dbdb6f2c25
                                              • Instruction Fuzzy Hash: 58B104719082508BE314DF29EC8422E7BA0FB45712F44193FE49297251D3FC9A55DB9F
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • recv.WS2_32(?,?,?,00000000), ref: 00421D05
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: recv
                                              • String ID:
                                              • API String ID: 1507349165-0
                                              • Opcode ID: aa1f4d768fb0b07c85ead104a4e890ec003cb294416da2b899d95d114cf5e5b3
                                              • Instruction ID: 4d33c5ba92b4d64e1347ffb92fadd692690691ab3599a1186399dd306dcbba94
                                              • Opcode Fuzzy Hash: aa1f4d768fb0b07c85ead104a4e890ec003cb294416da2b899d95d114cf5e5b3
                                              • Instruction Fuzzy Hash: 1EB09232048382EBCB02CF40CC04F1EFBA2BBD4701F050C1CB2A0440B0832280A8EB16
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _sprintf$_strrchr
                                              • String ID: $%d.%d$.r.-... %d.%d$C:/Program Files (x86)/ZOC5/zocdll.dll$D$D$D$E$E$E$R$R$R$V$W$W$W$bat$btm$cmd$com$exe$u%03d$x
                                              • API String ID: 1631340146-3203037848
                                              • Opcode ID: bd08a0b6a1b2af43a33013441bcfa17bccd552551078c127822d029c233f8adf
                                              • Instruction ID: 8b9d8b336f22860296beeb133eea6e7b6b49b48e27f446cac0b0605eb564bd7d
                                              • Opcode Fuzzy Hash: bd08a0b6a1b2af43a33013441bcfa17bccd552551078c127822d029c233f8adf
                                              • Instruction Fuzzy Hash: C5E12656B082A55EFB118178E4D23FF6FA2CB23366FD4055AC580672C3E15E0A0ED76E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • _memset.LIBCMT ref: 004228FC
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 004107B9: __EH_prolog3.LIBCMT ref: 004107C0
                                                • Part of subcall function 004107B9: _strpbrk.LIBCMT ref: 00410829
                                                • Part of subcall function 004107B9: _strlen.LIBCMT ref: 00410835
                                                • Part of subcall function 004107B9: _strpbrk.LIBCMT ref: 00410809
                                                • Part of subcall function 004010D1: _strlen.LIBCMT ref: 004010E1
                                              • _sscanf.LIBCMT ref: 004229FF
                                              • _memset.LIBCMT ref: 00422A33
                                              • _memset.LIBCMT ref: 00422A98
                                              • _memset.LIBCMT ref: 00422AB3
                                              • _memset.LIBCMT ref: 00422AD4
                                              • htons.WS2_32(?), ref: 00422B19
                                              • _strcat.LIBCMT ref: 00422B52
                                              • _strcat.LIBCMT ref: 00422B9B
                                              • _calloc.LIBCMT ref: 00422BA9
                                              • __snprintf.LIBCMT ref: 00422BE9
                                              • _memset.LIBCMT ref: 00422CB9
                                              • __snprintf.LIBCMT ref: 00422CD3
                                              • getservbyname.WS2_32(?,tcp), ref: 00422CE6
                                              • htons.WS2_32(?), ref: 00422CF5
                                              • _memset.LIBCMT ref: 00422D2E
                                              • __snprintf.LIBCMT ref: 00422D4A
                                              • _memset.LIBCMT ref: 00422D8D
                                              • __snprintf.LIBCMT ref: 00422D9F
                                                • Part of subcall function 00421E54: __EH_prolog3.LIBCMT ref: 00421E73
                                                • Part of subcall function 00421E54: WSAGetLastError.WS2_32(00000020), ref: 00421E94
                                                • Part of subcall function 00421E54: _memset.LIBCMT ref: 00421EB9
                                                • Part of subcall function 00421E54: _memset.LIBCMT ref: 00421EC9
                                                • Part of subcall function 00421E54: FormatMessageA.KERNEL32(00001000,00000000,?,00000000,00000000,00000100,00000000,?,?,?,?,?,00000020), ref: 00421EDF
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421EE9
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421EFB
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421F0B
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421F1B
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421F27
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset$_strlen$__snprintf$H_prolog3$_strcat_strpbrkhtons$ErrorFormatLastMessage_calloc_sscanfgetservbyname
                                              • String ID: :*#$%d.%d.%d.%d$.\tcpio.cpp$<unknown>$TCPIPIO::Resolv dest= %s, no_iptoname= %d$sizeof(from)==ai->ai_addrlen$tcp
                                              • API String ID: 1380253201-615535906
                                              • Opcode ID: a0c9e35fb5a77c6cb726132c4d7bf54fef85cc479afd3bc95c692d6b1e554ee5
                                              • Instruction ID: a4f1796767292ce5ac12154cf7bb4a2b66e4afed49f29eddc671ec8d3a14cc5f
                                              • Opcode Fuzzy Hash: a0c9e35fb5a77c6cb726132c4d7bf54fef85cc479afd3bc95c692d6b1e554ee5
                                              • Instruction Fuzzy Hash: A9F1BF7190025DAFDB20DF95CD81EEEBBB8FF08304F50446AF919A7252E7785A44CB68
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              • "%s" %s, xrefs: 00413955
                                              • StartProgram done ok= %d, xrefs: 00413B5F
                                              • OSYS::StartProgram rc= %d, xrefs: 00413A5A
                                              • OSYS::StartProgram getlasterrorstring returned %s, xrefs: 00413B0B
                                              • OSYS::StartProgram GetExitCodeProcess returned %d/%s, xrefs: 00413ACC
                                              • %s %s, xrefs: 0041395C
                                              • OSYS::StartProgram %s %s (sync= %d), xrefs: 0041390D
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset$_strcat_strlen$CloseHandleProcess$CodeCreateExitH_prolog3ObjectSingleWait__strdup_malloc_sprintf
                                              • String ID: "%s" %s$%s %s$OSYS::StartProgram %s %s (sync= %d)$OSYS::StartProgram GetExitCodeProcess returned %d/%s$OSYS::StartProgram getlasterrorstring returned %s$OSYS::StartProgram rc= %d$StartProgram done ok= %d
                                              • API String ID: 460157589-2564592107
                                              • Opcode ID: fe917367b0bc33d998fdebb364a074d108c8b68598e2a7b22ed9481c223aa0d1
                                              • Instruction ID: 9f2b3d5c1fd165245e772616ec3f9f7a25e2046d9ef45835da7d579dc45c3d50
                                              • Opcode Fuzzy Hash: fe917367b0bc33d998fdebb364a074d108c8b68598e2a7b22ed9481c223aa0d1
                                              • Instruction Fuzzy Hash: 50B17BB1D00209AFDF20DF94CC81AEEBBB9FF08305F10412BE955A7281E7795A858B59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041D41F
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              • __time64.LIBCMT ref: 0041D485
                                                • Part of subcall function 0043A1AD: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,00418444,?,000001FF), ref: 0043A1B6
                                                • Part of subcall function 0043A1AD: __aulldiv.LIBCMT ref: 0043A1D6
                                                • Part of subcall function 00438DC2: ___getgmtimebuf.LIBCMT ref: 00438DC3
                                              • _strftime.LIBCMT ref: 0041D4AB
                                                • Part of subcall function 0043B51C: __Strftime_l.LIBCMT ref: 0043B530
                                              • _memset.LIBCMT ref: 0041D4BD
                                              • GetTimeZoneInformation.KERNEL32(00000000,?,?,?,?,00454616,000004E4,00454616,000004E4,0000006C), ref: 0041D4C9
                                              • _strlen.LIBCMT ref: 0041D52D
                                              • _sprintf.LIBCMT ref: 0041D53B
                                                • Part of subcall function 0040F93F: _strlen.LIBCMT ref: 0040F95F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Time_strlen$H_prolog3$FileInformationStrftime_lSystemZone___getgmtimebuf__aulldiv__time64_memset_sprintf_strftime
                                              • String ID: %c%02d%02d$ reader to display this message.$"$" <$%a, %d %b %Y %H:%M:%S$--$Content-Type: multipart/mixed; boundary="$Content-Type: text/plain$Date: $EMAIL::CreateMailString datebuf= %s$EMAIL::CreateMailString zone=%d, tz.Bias= %d, tz.DaylightBias= %d$From: $MIME-Version: 1.0$Please use a MIME compliant mail$Subject: $This is a multi-part MIME message$To: $pGE
                                              • API String ID: 1090602794-171040760
                                              • Opcode ID: aaa7ef071b09f823b0aaf3ed8427fa3538475bb95462163fc0bb7b2e5343b8c3
                                              • Instruction ID: 9edeb56dc9fe65db37b10f36e21e30427d5513483332f22ba7b88789e17771b4
                                              • Opcode Fuzzy Hash: aaa7ef071b09f823b0aaf3ed8427fa3538475bb95462163fc0bb7b2e5343b8c3
                                              • Instruction Fuzzy Hash: FBE120B0E00108BBDB29EBA5CC92BBE726A9F5430CF14403EB405B76D2DB7C5D499769
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041A79F
                                              • _memset.LIBCMT ref: 0041A7B2
                                              • GetTextMetricsA.GDI32(?,?), ref: 0041A7C1
                                              • _memset.LIBCMT ref: 0041A7D1
                                              • GetDeviceCaps.GDI32(?,00000058), ref: 0041A7E4
                                              • GetDeviceCaps.GDI32(?,0000005A), ref: 0041A7EE
                                              • _strcat.LIBCMT ref: 0041A81B
                                              • CreateFontIndirectA.GDI32(?), ref: 0041A826
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                                • Part of subcall function 00413B91: GetCurrentThreadId.KERNEL32 ref: 00413B9A
                                              • SelectObject.GDI32(?,?), ref: 0041A860
                                              • GetTextExtentPoint32A.GDI32(?,0045B720,00000001,?), ref: 0041A877
                                              • _strlen.LIBCMT ref: 0041A8F0
                                              • SetTextAlign.GDI32(?,?), ref: 0041A9F3
                                              • MoveToEx.GDI32(?,?,?,00000000), ref: 0041AA0D
                                              • TextOutA.GDI32(?,00000000,00000000,?,?), ref: 0041AA26
                                              • SelectObject.GDI32(?,?), ref: 0041AA4B
                                              • DeleteObject.GDI32(?), ref: 0041AA54
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Text$Object_memset$CapsDeviceH_prolog3Select$AlignCreateCurrentDeleteErrorExtentFontIndirectLastMetricsMovePoint32Thread__snprintf_strcat_strlen
                                              • String ID: %COMPUTERNAME%$%DATE%$%PAGE%$%TIME%$%USERNAME%$.\printer_win32.cpp$Arial$hfont
                                              • API String ID: 411745296-769191020
                                              • Opcode ID: 4344baf39eaa0199fa139c6f280d03052772baec5c9b33d4fb72077a0452d01f
                                              • Instruction ID: de87ddb849c0eccfc1112d34385da5888fa828342e71014327147372c3aa2823
                                              • Opcode Fuzzy Hash: 4344baf39eaa0199fa139c6f280d03052772baec5c9b33d4fb72077a0452d01f
                                              • Instruction Fuzzy Hash: 3F918E71500248EFDB10EFA4DD86ADD7BF4EF18705F10012AF905A7292DB78EA48CB29
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00414BD5
                                              • _memset.LIBCMT ref: 00414BFE
                                              • LoadLibraryA.KERNEL32(dbghelp.dll,00000000,00000000,00000000,00000000,00000000,?,?,000001A0), ref: 00414D27
                                              • GetProcAddress.KERNEL32(00000000,MiniDumpWriteDump), ref: 00414D3D
                                              • GetCurrentThreadId.KERNEL32 ref: 00414D58
                                                • Part of subcall function 00437ED0: __lock.LIBCMT ref: 00437EEE
                                                • Part of subcall function 00437ED0: ___sbh_find_block.LIBCMT ref: 00437EF9
                                                • Part of subcall function 00437ED0: ___sbh_free_block.LIBCMT ref: 00437F08
                                                • Part of subcall function 00437ED0: RtlFreeHeap.NTDLL(00000000,?,00469980,0000000C,00443465,00000000,00469F50,0000000C,0044349D,?,?,?,004388FB,00000004,004699E0,0000000C), ref: 00437F38
                                                • Part of subcall function 00437ED0: GetLastError.KERNEL32(?,004388FB,00000004,004699E0,0000000C,00442E08,?,?,00000000,00000000,00000000,0043FA2F,00000001,00000214,?,00000000), ref: 00437F49
                                              • __itoa.LIBCMT ref: 00414DBB
                                                • Part of subcall function 0043C586: _xtoa@16.LIBCMT ref: 0043C5A4
                                              • _strcat.LIBCMT ref: 00414DCB
                                              • _sprintf.LIBCMT ref: 00414EB5
                                              • CreateFileA.KERNEL32(?,40000000,00000002,00000000,00000002,00000080,00000000,00454616,000004E4,004595B8,00454616,00000001,00470834,0047084C), ref: 00414EF3
                                              • GetCurrentProcessId.KERNEL32(00000000,?,?,00000000,00000000,?,?,000001A0), ref: 00414F17
                                              • GetCurrentProcess.KERNEL32(00000000,?,?,000001A0), ref: 00414F1E
                                              • CloseHandle.KERNEL32(00000000,?,?,000001A0), ref: 00414F29
                                                • Part of subcall function 0040F93F: _strlen.LIBCMT ref: 0040F95F
                                                • Part of subcall function 0041F5E6: _memset.LIBCMT ref: 0041F5F5
                                                • Part of subcall function 0041F601: __fread_nolock.LIBCMT ref: 0041F65C
                                                • Part of subcall function 0041F601: __fread_nolock.LIBCMT ref: 0041F68B
                                              Strings
                                              • The program %s has encountered an error and will be terminated.You can choose to create a file containing crash-debugging information,which you can then email to EmTec:Filename: %sDo you now want to create the crash-information file?, xrefs: 00414EA5, 00414EB0, 00414EB4
                                              • dbghelp.dll, xrefs: 00414CED
                                              • .dmp, xrefs: 00414E6F
                                              • EmTec.CrashInfo., xrefs: 00414E1B
                                              • EMTECAPP::WriteDumpToFileHandler failed to load dll or proc address (%08x/%08x), xrefs: 00414F9C
                                              • EMTECAPP::WriteDumpToFileHandler dump file written, xrefs: 00414F7C
                                              • MiniDumpWriteDump, xrefs: 00414D37
                                              • EMTECAPP::WriteDumpToFileHandler finished, xrefs: 00414FA9
                                              • .gz, xrefs: 00414F40
                                              • EMTECAPP::WriteDumpToFileHandler entered, xrefs: 00414BE0
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Current$Process__fread_nolock_memset$AddressCloseCreateErrorFileFreeH_prolog3HandleHeapLastLibraryLoadProcThread___sbh_find_block___sbh_free_block__itoa__lock_sprintf_strcat_strlen_xtoa@16
                                              • String ID: .dmp$.gz$EMTECAPP::WriteDumpToFileHandler dump file written$EMTECAPP::WriteDumpToFileHandler entered$EMTECAPP::WriteDumpToFileHandler failed to load dll or proc address (%08x/%08x)$EMTECAPP::WriteDumpToFileHandler finished$EmTec.CrashInfo.$MiniDumpWriteDump$The program %s has encountered an error and will be terminated.You can choose to create a file containing crash-debugging information,which you can then email to EmTec:Filename: %sDo you now want to create the crash-information file?$dbghelp.dll
                                              • API String ID: 1412181423-975744805
                                              • Opcode ID: 258bd4c5546637af212bd5a773151d5f962bcdc9fbcd58e8affa2c0c6cd285ef
                                              • Instruction ID: 32967b7bc490c625620c72a5cd5a3e9694e12f9ab8f301fc07ae11e0a076406e
                                              • Opcode Fuzzy Hash: 258bd4c5546637af212bd5a773151d5f962bcdc9fbcd58e8affa2c0c6cd285ef
                                              • Instruction Fuzzy Hash: D9C1A071D00248EFDB10EBA5CC46ADEBBB4AB14308F20416EF515B72D2EB785A49CB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0042321A
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5CA
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5F1
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B646
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B66F
                                              • _memset.LIBCMT ref: 0042328C
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 0041B3FE: MessageBoxA.USER32(00000000,00000000,?,00000014), ref: 0041B6F3
                                                • Part of subcall function 0042286C: _memset.LIBCMT ref: 004228FC
                                              • inet_ntoa.WS2_32(?), ref: 00423336
                                              • htons.WS2_32(00000000), ref: 00423362
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 00423371
                                              • connect.WS2_32(00000000,00000000,00000010), ref: 004233C7
                                              • WSAGetLastError.WS2_32 ref: 004233D0
                                              • inet_ntoa.WS2_32(?), ref: 00423455
                                              • _sprintf.LIBCMT ref: 0042346A
                                                • Part of subcall function 00421F9C: __EH_prolog3.LIBCMT ref: 00421FBB
                                                • Part of subcall function 00421F9C: _memset.LIBCMT ref: 00421FEB
                                                • Part of subcall function 00421F9C: _memset.LIBCMT ref: 00421FFB
                                                • Part of subcall function 00421F9C: getsockopt.WS2_32(?,0000FFFF,00001007,?,00000004), ref: 0042201B
                                                • Part of subcall function 00421F9C: FormatMessageA.KERNEL32(00001000,00000000,?,00000000,00000000,00000100,00000000,?,?,?,?,?,00000024), ref: 00422031
                                                • Part of subcall function 00421F9C: _strlen.LIBCMT ref: 0042203B
                                                • Part of subcall function 00421F9C: _strlen.LIBCMT ref: 0042204D
                                                • Part of subcall function 00421F9C: _strlen.LIBCMT ref: 0042205D
                                                • Part of subcall function 00421F9C: _strlen.LIBCMT ref: 0042206D
                                                • Part of subcall function 00421F9C: _strlen.LIBCMT ref: 00422079
                                              • closesocket.WS2_32(00000000), ref: 004234D0
                                              • WSAGetLastError.WS2_32(?,00000000,000004E4), ref: 00423557
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strlen$_memset$H_prolog3$ErrorLast_sprintf$Message_fprintfinet_ntoa$Format__snprintfclosesocketconnectgetsockopthtonssocket
                                              • String ID: !this->DevIsConnected()$!this->IsDead$%s (%s)$.\tcpio.cpp$TCPIPIO::MakeCall$TCPIPIO::MakeCall after connect(): rc= %d$TCPIPIO::MakeCall after resolv() hnm= %08x host %s/%s, port= %d$TCPIPIO::MakeCall after socket(): sock= %d$TCPIPIO::MakeCall sock %d in writefds$TCPIPIO::MakeCall(%s)$TCPIPIO::~MakeCall last error= %d WSABASEERR+%d
                                              • API String ID: 129376235-4281641237
                                              • Opcode ID: 0550efdde3bf1711dfb060afa60386cc812a1520f6ee2f529c9b82bf9ed5c5bb
                                              • Instruction ID: f84bd398aa0b8edb1ca1b1d189ff3eeded0742f734d36885d07a4d4526fa10e7
                                              • Opcode Fuzzy Hash: 0550efdde3bf1711dfb060afa60386cc812a1520f6ee2f529c9b82bf9ed5c5bb
                                              • Instruction Fuzzy Hash: 12A1D071A00309AFDB10EFA4DC46BEE77B8FF04319F10052EF965961D1E7789A848B59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 00423E51
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5CA
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5F1
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B646
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B66F
                                              • accept.WS2_32(?,?,00000010), ref: 00423F29
                                              • WSAGetLastError.WS2_32 ref: 00423F36
                                              • getpeername.WS2_32(?,?,?), ref: 00424000
                                              • gethostbyaddr.WS2_32(?,00000004,?), ref: 00424024
                                              • inet_ntoa.WS2_32(?), ref: 0042403A
                                              • _sprintf.LIBCMT ref: 0042404C
                                              • inet_ntoa.WS2_32(?), ref: 0042405F
                                              • _strcat.LIBCMT ref: 00424067
                                                • Part of subcall function 00421E54: __EH_prolog3.LIBCMT ref: 00421E73
                                                • Part of subcall function 00421E54: WSAGetLastError.WS2_32(00000020), ref: 00421E94
                                                • Part of subcall function 00421E54: _memset.LIBCMT ref: 00421EB9
                                                • Part of subcall function 00421E54: _memset.LIBCMT ref: 00421EC9
                                                • Part of subcall function 00421E54: FormatMessageA.KERNEL32(00001000,00000000,?,00000000,00000000,00000100,00000000,?,?,?,?,?,00000020), ref: 00421EDF
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421EE9
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421EFB
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421F0B
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421F1B
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421F27
                                              Strings
                                              • TCPIPIO::AcceptCall accepted 2, xrefs: 00424006
                                              • !this->DevIsConnected(), xrefs: 00423E9A
                                              • TCPIPIO::~AcceptCall, xrefs: 004240DF
                                              • TCPIPIO::AcceptCall accepted call from %s, xrefs: 00424074
                                              • .\tcpio.cpp, xrefs: 00423E7B, 00423E80, 00423E99, 00423ED6
                                              • !this->IsDead, xrefs: 00423E81
                                              • TCPIPIO::AcceptCall, xrefs: 00423E5A
                                              • TCPIPIO::AcceptCall aborted due to InSocket==-1, looks like destructor or dropcall was called, xrefs: 00423F8F
                                              • TCPIPIO::AcceptCall accepted ok, skt=%d, xrefs: 00423FA6
                                              • this->InSocket==-1 || (int)this->OurId==0, xrefs: 00423ED7
                                              • %s (%s), xrefs: 00424046
                                              • TCPIPIO::AcceptCall error, xrefs: 004240CC
                                              • TCPIPIO::AcceptCall accept() returned skt==-1, LastError=%d/%s, xrefs: 00423F5A
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strlen$ErrorLast_memset_sprintf$H_prolog3_fprintfinet_ntoa$FormatH_prolog3_Message__snprintf_strcatacceptgethostbyaddrgetpeername
                                              • String ID: !this->DevIsConnected()$!this->IsDead$%s (%s)$.\tcpio.cpp$TCPIPIO::AcceptCall$TCPIPIO::AcceptCall aborted due to InSocket==-1, looks like destructor or dropcall was called$TCPIPIO::AcceptCall accept() returned skt==-1, LastError=%d/%s$TCPIPIO::AcceptCall accepted 2$TCPIPIO::AcceptCall accepted call from %s$TCPIPIO::AcceptCall accepted ok, skt=%d$TCPIPIO::AcceptCall error$TCPIPIO::~AcceptCall$this->InSocket==-1 || (int)this->OurId==0
                                              • API String ID: 446236285-3640719151
                                              • Opcode ID: 3b2c2cb99fb4b12ae5de073c81d2e619ffadac9e2a0f0a3b858dead03fc1e6a4
                                              • Instruction ID: 73fe5e83fdac3baf48c867db7f613a4406ec0c6b2f47f8a3ad0caff589f47dce
                                              • Opcode Fuzzy Hash: 3b2c2cb99fb4b12ae5de073c81d2e619ffadac9e2a0f0a3b858dead03fc1e6a4
                                              • Instruction Fuzzy Hash: BB61C570A00308AFDB24AFB5DC46BEE77B8EF44705F50042FF915A6192DB7C6A498B19
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              • modifiers: -q quiet mode (-qq => quieter) -n never overwrite existing files -a auto-convert any text files -o overwrite files WITHOUT prompting -aa treat ALL files as text -j junk paths (don't make dire, xrefs: 0042DE97
                                              • main listing-format options: -s short Unix "ls -l" format (def.) -1 filenames ONLY, one per line -m medium Unix "ls -l" format -2 just filenames but allow -h/-t/-z -l long Unix "ls -l" format , xrefs: 0042DE45
                                              • ReadMe, xrefs: 0042DEA5, 0042DEAA, 0042DEAB
                                              • -c extract files to stdout/screen (CRT) -l list files (short format) -p extract files to pipe, no messages -v list files (verbose format) -f freshen existing files, create none -t test compressed archive data -u update files, create if , xrefs: 0042DE7A
                                              • -Z => ZipInfo mode ("unzip -Z" for usage)., xrefs: 0042DE65
                                              • 2.0 of 7 February 1994, xrefs: 0042DE35
                                              • -$ label removables (-$$ => fixed disks), xrefs: 0042DE8E
                                              • [-Z] , xrefs: 0042DE6A
                                              • unzip -p foo | more => send contents of foo.zip via pipe into program more, xrefs: 0042DEAC
                                              • Usage: unzip %s[-opts[modifiers]] file[.zip] [list] [-x xlist] [-d exdir] Default action is to extract files in list, except those in xlist, to exdir; file[.zip] may be a wildcard. %s, xrefs: 0042DE6F
                                              • ZipInfo %s, by Newtware and the fine folks at Info-ZIP.List name, date/time, attribute, size, compression method, etc., about filesin list (excluding those in xlist) contained in the specified .zip archive(s)."file[.zip]" may be a wildcard name containing , xrefs: 0042DE3A
                                              • UnZip %s, by Info-ZIP. Portions (c) 1989 by S. H. Smith.Send bug reports to authors at zip-bugs@wkuvx1.wku.edu; see README for details., xrefs: 0042DE5A
                                              • -s spaces in filenames => '_', xrefs: 0042DE85
                                              • 5.1 of 7 February 1994, xrefs: 0042DE55
                                              • Examples (see unzip.doc for more info): unzip data1 -x joe => extract all files except joe from zipfile data1.zip %s unzip -fo foo %-6s => quietly replace existing %s if archive file newer, xrefs: 0042DEB1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _fprintf$__ftbuf__output_l__stbuf
                                              • String ID: main listing-format options: -s short Unix "ls -l" format (def.) -1 filenames ONLY, one per line -m medium Unix "ls -l" format -2 just filenames but allow -h/-t/-z -l long Unix "ls -l" format $ -s spaces in filenames => '_'$ -c extract files to stdout/screen (CRT) -l list files (short format) -p extract files to pipe, no messages -v list files (verbose format) -f freshen existing files, create none -t test compressed archive data -u update files, create if $ -$ label removables (-$$ => fixed disks)$-Z => ZipInfo mode ("unzip -Z" for usage).$2.0 of 7 February 1994$5.1 of 7 February 1994$Examples (see unzip.doc for more info): unzip data1 -x joe => extract all files except joe from zipfile data1.zip %s unzip -fo foo %-6s => quietly replace existing %s if archive file newer$ReadMe$UnZip %s, by Info-ZIP. Portions (c) 1989 by S. H. Smith.Send bug reports to authors at zip-bugs@wkuvx1.wku.edu; see README for details.$Usage: unzip %s[-opts[modifiers]] file[.zip] [list] [-x xlist] [-d exdir] Default action is to extract files in list, except those in xlist, to exdir; file[.zip] may be a wildcard. %s$ZipInfo %s, by Newtware and the fine folks at Info-ZIP.List name, date/time, attribute, size, compression method, etc., about filesin list (excluding those in xlist) contained in the specified .zip archive(s)."file[.zip]" may be a wildcard name containing $[-Z] $modifiers: -q quiet mode (-qq => quieter) -n never overwrite existing files -a auto-convert any text files -o overwrite files WITHOUT prompting -aa treat ALL files as text -j junk paths (don't make dire$unzip -p foo | more => send contents of foo.zip via pipe into program more
                                              • API String ID: 1591213610-3258946459
                                              • Opcode ID: 59dded01f7fb495cb2f4637b836dac185cf73b54146ce570a513b401aab65abb
                                              • Instruction ID: c81c30eb9ef5b20270438dd7bdb15b1fd7df5a3f909f22f6038f1c6e7f88b0e4
                                              • Opcode Fuzzy Hash: 59dded01f7fb495cb2f4637b836dac185cf73b54146ce570a513b401aab65abb
                                              • Instruction Fuzzy Hash: 1101BCB1BC172072D2A076109C0BF6F10088F39B4AF264627B844BA1C3F6EC6A1141EF
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _fprintf$_strcat$_strrchr$_flsall
                                              • String ID: was$%d "zipfiles" were directories.$%d archive%s had fatal errors.$%d archive%s had warnings but no fatal errors.$%d archive%s successfully processed.$%d file%s had no zipfile directory.$.zip$1 "zipfile" was a directory.$No zipfiles found.$s were
                                              • API String ID: 1335468881-1475570261
                                              • Opcode ID: f928747ab51a0ec33ed83665186d12e698fc02871362f86f2086615b8d61531c
                                              • Instruction ID: 5e131f71e70b1127eb4c862e398cbca7e20acfaaab4c8766cc04d4663deef660
                                              • Opcode Fuzzy Hash: f928747ab51a0ec33ed83665186d12e698fc02871362f86f2086615b8d61531c
                                              • Instruction Fuzzy Hash: 5781B572F04219ABDF20ABD7EC47B7E7674EF14308F68146FE500A2252D67D9D40869E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5CA
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5F1
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B646
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B66F
                                                • Part of subcall function 0041B3FE: MessageBoxA.USER32(00000000,00000000,?,00000014), ref: 0041B6F3
                                                • Part of subcall function 0041BF40: SysFreeString.OLEAUT32(00000000), ref: 0041C07A
                                              • CoCreateInstance.OLE32(0045CCDC,00000000,00000001,0045CCEC,?), ref: 0041C191
                                              • SysAllocString.OLEAUT32(?), ref: 0041C1C2
                                              • SysAllocString.OLEAUT32(?), ref: 0041C21F
                                              • SysStringLen.OLEAUT32(?), ref: 0041C232
                                              • SysFreeString.OLEAUT32(?), ref: 0041C299
                                              • SysFreeString.OLEAUT32(?), ref: 0041C29E
                                              Strings
                                              • FIREWALL::AddApplication() appname=%s, xrefs: 0041C0C7
                                              • FIREWALL::AddApplication() get_AuthorizedApplications failed: 0x%08lx, xrefs: 0041C179
                                              • FIREWALL::AddApplication() failed: 0x%08lx, xrefs: 0041C14B
                                              • FIREWALL::AddApplication() Application %s is now added to the firewall, xrefs: 0041C27B
                                              • .\firewall.cpp, xrefs: 0041C0DE, 0041C0E3, 0041C0F8, 0041C10E
                                              • this->boolUpAndRunning, xrefs: 0041C0E4
                                              • FIREWALL::AddApplication() put_ProcessImageFileName failed: 0x%08lx, xrefs: 0041C204
                                              • FIREWALL::AddApplication() CoCreateInstance failed: 0x%08lx, xrefs: 0041C19F
                                              • FIREWALL::~AddApplication(), xrefs: 0041C2BC
                                              • friendlyname, xrefs: 0041C10F
                                              • appname, xrefs: 0041C0F9
                                              • FIREWALL::AddApplication() put_Name failed: 0x%08lx, xrefs: 0041C250
                                              • FIREWALL::AddApplication() Application is already added, xrefs: 0041C285
                                              • FIREWALL::AddApplication() SysAllocString failed: 0x%08lx, xrefs: 0041C1E6
                                              • FIREWALL::AddApplication() Add failed: 0x%08lx, xrefs: 0041C26E
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: String$Free$Alloc_fprintf_sprintf$CreateErrorH_prolog3InstanceLastMessage__snprintf_memset
                                              • String ID: .\firewall.cpp$FIREWALL::AddApplication() Add failed: 0x%08lx$FIREWALL::AddApplication() Application %s is now added to the firewall$FIREWALL::AddApplication() Application is already added$FIREWALL::AddApplication() CoCreateInstance failed: 0x%08lx$FIREWALL::AddApplication() SysAllocString failed: 0x%08lx$FIREWALL::AddApplication() appname=%s$FIREWALL::AddApplication() failed: 0x%08lx$FIREWALL::AddApplication() get_AuthorizedApplications failed: 0x%08lx$FIREWALL::AddApplication() put_Name failed: 0x%08lx$FIREWALL::AddApplication() put_ProcessImageFileName failed: 0x%08lx$FIREWALL::~AddApplication()$appname$friendlyname$this->boolUpAndRunning
                                              • API String ID: 145553169-3139093960
                                              • Opcode ID: be3114621444a599238903072c5128f25ae40242bf6d656d223780fa1294a45f
                                              • Instruction ID: 0d495be4249b5cc1d586a1c9b5cd5f098dc9ad7390276dab326942c1243a3079
                                              • Opcode Fuzzy Hash: be3114621444a599238903072c5128f25ae40242bf6d656d223780fa1294a45f
                                              • Instruction Fuzzy Hash: 15516F70A80218FFCB009FA5CC85EEE7BB9EF44705F20406BF805A6292D7785985DB99
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • _strcpy_s.LIBCMT ref: 004436F0
                                              • __invoke_watson.LIBCMT ref: 00443701
                                              • GetModuleFileNameA.KERNEL32(00000000,00489AD1,00000104), ref: 0044371D
                                              • _strcpy_s.LIBCMT ref: 00443732
                                              • __invoke_watson.LIBCMT ref: 00443745
                                              • _strlen.LIBCMT ref: 0044374E
                                              • _strlen.LIBCMT ref: 0044375B
                                              • __invoke_watson.LIBCMT ref: 00443788
                                              • _strcat_s.LIBCMT ref: 0044379B
                                              • __invoke_watson.LIBCMT ref: 004437AC
                                              • _strcat_s.LIBCMT ref: 004437BD
                                              • __invoke_watson.LIBCMT ref: 004437CE
                                              • GetStdHandle.KERNEL32(000000F4,?,?,00000000,76EC5E70,00000003,00443850,000000FC,00437FD5,00000001,00000000,00000000,?,00442DC2,?,00000001), ref: 004437ED
                                              • _strlen.LIBCMT ref: 0044380E
                                              • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,00442DC2,?,00000001,?,0044340E,00000018,00469F50,0000000C,0044349D,?), ref: 00443818
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __invoke_watson$_strlen$File_strcat_s_strcpy_s$HandleModuleNameWrite
                                              • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                              • API String ID: 1879448924-4022980321
                                              • Opcode ID: 2b173ce02994bfd1ff118d10324e9da42cefed77c6bc8a9c24a296f30bae393f
                                              • Instruction ID: 9cdf851f7319f97c234aba2b513937a4af79f96d6caeed6fc274dce729b95fe6
                                              • Opcode Fuzzy Hash: 2b173ce02994bfd1ff118d10324e9da42cefed77c6bc8a9c24a296f30bae393f
                                              • Instruction Fuzzy Hash: 003115E2A003153AFA203A265C46F6F765C9B11B5AF14413BFE45A1293FA5DDA1082FE
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 004223BF
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 00410409: __vsnprintf.LIBCMT ref: 00410452
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3H_prolog3___vsnprintf_strlen
                                              • String ID: .\tcpio.cpp$ACCEPTPORT$BANDWIDTH$CALLERID$DEVICENAME$FALSE$IDLE_TIME$LASTERROR$LASTERRORCLASS$LASTERRORSTRING$ONLINE$OWNID$SOCKET$TCPIP$WSALASTERRORSTRING
                                              • API String ID: 2169032328-1447373423
                                              • Opcode ID: 28ac3450a6fd6e0041946e3f8021c9285606d5c8fc64eba0529bb806dccee52a
                                              • Instruction ID: aec708d039b01389e1deb601e250846b39fc9175c7c2d7eaa08ea155be836ead
                                              • Opcode Fuzzy Hash: 28ac3450a6fd6e0041946e3f8021c9285606d5c8fc64eba0529bb806dccee52a
                                              • Instruction Fuzzy Hash: 36D19071E00258BADF21EBA1DD46BDEBB74AF14308F14403BFC05761D3E6B84A49DA69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • _wcschr.LIBCMT ref: 00447C24
                                              • ___crtGetEnvironmentStringsW.LIBCMT ref: 00447C6F
                                              • __wsetenvp.LIBCMT ref: 00447C79
                                              • ___mbtow_environ.LIBCMT ref: 00447C82
                                              • __malloc_crt.LIBCMT ref: 00447CAD
                                              • __malloc_crt.LIBCMT ref: 00447CC8
                                              • __recalloc_crt.LIBCMT ref: 00447D42
                                              • __recalloc_crt.LIBCMT ref: 00447D7E
                                              • __calloc_crt.LIBCMT ref: 00447DBA
                                              • _wcscpy_s.LIBCMT ref: 00447DDE
                                              • __invoke_watson.LIBCMT ref: 00447DEF
                                              • SetEnvironmentVariableW.KERNEL32(00000000,0043C79D,?,?,?,?,00000000,00000000,?,?,?,?,0043C79D,?,00000000), ref: 00447E18
                                              • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,?,?,?,0043C79D,?,00000000), ref: 00447E22
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,00000000,00000000), ref: 00447E5A
                                              • __calloc_crt.LIBCMT ref: 00447E6A
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,?,00000000,00000000,?,?,?,?,00000000,00000000), ref: 00447E85
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000002,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,00000000,00000000), ref: 00447E99
                                              • __calloc_crt.LIBCMT ref: 00447EA5
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000002,000000FF,00000000,?,00000000,00000000,?,?,?,?,00000000,00000000), ref: 00447EBE
                                              • SetEnvironmentVariableA.KERNEL32(?,?,?,?,?,?,00000000,00000000,?,?,?,?,0043C79D,?), ref: 00447EDE
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$Environment__calloc_crt$Variable__malloc_crt__recalloc_crt$ErrorLastStrings___crt___mbtow_environ__invoke_watson__wsetenvp_wcschr_wcscpy_s
                                              • String ID:
                                              • API String ID: 1513918819-0
                                              • Opcode ID: ec6648d9b026d98caec469b5b610685eb70968e0373dd1280c99af67acf8d898
                                              • Instruction ID: 5f657883fc8b45651bf58b827eaec470c68bd1e7227da8910a2a10fbe5650333
                                              • Opcode Fuzzy Hash: ec6648d9b026d98caec469b5b610685eb70968e0373dd1280c99af67acf8d898
                                              • Instruction Fuzzy Hash: 4CA1F6B1909215AFEF219FA5DC818AF7BB4EF04765F24066BF110E6290DB394D42CB9C
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041B420
                                              • _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041036C: __EH_prolog3.LIBCMT ref: 00410373
                                                • Part of subcall function 0041036C: _strlen.LIBCMT ref: 004103B5
                                                • Part of subcall function 0041036C: _strlen.LIBCMT ref: 004103E2
                                              • GetLastError.KERNEL32 ref: 0041B519
                                              • __snprintf.LIBCMT ref: 0041B550
                                              • _sprintf.LIBCMT ref: 0041B5CA
                                              • _sprintf.LIBCMT ref: 0041B5F1
                                              • _fprintf.LIBCMT ref: 0041B646
                                              • _fprintf.LIBCMT ref: 0041B66F
                                                • Part of subcall function 00412A8A: __EH_prolog3.LIBCMT ref: 00412AA9
                                                • Part of subcall function 00412A8A: GetLastError.KERNEL32(00000008), ref: 00412ACB
                                                • Part of subcall function 00412A8A: _memset.LIBCMT ref: 00412AED
                                                • Part of subcall function 00412A8A: FormatMessageA.KERNEL32(00001000,00000000,FFFFED99,00000000,00000000,00000100,00000000,?,?,00000008), ref: 00412B0C
                                              • MessageBoxA.USER32(00000000,00000000,?,00000014), ref: 0041B6F3
                                              Strings
                                              • Es ist eine unerwartete Situation aufgetreten!Bitte melden Sie die Umstaende des Fehlers und die folgendenInformationen an uns (siehe auch Datei assert.log im Ordner,in dem das Programm installiert wurde):%sWollen Sie jetzt versuchen mit dem Programm fo, xrefs: 0041B5E0, 0041B5EC, 0041B5F0
                                              • Condition: %s Location : %s line %d Last Err.: %dL (%s) Add. Info: %s, xrefs: 0041B5A4, 0041B5C2
                                              • assert.log, xrefs: 0041B60C
                                              • Unexpected condition encountered!Please contact us via our web site and provide the following information (logged in assert.log file in the program's installation folder):%sDo you want to try to continue with the program?, xrefs: 0041B5D9
                                              • Bedingung: %s Datei: %s Zeile %d Code : %dL (%s) Info : %s, xrefs: 0041B59D
                                              • *** ASSERTION FAILED: %s, xrefs: 0041B5FD
                                              • %s, xrefs: 0041B669
                                              • --- %s --- %s %s ---, xrefs: 0041B640
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$ErrorLastMessage_fprintf_memset_sprintf_strlen$Format__snprintf
                                              • String ID: Bedingung: %s Datei: %s Zeile %d Code : %dL (%s) Info : %s$ Condition: %s Location : %s line %d Last Err.: %dL (%s) Add. Info: %s$%s$*** ASSERTION FAILED: %s$--- %s --- %s %s ---$Es ist eine unerwartete Situation aufgetreten!Bitte melden Sie die Umstaende des Fehlers und die folgendenInformationen an uns (siehe auch Datei assert.log im Ordner,in dem das Programm installiert wurde):%sWollen Sie jetzt versuchen mit dem Programm fo$Unexpected condition encountered!Please contact us via our web site and provide the following information (logged in assert.log file in the program's installation folder):%sDo you want to try to continue with the program?$assert.log
                                              • API String ID: 9982543-2050502595
                                              • Opcode ID: bf3f9a5c37375bf90e1fad60e5d8b31935cedf69277fc1f32b4a22533ed00a7f
                                              • Instruction ID: b761c5c2ae010ac39d35002f06cea57e6bde63b3bbeaccff24114ff3d09a139a
                                              • Opcode Fuzzy Hash: bf3f9a5c37375bf90e1fad60e5d8b31935cedf69277fc1f32b4a22533ed00a7f
                                              • Instruction Fuzzy Hash: BAA1777190024DEEDB10EF95CC45BEE77B8AF18304F14806BE949A7152EB785B48CBA9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,00436592), ref: 0043FC25
                                              • __mtterm.LIBCMT ref: 0043FC31
                                                • Part of subcall function 0043F90A: TlsFree.KERNEL32(0000001E,0043FD9E), ref: 0043F935
                                                • Part of subcall function 0043F90A: DeleteCriticalSection.KERNEL32(00000000,00000000,7591DFB0,00000001,0043FD9E), ref: 00443372
                                                • Part of subcall function 0043F90A: DeleteCriticalSection.KERNEL32(0000001E,7591DFB0,00000001,0043FD9E), ref: 0044339C
                                              • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 0043FC47
                                              • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 0043FC54
                                              • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 0043FC61
                                              • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 0043FC6E
                                              • TlsAlloc.KERNEL32 ref: 0043FCBE
                                              • TlsSetValue.KERNEL32(00000000), ref: 0043FCD9
                                              • __init_pointers.LIBCMT ref: 0043FCE3
                                              • __calloc_crt.LIBCMT ref: 0043FD58
                                              • GetCurrentThreadId.KERNEL32 ref: 0043FD88
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm
                                              • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                              • API String ID: 2125014093-3819984048
                                              • Opcode ID: f17f1f6228e1859aef385c73852dc7d18c31423f9613d67ddc967b50f7bf9a95
                                              • Instruction ID: c10f32f806a76e15903b70b324ac3eba9c2525523283d9e8e8db92df55d1d375
                                              • Opcode Fuzzy Hash: f17f1f6228e1859aef385c73852dc7d18c31423f9613d67ddc967b50f7bf9a95
                                              • Instruction Fuzzy Hash: D5319C76D00B02BECB21AF75EC0961E3AA0AB44354F18193FE515C66A1EB79CC44CF5D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00413B91: GetCurrentThreadId.KERNEL32 ref: 00413B9A
                                              • StartPagePrinter.WINSPOOL.DRV(?,?,?,?,?,?,000000FF), ref: 0041ABCB
                                              • EndPage.GDI32(?), ref: 0041ABFF
                                              • StartPage.GDI32(?), ref: 0041AC08
                                              • SetMapMode.GDI32(?,00000001), ref: 0041AC20
                                              • SetTextColor.GDI32(?,00000000), ref: 0041AC2A
                                              • SetBkMode.GDI32(?,00000001), ref: 0041AC35
                                              • SetTextAlign.GDI32(?,00000001), ref: 0041AC47
                                              • SelectObject.GDI32(?,?), ref: 0041AC53
                                              • DeleteObject.GDI32(?), ref: 0041AC63
                                              • GetTextExtentPoint32A.GDI32(?,0045B720,00000001,?), ref: 0041AC77
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              Strings
                                              • PRINTER::NewPage for page #%d done, xrefs: 0041AC8C
                                              • PRINTER::NewPage hdc= %08x, hdirect= %08x, xrefs: 0041AB87
                                              • PRINTER::NewPage done, ok= %d, xrefs: 0041ACA4
                                              • this->hDC, xrefs: 0041ABE7
                                              • PRINTER::NewPage raw StartPagePrinter returned %d, xrefs: 0041ABD3
                                              • this->FirstPage, xrefs: 0041ABB8
                                              • .\printer_win32.cpp, xrefs: 0041ABB3, 0041ABE2
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: PageText$ModeObjectStart$AlignColorCurrentDeleteErrorExtentH_prolog3LastPoint32Printer.SelectThread__snprintf_memset
                                              • String ID: .\printer_win32.cpp$PRINTER::NewPage done, ok= %d$PRINTER::NewPage for page #%d done$PRINTER::NewPage hdc= %08x, hdirect= %08x$PRINTER::NewPage raw StartPagePrinter returned %d$this->FirstPage$this->hDC
                                              • API String ID: 1565810209-308295776
                                              • Opcode ID: 40c82074a6fbe45ea2f27e455fa30577622e642a4ad1c0d39ee2606cd72c55cd
                                              • Instruction ID: 68cb6f971afd61d4bf7108c6b895709d7112df1ea96cfb540c429bb9d5a9c8dc
                                              • Opcode Fuzzy Hash: 40c82074a6fbe45ea2f27e455fa30577622e642a4ad1c0d39ee2606cd72c55cd
                                              • Instruction Fuzzy Hash: 5D31F431500700EFC7306F91ED86D9B7BF1EB44B16720092EFA43915E2D775E8949B6A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00414363
                                                • Part of subcall function 004114D2: __EH_prolog3.LIBCMT ref: 004114D9
                                              • GetCurrentThreadId.KERNEL32 ref: 00414386
                                                • Part of subcall function 00412327: GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00412351
                                                • Part of subcall function 00411793: __EH_prolog3.LIBCMT ref: 0041179A
                                                • Part of subcall function 0041502D: __EH_prolog3.LIBCMT ref: 0041503B
                                                • Part of subcall function 00412379: SetCurrentDirectoryA.KERNEL32(00000000,0041441B,00000000), ref: 0041237D
                                                • Part of subcall function 00410ED1: __EH_prolog3.LIBCMT ref: 00410ED8
                                                • Part of subcall function 004107B9: __EH_prolog3.LIBCMT ref: 004107C0
                                                • Part of subcall function 004107B9: _strpbrk.LIBCMT ref: 00410829
                                                • Part of subcall function 004107B9: _strlen.LIBCMT ref: 00410835
                                                • Part of subcall function 0041B778: __EH_prolog3.LIBCMT ref: 0041B786
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$Current$Directory_strlen$Thread_strpbrk
                                              • String ID: .exe$<self>$EMTECAPP Program Argument %d= %s$EMTECAPP processing of %s done$EMTECAPP sleeping for startupdelay$EMTECAPP trying %s$ENGL$FRENCH$GER$HUNGARIAN$LANG$STARTUPDELAY$commandline.ini$service.exe
                                              • API String ID: 2375231372-3197219866
                                              • Opcode ID: 6d9bf16b2f49bc5f4fa3657530ab7bb161ecefac2ca5c701648b62cc36ae71f9
                                              • Instruction ID: 1eee24efc853de5675181ca2d9abab242090a60288a383665c56af663f1d7f44
                                              • Opcode Fuzzy Hash: 6d9bf16b2f49bc5f4fa3657530ab7bb161ecefac2ca5c701648b62cc36ae71f9
                                              • Instruction Fuzzy Hash: B2E18530901249EEDB15FBA5CD52ADD7BB4AF14308F10406FF815A3292EB7C5B88CB5A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _fprintf_sprintf$_strncmp$_strcat
                                              • String ID: %0"$%c%d%%$(&$.1i$C:/Program Files (x86)/ZOC5/zocdll.dll$Unk:%03d$admin$$$.ini
                                              • API String ID: 1056443619-1869785367
                                              • Opcode ID: 610943fb32137ae82aca2ec757fffa257c9919da80e3f8cb010acd9df38c36ef
                                              • Instruction ID: bdcaeba495aa201353652b95b0f445013597e6ef2bd73bd7b1fe01c8513bd063
                                              • Opcode Fuzzy Hash: 610943fb32137ae82aca2ec757fffa257c9919da80e3f8cb010acd9df38c36ef
                                              • Instruction Fuzzy Hash: D991E9B1F08320AAE714AF21BC4263A73A5EB54308FA4083FF94197291E77DD955876F
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004218F0
                                              • _strcpy_s.LIBCMT ref: 00421912
                                              • _strcat_s.LIBCMT ref: 00421924
                                              • LoadLibraryA.KERNEL32(?), ref: 00421939
                                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00421947
                                              • FreeLibrary.KERNEL32(00000000), ref: 00421952
                                              • _strcpy_s.LIBCMT ref: 0042196A
                                              • _strcat_s.LIBCMT ref: 0042197C
                                              • LoadLibraryA.KERNEL32(?), ref: 0042198B
                                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00421999
                                              • FreeLibrary.KERNEL32(00000000), ref: 004219A4
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004219B7
                                              • FreeLibrary.KERNEL32(00000000), ref: 004219CE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Library$AddressFreeProc$Load_strcat_s_strcpy_s$DirectorySystem
                                              • String ID: \ws2_32$\wship6$getaddrinfo
                                              • API String ID: 2766041494-3078833738
                                              • Opcode ID: fc9c351837e57fb1d2bbaba8c87479b8ae3d3530adc27506f236f24c2224cd86
                                              • Instruction ID: c09625084ad07a351bae1784942f428a890746389d4ea2e44ea5a942682de6aa
                                              • Opcode Fuzzy Hash: fc9c351837e57fb1d2bbaba8c87479b8ae3d3530adc27506f236f24c2224cd86
                                              • Instruction Fuzzy Hash: 4B41D8B16003189ACB20EFA5AC44BDF77B8AB48755F94012AF809C7211DB78C149CB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5CA
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5F1
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B646
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B66F
                                              • SysAllocString.OLEAUT32(?), ref: 0041BFE0
                                              • SysFreeString.OLEAUT32(00000000), ref: 0041C07A
                                              Strings
                                              • FIREWALL::~IsAppEnabled(), isenabled=%d, xrefs: 0041C09F
                                              • FIREWALL::IsAppEnabled() Application is in exception list, xrefs: 0041C01A
                                              • appname, xrefs: 0041BF80
                                              • FIREWALL::IsAppEnabled() Application is not in exception list, xrefs: 0041C06C
                                              • FIREWALL::IsAppEnabled() SysAllocString failed: 0x%08lx, xrefs: 0041C001
                                              • .\firewall.cpp, xrefs: 0041BF65, 0041BF6A, 0041BF7F
                                              • this->boolUpAndRunning, xrefs: 0041BF6B
                                              • FIREWALL::IsAppEnabled() get_AuthorizedApplications failed: 0x%08lx, xrefs: 0041BFBB
                                              • FIREWALL::IsAppEnabled() Application is disabled, xrefs: 0041C05B
                                              • FIREWALL::IsAppEnabled() get_Enabled failed: 0x%08lx, xrefs: 0041C039
                                              • FIREWALL::IsAppEnabled() Application is enabled, xrefs: 0041C046
                                              • FIREWALL::IsAppEnabled() appname=%s, xrefs: 0041BF4E
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: String_fprintf_sprintf$AllocErrorFreeH_prolog3Last__snprintf_memset
                                              • String ID: .\firewall.cpp$FIREWALL::IsAppEnabled() Application is disabled$FIREWALL::IsAppEnabled() Application is enabled$FIREWALL::IsAppEnabled() Application is in exception list$FIREWALL::IsAppEnabled() Application is not in exception list$FIREWALL::IsAppEnabled() SysAllocString failed: 0x%08lx$FIREWALL::IsAppEnabled() appname=%s$FIREWALL::IsAppEnabled() get_AuthorizedApplications failed: 0x%08lx$FIREWALL::IsAppEnabled() get_Enabled failed: 0x%08lx$FIREWALL::~IsAppEnabled(), isenabled=%d$appname$this->boolUpAndRunning
                                              • API String ID: 2364098195-187328529
                                              • Opcode ID: d697eedbcfeda5368be91f308e1fec98d3703059efaedef908a660ae6b516b1b
                                              • Instruction ID: af6d0832c6a280f3cc33fbaec8eb06f81df7882105353905301c7af20402ed19
                                              • Opcode Fuzzy Hash: d697eedbcfeda5368be91f308e1fec98d3703059efaedef908a660ae6b516b1b
                                              • Instruction Fuzzy Hash: 4041E430680308FFCB109BA5CC85EDEBBA4EF49755B20415BFC05AB292C7799D85CB99
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5CA
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5F1
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B646
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B66F
                                                • Part of subcall function 0041BF40: SysFreeString.OLEAUT32(00000000), ref: 0041C07A
                                              • SysFreeString.OLEAUT32(00000000), ref: 0041C3FD
                                                • Part of subcall function 004104E2: __EH_prolog3.LIBCMT ref: 004104E9
                                              • SysAllocString.OLEAUT32(?), ref: 0041C39A
                                              • SysStringLen.OLEAUT32(00000000), ref: 0041C3B2
                                              Strings
                                              • appname, xrefs: 0041C31F
                                              • FIREWALL::RemoveApplication() failed: 0x%08lx, xrefs: 0041C351
                                              • FIREWALL::RemoveApplication() get_AuthorizedApplications failed: 0x%08lx, xrefs: 0041C37E
                                              • FIREWALL::AddApplication() Application %s is now removed in the firewall, xrefs: 0041C3E7
                                              • FIREWALL::RemoveApplication() appname=%s, xrefs: 0041C2ED
                                              • .\firewall.cpp, xrefs: 0041C304, 0041C309, 0041C31E
                                              • this->boolUpAndRunning, xrefs: 0041C30A
                                              • FIREWALL::RemoveApplication() Remove failed: 0x%08lx, xrefs: 0041C3DA
                                              • FIREWALL::~RemoveApplication(), xrefs: 0041C410
                                              • FIREWALL::AddApplication() Application not found and therefor not removed, xrefs: 0041C3F1
                                              • FIREWALL::RemoveApplication() SysAllocString failed: 0x%08lx, xrefs: 0041C3C2
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: String$FreeH_prolog3_fprintf_sprintf$AllocErrorLast__snprintf_memset
                                              • String ID: .\firewall.cpp$FIREWALL::AddApplication() Application %s is now removed in the firewall$FIREWALL::AddApplication() Application not found and therefor not removed$FIREWALL::RemoveApplication() Remove failed: 0x%08lx$FIREWALL::RemoveApplication() SysAllocString failed: 0x%08lx$FIREWALL::RemoveApplication() appname=%s$FIREWALL::RemoveApplication() failed: 0x%08lx$FIREWALL::RemoveApplication() get_AuthorizedApplications failed: 0x%08lx$FIREWALL::~RemoveApplication()$appname$this->boolUpAndRunning
                                              • API String ID: 1892481059-2383231683
                                              • Opcode ID: ea4ac27f78c60ca26e0c78d4a00e4bc3154075273b1d2233df4fff43eb79647b
                                              • Instruction ID: 0a31eea110d0782b961b0b3ad8e80d4191507d9869c9b89e8bde26eeb68277f6
                                              • Opcode Fuzzy Hash: ea4ac27f78c60ca26e0c78d4a00e4bc3154075273b1d2233df4fff43eb79647b
                                              • Instruction Fuzzy Hash: FC31C93168030DBFCB109B52CCC6EEE3B79DB84755B20402FBC11A6292DB7C9985D65D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00419C38
                                                • Part of subcall function 00419A87: _strncpy.LIBCMT ref: 00419AA6
                                              • _strncpy.LIBCMT ref: 00419C91
                                              • _strncpy.LIBCMT ref: 00419CA1
                                                • Part of subcall function 00419AB4: __EH_prolog3.LIBCMT ref: 00419ABB
                                                • Part of subcall function 00419AB4: _strncpy.LIBCMT ref: 00419AF9
                                                • Part of subcall function 00418F66: _memset.LIBCMT ref: 00418FAD
                                                • Part of subcall function 00418F66: _sprintf.LIBCMT ref: 00418FCA
                                              • _strncmp.LIBCMT ref: 00419D40
                                              • _strncmp.LIBCMT ref: 00419D5A
                                                • Part of subcall function 004107B9: __EH_prolog3.LIBCMT ref: 004107C0
                                                • Part of subcall function 004107B9: _strpbrk.LIBCMT ref: 00410829
                                                • Part of subcall function 004107B9: _strlen.LIBCMT ref: 00410835
                                                • Part of subcall function 004107B9: _strpbrk.LIBCMT ref: 00410809
                                              • _strncmp.LIBCMT ref: 00419DF0
                                                • Part of subcall function 00401A26: __EH_prolog3.LIBCMT ref: 00401A2D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3_strncpy$_strncmp$_strpbrk$_memset_sprintf_strlen
                                              • String ID: #Handle$#Key$.\stringarray.cpp$={{$HASH-KEYS$HASH-VALUES$item.Find("=")
                                              • API String ID: 2408641952-221067418
                                              • Opcode ID: a4bccafaf528b93f7c03276fdddc5994f0463ebbe1a2e3616660a06f5b0a8ac3
                                              • Instruction ID: 51457d21a4e25aec759705ad14638697978ebb604825093648f429ceafa4e932
                                              • Opcode Fuzzy Hash: a4bccafaf528b93f7c03276fdddc5994f0463ebbe1a2e3616660a06f5b0a8ac3
                                              • Instruction Fuzzy Hash: 65B17771504248EEDB05EFA1CC52BDE7BB4AF14308F10406FF806A61D2EB789A48CB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00413B91: GetCurrentThreadId.KERNEL32 ref: 00413B9A
                                              • _strlen.LIBCMT ref: 0041ACEC
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5CA
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5F1
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B646
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B66F
                                              • WritePrinter.WINSPOOL.DRV(000000FF,?,000000FF,?,000000FF), ref: 0041AD07
                                              • MoveToEx.GDI32(?,?,?,00000000), ref: 0041AD99
                                              • TextOutA.GDI32(?,00000000,00000000,?,?), ref: 0041ADAA
                                              • GetCurrentPositionEx.GDI32(?,?), ref: 0041ADB4
                                              • MoveToEx.GDI32(?,?,?,00000000), ref: 0041AE0D
                                              • TextOutA.GDI32(?,00000000,00000000,?,?), ref: 0041AE1E
                                              • GetCurrentPositionEx.GDI32(?,?), ref: 0041AE28
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Current$MovePositionText_fprintf_sprintf$ErrorH_prolog3LastPrinter.ThreadWrite__snprintf_memset_strlen
                                              • String ID: .\printer_win32.cpp$PRINTER::WriteText %d bytes done, ok= %d$PRINTER::WriteText %d bytes hdc= %08x, hdirect= %08x$this->Margins.bottom>0$this->hDC
                                              • API String ID: 590916919-1604752662
                                              • Opcode ID: 21af30b57fed7164dbf5360dec0b4da6b2d8853d0378cb16bb34c0c37e479a2d
                                              • Instruction ID: 232ddbf5555f96b9e91f90ac7ff3bcc76624e800370a917e622ae6939b6dd451
                                              • Opcode Fuzzy Hash: 21af30b57fed7164dbf5360dec0b4da6b2d8853d0378cb16bb34c0c37e479a2d
                                              • Instruction Fuzzy Hash: 4761F130601704AFCB20DFA5CD85A9ABBB1FB48715F20451EF94687691D338F9A0CB5A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00423780
                                                • Part of subcall function 00413B91: GetCurrentThreadId.KERNEL32 ref: 00413B9A
                                                • Part of subcall function 00422DF3: __EH_prolog3.LIBCMT ref: 00422DFD
                                                • Part of subcall function 00422DF3: select.WS2_32(?,?,?,?,?), ref: 00422EA0
                                                • Part of subcall function 00422DF3: __WSAFDIsSet.WS2_32(?,?), ref: 00422EC2
                                                • Part of subcall function 00422DF3: __WSAFDIsSet.WS2_32(?,?), ref: 00422F5E
                                              Strings
                                              • SEND, xrefs: 004238B8
                                              • TCPIPIO::DevWrite pending done ok on skt= %d, xrefs: 004237F5
                                              • TCPIPIO::DevWrite select for write failed, rrc= %d, xrefs: 00423842
                                              • TCPIPIO::DevWrite send rc=%d , xrefs: 0042386E
                                              • TCPIPIO::DevWrite wrote partial packet. thismany= %d, howmany= %d, l= %d, xrefs: 00423832
                                              • .\tcpio.cpp, xrefs: 004238A1
                                              • TCPIPIO::partial send!, xrefs: 00423897
                                              • TCPIPIO::DevWrite partial send (%d of %d)!!!!, xrefs: 0042388B
                                              • TCPIPIO::DevWrite error rc=%d on skt=%d, error=%s, xrefs: 00423917
                                              • FALSE, xrefs: 004238A6
                                              • TCPIPIO::DevWrite l=%d on skt= %d , xrefs: 00423792
                                              • TCPIPIO::DevWrite done rc= %d, l=%d, xrefs: 00423931
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$CurrentThreadselect
                                              • String ID: .\tcpio.cpp$FALSE$SEND$TCPIPIO::DevWrite done rc= %d, l=%d$TCPIPIO::DevWrite error rc=%d on skt=%d, error=%s$TCPIPIO::DevWrite l=%d on skt= %d $TCPIPIO::DevWrite partial send (%d of %d)!!!!$TCPIPIO::DevWrite pending done ok on skt= %d$TCPIPIO::DevWrite select for write failed, rrc= %d$TCPIPIO::DevWrite send rc=%d $TCPIPIO::DevWrite wrote partial packet. thismany= %d, howmany= %d, l= %d$TCPIPIO::partial send!
                                              • API String ID: 4166063393-417256094
                                              • Opcode ID: 285028e5a16249125e2b31c1cb337a3ec6b4fd23aedad5dbdca542c6d495e40c
                                              • Instruction ID: 2582721d22c901e990ddc79c6f428cbdcd55fa05d24894d2254e49de7b17ecca
                                              • Opcode Fuzzy Hash: 285028e5a16249125e2b31c1cb337a3ec6b4fd23aedad5dbdca542c6d495e40c
                                              • Instruction Fuzzy Hash: C9412F71240704BBDB10AF658C07FEA77A4EF44715F60402FFC2D5A1D2EBB86618865A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _fprintf$LabelVolume_strlen_strrchr
                                              • String ID: creating: %-22s$C:/Program Files (x86)/ZOC5/zocdll.dll$labelling %s %-22s$mapname: conversion of %s failed$mapname: error setting volume label
                                              • API String ID: 3224579094-709802743
                                              • Opcode ID: 1daf420a74d19f49d78e75ab3c8e8c5fb42e6859defe77aa4920a8c0ccf8f47c
                                              • Instruction ID: 2aff3e371a910bf72668f4ff1e1111d3603ce3827307d65e76a344e25d686d38
                                              • Opcode Fuzzy Hash: 1daf420a74d19f49d78e75ab3c8e8c5fb42e6859defe77aa4920a8c0ccf8f47c
                                              • Instruction Fuzzy Hash: 6791F470D083848EEB309FB598457AEBBB4AB19304F24246FE58497292D7BC4549CF2E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041E68E
                                                • Part of subcall function 0041E4A4: __EH_prolog3.LIBCMT ref: 0041E4AB
                                                • Part of subcall function 00419AB4: __EH_prolog3.LIBCMT ref: 00419ABB
                                                • Part of subcall function 00419AB4: _strncpy.LIBCMT ref: 00419AF9
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5CA
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5F1
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B646
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B66F
                                                • Part of subcall function 00418F66: _memset.LIBCMT ref: 00418FAD
                                                • Part of subcall function 00418F66: _sprintf.LIBCMT ref: 00418FCA
                                              • _sscanf.LIBCMT ref: 0041E7D6
                                                • Part of subcall function 00437AF5: _vscan_fn.LIBCMT ref: 00437B0A
                                              • _sscanf.LIBCMT ref: 0041E7F5
                                              • _sscanf.LIBCMT ref: 0041E814
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_sprintf_sscanf$_fprintf_memset$ErrorLast__snprintf_strncpy_vscan_fn
                                              • String ID: .\winkeys.cpp$KEYBOARD::KEYBOARD$KEYBOARD::KEYBOARD done$idx!=-1$keyidx!=-1$oldscan==extscan2scancode[i].scan$s.NumItems()==d.NumItems()$s.NumItems()==w.NumItems()
                                              • API String ID: 3983447022-3296955498
                                              • Opcode ID: 4397b1b316a572d11e132ce26e4b4a3208d6d62ecd7cd792af53f1a1b3aa08bb
                                              • Instruction ID: 160e684dc6799aeed42a0ef144b6f87139138dedda2790286c7d6515610ec4ae
                                              • Opcode Fuzzy Hash: 4397b1b316a572d11e132ce26e4b4a3208d6d62ecd7cd792af53f1a1b3aa08bb
                                              • Instruction Fuzzy Hash: 2F81D571D00259AFDB14EBA5CC46BEE77A8FF14718F00012EFC15A7192EB785A48C7A9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • LoadLibraryA.KERNEL32(USER32.DLL,00000000,00000000,00000314,?,?,?,00489AB8,004437E6,00489AB8,Microsoft Visual C++ Runtime Library,00012010), ref: 0044B37F
                                              • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 0044B39B
                                                • Part of subcall function 0043F7B6: TlsGetValue.KERNEL32(00000000,0043F82B,00000000,0044B360,00000000,00000000,00000314,?,?,?,00489AB8,004437E6,00489AB8,Microsoft Visual C++ Runtime Library,00012010), ref: 0043F7C3
                                                • Part of subcall function 0043F7B6: TlsGetValue.KERNEL32(00000005,?,?,?,00489AB8,004437E6,00489AB8,Microsoft Visual C++ Runtime Library,00012010), ref: 0043F7DA
                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B3B8
                                                • Part of subcall function 0043F7B6: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,00489AB8,004437E6,00489AB8,Microsoft Visual C++ Runtime Library,00012010), ref: 0043F7EF
                                                • Part of subcall function 0043F7B6: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 0043F80A
                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B3CD
                                              • __invoke_watson.LIBCMT ref: 0044B3EE
                                                • Part of subcall function 00440AB8: _memset.LIBCMT ref: 00440B44
                                                • Part of subcall function 00440AB8: IsDebuggerPresent.KERNEL32(?,?,00000000), ref: 00440B62
                                                • Part of subcall function 00440AB8: SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000000), ref: 00440B6C
                                                • Part of subcall function 00440AB8: UnhandledExceptionFilter.KERNEL32(00489AB8,?,?,00000000), ref: 00440B76
                                                • Part of subcall function 00440AB8: GetCurrentProcess.KERNEL32(C000000D,?,?,00000000), ref: 00440B91
                                                • Part of subcall function 00440AB8: TerminateProcess.KERNEL32(00000000,?,?,00000000), ref: 00440B98
                                                • Part of subcall function 0043F82D: TlsGetValue.KERNEL32(00000000,0043F8DD,?,00438E66), ref: 0043F83A
                                                • Part of subcall function 0043F82D: TlsGetValue.KERNEL32(00000005,?,00438E66), ref: 0043F851
                                                • Part of subcall function 0043F82D: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,00438E66), ref: 0043F866
                                                • Part of subcall function 0043F82D: GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 0043F881
                                              • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 0044B402
                                              • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 0044B41A
                                              • __invoke_watson.LIBCMT ref: 0044B48D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: AddressProc$Value$ExceptionFilterHandleModuleProcessUnhandled__invoke_watson$CurrentDebuggerLibraryLoadPresentTerminate_memset
                                              • String ID: GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                              • API String ID: 2940365033-1046234306
                                              • Opcode ID: fab2c6b851559cb3aad1512ea8c8daacfc28a809689d50572186f09ec3b6c89f
                                              • Instruction ID: 2aed174c590050926c2abb571d9c2db15f7b512535155a083989e831a50170ca
                                              • Opcode Fuzzy Hash: fab2c6b851559cb3aad1512ea8c8daacfc28a809689d50572186f09ec3b6c89f
                                              • Instruction Fuzzy Hash: 5B416771D00304ABEF24AFA59C8596F7BA4EB59318F14483FE500D2252DB7CD944DBAE
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5CA
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5F1
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B646
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B66F
                                              • _memset.LIBCMT ref: 0041A2CB
                                              • _memset.LIBCMT ref: 0041A2DB
                                              • PrintDlgA.COMDLG32(00000042), ref: 0041A36F
                                              • GlobalFree.KERNEL32(00000000), ref: 0041A388
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset$_fprintf_sprintf$ErrorFreeGlobalH_prolog3LastPrint__snprintf
                                              • String ID: !this->hDC$!this->hFont$.\printer_win32.cpp$@$B$PRINTER::PrinterDialog$PRINTER::PrinterDialog returns %d$current != -1
                                              • API String ID: 1632205761-2930310019
                                              • Opcode ID: c0f3a9d29ff76ff7023524c940fce9286b70ae203e378233ba524b6b021a4484
                                              • Instruction ID: ca8f1634c1b5eab1b2e2758f4a86a4c4320844533cd9f1f7f9e184693345080a
                                              • Opcode Fuzzy Hash: c0f3a9d29ff76ff7023524c940fce9286b70ae203e378233ba524b6b021a4484
                                              • Instruction Fuzzy Hash: 43517E70A01308AFDB249FA5D885BEE77F4EF48B14F14442AFC11E7291E3789894CB69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strcpy_s_strleninet_ntoa
                                              • String ID: 65535$udp
                                              • API String ID: 3718499672-1267037602
                                              • Opcode ID: 31dcb01bfcc9c87938098e2b56b7ba2da1274a4672d8590996ecbc4438e0f802
                                              • Instruction ID: 00213a0bfcd56ba7eb619f05121a0efb64b719ec361ded555edcd0620b0e9b7d
                                              • Opcode Fuzzy Hash: 31dcb01bfcc9c87938098e2b56b7ba2da1274a4672d8590996ecbc4438e0f802
                                              • Instruction Fuzzy Hash: F3511C31B0022A9BDF24EF55E8856BF37A5EFA5305F944037E901962A1EB7CC901C76E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID:
                                              • API String ID: 2102423945-0
                                              • Opcode ID: 503ded709b22a89d7165cb6afa506cf117f8a89c24c499053054bc72256e868e
                                              • Instruction ID: 498dbf7dc677333966d66075d18d016d4309fb6941ed0d175676d855749c9826
                                              • Opcode Fuzzy Hash: 503ded709b22a89d7165cb6afa506cf117f8a89c24c499053054bc72256e868e
                                              • Instruction Fuzzy Hash: A081F2B1A007059BEB24EF6ACC819AFF3F9AF98314F14552FF511D2392EB7899008759
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0040DE5D
                                                • Part of subcall function 004136A5: __EH_prolog3_GS.LIBCMT ref: 004136AF
                                                • Part of subcall function 004136A5: LoadStringA.USER32(?,?,?,00000100), ref: 00413706
                                                • Part of subcall function 00415A8E: SetWindowTextA.USER32(?,00000000), ref: 00415A95
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 0040CAB5: __EH_prolog3.LIBCMT ref: 0040CAC3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$H_prolog3_LoadStringTextWindow_strlen
                                              • String ID: %ZOC%$%ZOCFILES%$HomePath$SETUP::NewSetupHookZOC %d %d %08x$Software$Software\EmTec$WorkPath$ZOC4$ZOC5$Zap-O-Com
                                              • API String ID: 3184825967-3982529888
                                              • Opcode ID: 2d05176ae61abbe99f8e3d170629e2494fbd2357511c4dc6c43345da10ff2927
                                              • Instruction ID: e08c1071a30ea2ea8b498847996460af4a28e7ec21f7fa1777dbcabd951e09c8
                                              • Opcode Fuzzy Hash: 2d05176ae61abbe99f8e3d170629e2494fbd2357511c4dc6c43345da10ff2927
                                              • Instruction Fuzzy Hash: C3B17331900248EADB14EBA6CD56FDD77649F11308F10407FF94AB72D2EB7C5A88CA5A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • _malloc.LIBCMT ref: 0042D29F
                                                • Part of subcall function 00437FAD: __FF_MSGBANNER.LIBCMT ref: 00437FD0
                                                • Part of subcall function 00437FAD: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00442DC2,?,00000001,?,0044340E,00000018,00469F50,0000000C,0044349D,?), ref: 00438025
                                              • _malloc.LIBCMT ref: 0042D2CA
                                              • _strncmp.LIBCMT ref: 0042D32D
                                              • _strncmp.LIBCMT ref: 0042D4DB
                                              • _fprintf.LIBCMT ref: 0042D4F6
                                              • _fprintf.LIBCMT ref: 0042D530
                                              • _fprintf.LIBCMT ref: 0042D57A
                                              • _fprintf.LIBCMT ref: 0042D5B9
                                              Strings
                                              • C:/Program Files (x86)/ZOC5/zocdll.dll, xrefs: 0042D3B9, 0042D3F5
                                              • caution: filename not matched: %s, xrefs: 0042D522
                                              • caution: excluded filename not matched: %s, xrefs: 0042D56C
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _fprintf$_malloc_strncmp$AllocateHeap
                                              • String ID: C:/Program Files (x86)/ZOC5/zocdll.dll$caution: excluded filename not matched: %s$caution: filename not matched: %s
                                              • API String ID: 4163885258-437899265
                                              • Opcode ID: b56c69fbce36a9b219efbff64bbb0bd020b324e0a53eb5734f1b22d9410ad9cc
                                              • Instruction ID: 52bc8c2e960067285a0d75c4017ff6f2e58f251dd95a4d3a1aff7ef01c7c3237
                                              • Opcode Fuzzy Hash: b56c69fbce36a9b219efbff64bbb0bd020b324e0a53eb5734f1b22d9410ad9cc
                                              • Instruction Fuzzy Hash: 9591C6B2F04221AAE720AF55BC82A2A73A0AB44358FE4083FF541D7251D778DD85CB5F
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __locking_fprintf_malloc
                                              • String ID: C:/Program Files (x86)/ZOC5/zocdll.dll$[ %s ]$warning: extra field too long (%d). Ignoring...$warning: filename too long--truncating.
                                              • API String ID: 184718480-2918875044
                                              • Opcode ID: 34bb9571dd4a1106ff9b4759117dbfd452bfabf991e6f9742f86e2e458ff5e9f
                                              • Instruction ID: d9186d1ec99c69af2252b5645a9751cff983cd520960b5a7cbf3adae22532b7f
                                              • Opcode Fuzzy Hash: 34bb9571dd4a1106ff9b4759117dbfd452bfabf991e6f9742f86e2e458ff5e9f
                                              • Instruction Fuzzy Hash: F6714672B042615BE7106B28BC4572A77F4EB44358FE8043FE841D33A2E7AD9C19879E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 004129C0: QueryPerformanceCounter.KERNEL32(000001FF,?,?,?,?,?,0041B13D,?,?,E5C332AE,?,000001FF,00000000), ref: 004129D4
                                                • Part of subcall function 004129C0: QueryPerformanceFrequency.KERNEL32(000001FF,?,?,?,?,?,0041B13D,?,?,E5C332AE,?,000001FF,00000000), ref: 004129FC
                                              • GetCurrentThreadId.KERNEL32 ref: 0041B22D
                                              • _sprintf.LIBCMT ref: 0041B249
                                              • _strncpy.LIBCMT ref: 0041B26D
                                              • __vsnprintf.LIBCMT ref: 0041B290
                                                • Part of subcall function 00413129: CreateMutexA.KERNEL32(00000000,00000000,?,?,0041B1B5,00000000,00000000,E5C332AE,?,000001FF,00000000), ref: 00413140
                                              • _strlen.LIBCMT ref: 0041B2A0
                                              • _strlen.LIBCMT ref: 0041B2BF
                                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 0041B304
                                              • OutputDebugStringA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,E5C332AE), ref: 0041B316
                                                • Part of subcall function 00435AB2: _malloc.LIBCMT ref: 00435ACA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: PerformanceQuery_strlen$CounterCreateCurrentDebugFileFrequencyMutexOutputStringThreadWrite__vsnprintf_malloc_sprintf_strncpy
                                              • String ID: .\emtec.cpp$[%07.3lf:%04x] $howmany < sizeof(logitbuf)
                                              • API String ID: 922108681-2720381564
                                              • Opcode ID: 313ccae740487dcefe299e6349dd2676d9299102ceb0e96c469814c642cd836d
                                              • Instruction ID: d1da8adc352d3aecefd75a829098c0c29a20c2b99db6a502fbe2bb30f04eaf2f
                                              • Opcode Fuzzy Hash: 313ccae740487dcefe299e6349dd2676d9299102ceb0e96c469814c642cd836d
                                              • Instruction Fuzzy Hash: 2571D571D0024DABDF10DFA5DC89AEEB7B8FB08354F10856FE815E6291DB384944CBA8
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00412C71
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              • RegCreateKeyExA.ADVAPI32(80000001,00000000,00000000,00000000,00000000,00000003,00000000,?,?,Software\Microsoft\Windows\CurrentVersion\Run,000004E4,00000078), ref: 00412CC2
                                              • _memset.LIBCMT ref: 00412CEA
                                              • GetModuleFileNameA.KERNEL32(00000000,00000100), ref: 00412D01
                                              • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?,?,00000000,000004E4,00454616,000004E4), ref: 00412DDF
                                                • Part of subcall function 0043C079: __stricmp_l.LIBCMT ref: 0043C0BE
                                              • RegDeleteValueA.ADVAPI32(?,?), ref: 00412E04
                                              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,004085A3), ref: 00412E10
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3Value$CloseCreateDeleteFileModuleName__stricmp_l_memset_strlen
                                              • String ID: "%s"$<ownfile>$<self>$Software\Microsoft\Windows\CurrentVersion\Run
                                              • API String ID: 3573620039-3298314571
                                              • Opcode ID: 14804b29848d1e18fe11a6fddd64e79f7ca63297b921c4c8951bfada8492b120
                                              • Instruction ID: 0213d3bd60f69f2018e6c12bdaa91681bab73259743ce10d1bb50c6380d27ace
                                              • Opcode Fuzzy Hash: 14804b29848d1e18fe11a6fddd64e79f7ca63297b921c4c8951bfada8492b120
                                              • Instruction Fuzzy Hash: 72518371D00249AEDB25DFA4DD45BEEBBB8EF08304F10402AF905B61D1EB785B84CB99
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              • TCPIPIO::Select for skt %d failed with %s, xrefs: 00422FF7
                                              • .\tcpio.cpp, xrefs: 00422F7A
                                              • TCPIPIO::Select for skt %d before select timout= %d/%d, xrefs: 00422E6B
                                              • !connect_request, xrefs: 00422F7F
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ErrorH_prolog3Lastselect
                                              • String ID: !connect_request$.\tcpio.cpp$TCPIPIO::Select for skt %d before select timout= %d/%d$TCPIPIO::Select for skt %d failed with %s
                                              • API String ID: 137377352-2727668841
                                              • Opcode ID: 7b6963f24bbe64a8b93662f786f266c84385f4c52beca98df15fe471d10c8751
                                              • Instruction ID: 714f95fced612ec92cd14f11a3cadbe79e519b4e0f6f8338dacdceddefb4a6de
                                              • Opcode Fuzzy Hash: 7b6963f24bbe64a8b93662f786f266c84385f4c52beca98df15fe471d10c8751
                                              • Instruction Fuzzy Hash: 2F519170A00229ABCB11EF55DA85ADEB7B8FF49300F5105ABE819D6241D7789F80DF98
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00410F7F
                                                • Part of subcall function 0041238A: __EH_prolog3.LIBCMT ref: 004123AC
                                                • Part of subcall function 0041238A: _memset.LIBCMT ref: 004123D0
                                                • Part of subcall function 0041238A: _memset.LIBCMT ref: 004123EB
                                                • Part of subcall function 00410CF9: __EH_prolog3.LIBCMT ref: 00410D00
                                                • Part of subcall function 0041238A: RegOpenKeyExA.KERNEL32(80000001,?,00000000,00020019,?,?,?,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,000004E4), ref: 004126F6
                                                • Part of subcall function 0041238A: RegQueryValueExA.KERNEL32(?,?,00000000,?,00000400,00000400,?,?,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,000004E4), ref: 0041271A
                                                • Part of subcall function 0041238A: RegCloseKey.KERNEL32(?,?,?,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,000004E4,?,?,?,?,?,00000180), ref: 00412726
                                                • Part of subcall function 0041238A: ExpandEnvironmentStringsA.KERNEL32(?,?,00000400,?,?,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,000004E4,?,?,?,?,?,00000180), ref: 00412741
                                                • Part of subcall function 0041238A: _strlen.LIBCMT ref: 0041274E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_memset$CloseEnvironmentExpandOpenQueryStringsValue_strlen
                                              • String ID: %ALLUSERAPPDATA%$%ALLUSERPROFILE%$%APPDATA%$%USERDESKTOP%$%USERDOCUMENTS%$%USERHOME%$%USERPICTURES%$%USERPROFILE%$FILENAME::ShellStringsInit$FILENAME::ShellStringsInit done
                                              • API String ID: 1400441989-2062923142
                                              • Opcode ID: d7571af6366ecbb29305b8851a707457546b54fcab3f9a7e652af1f277a01dbe
                                              • Instruction ID: e436aaf81bcf05675fb1d1210f213f6159dd1fda73e1a7bfa2c49c245e684c04
                                              • Opcode Fuzzy Hash: d7571af6366ecbb29305b8851a707457546b54fcab3f9a7e652af1f277a01dbe
                                              • Instruction Fuzzy Hash: 93416370D40108AFCB10EFA1C946BDE77B8DB04704F5001AAF905A7292E7BE5A59CFA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00411369
                                              • _memset.LIBCMT ref: 00411388
                                              • _getenv.LIBCMT ref: 00411401
                                              • __tempnam.LIBCMT ref: 0041140D
                                              • _strcat.LIBCMT ref: 00411433
                                                • Part of subcall function 00412E54: _memset.LIBCMT ref: 00412E88
                                                • Part of subcall function 00412E54: GetModuleFileNameA.KERNEL32(?,00000100,?,?,?), ref: 00412E9F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset$FileH_prolog3ModuleName__tempnam_getenv_strcat
                                              • String ID: .\osysfile.cpp$<self>$<temp>$<tmp>$TEMP$fname
                                              • API String ID: 468438843-3117012196
                                              • Opcode ID: d92f8daa9d34e72ff7b0ac33e6bbc023548ef3538c32bc626824e50b1c86d38f
                                              • Instruction ID: ec29cf5c120f5542d6a15bc0049773c735fa658ac131b4de30407117c49d4bd9
                                              • Opcode Fuzzy Hash: d92f8daa9d34e72ff7b0ac33e6bbc023548ef3538c32bc626824e50b1c86d38f
                                              • Instruction Fuzzy Hash: 1F41AA75D00249AFDB14EBA5CD42ADEB7B8AF18318F10402FF815B7192EA7C6B48C759
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00421FBB
                                              • _memset.LIBCMT ref: 00421FEB
                                              • _memset.LIBCMT ref: 00421FFB
                                              • getsockopt.WS2_32(?,0000FFFF,00001007,?,00000004), ref: 0042201B
                                              • FormatMessageA.KERNEL32(00001000,00000000,?,00000000,00000000,00000100,00000000,?,?,?,?,?,00000024), ref: 00422031
                                              • _strlen.LIBCMT ref: 0042203B
                                              • _strlen.LIBCMT ref: 0042204D
                                              • _strlen.LIBCMT ref: 0042205D
                                              • _strlen.LIBCMT ref: 0042206D
                                              • _strlen.LIBCMT ref: 00422079
                                              Strings
                                              • TCP::GetLastSocketErrorString lasterr=%d, errbuf=%s, xrefs: 004220AB
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strlen$_memset$FormatH_prolog3Messagegetsockopt
                                              • String ID: TCP::GetLastSocketErrorString lasterr=%d, errbuf=%s
                                              • API String ID: 4061203125-898781902
                                              • Opcode ID: bcd9f5507cec6dd734485ac1fc17da13f3c1e12dd25b564ec1e0809eeb57ecce
                                              • Instruction ID: b0a62e5cb7f13c5d1e633e7407dc6ffaf77471ce4641121c2803ac4c7fa53a23
                                              • Opcode Fuzzy Hash: bcd9f5507cec6dd734485ac1fc17da13f3c1e12dd25b564ec1e0809eeb57ecce
                                              • Instruction Fuzzy Hash: 334150B290024DBFDB20EFA0DC41AEE77A8FF08344F54042EFA459B291D6B89A448B55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004091BD
                                              • CopyFileA.KERNEL32(?,?,00000000), ref: 004092E6
                                              • RegCreateKeyA.ADVAPI32(80000001,Software\Enterprise Alternatives\REXX\ExecOptions,?), ref: 0040931A
                                              • RegSetValueExA.ADVAPI32(?,GlobalSCBs,00000000,00000004,?,00000004), ref: 00409331
                                              • RegCloseKey.ADVAPI32(?), ref: 0040933A
                                                • Part of subcall function 00411530: __EH_prolog3.LIBCMT ref: 00411537
                                                • Part of subcall function 00411530: _memset.LIBCMT ref: 00411552
                                                • Part of subcall function 00411530: _strlen.LIBCMT ref: 00411589
                                                • Part of subcall function 004121F3: __EH_prolog3_GS.LIBCMT ref: 004121FA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$CloseCopyCreateFileH_prolog3_Value_memset_strlen
                                              • String ID: *.*$GlobalSCBs$OPTIONS$PHONEBK$SCRIPT$Software\Enterprise Alternatives\REXX\ExecOptions
                                              • API String ID: 1025971036-2501763011
                                              • Opcode ID: 72bc9ff52f8026150d67d3bbb704558b945aa7d533ea316dff9fa6cabfc27864
                                              • Instruction ID: 414767a77524a1db033896fffa5373e42adab1683dcef265066458412af59660
                                              • Opcode Fuzzy Hash: 72bc9ff52f8026150d67d3bbb704558b945aa7d533ea316dff9fa6cabfc27864
                                              • Instruction Fuzzy Hash: 3A419070810189FEDB04EFA1DD45BDE7F65AF14308F1080AAF90A221A3E7791B4CDB68
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              • TCP::GetLastErrorString lasterr=%d, errbuf=%s, xrefs: 00421F4E
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strlen$_memset$ErrorFormatH_prolog3LastMessage
                                              • String ID: TCP::GetLastErrorString lasterr=%d, errbuf=%s
                                              • API String ID: 3019503529-3487503035
                                              • Opcode ID: 415e93333473be2cb66b3393ba5d9bec06e73d3f96a57f876a576f9eb42d3704
                                              • Instruction ID: a4b88a86c73cbdd9397bd3b8c0dc09c9f87b3787f52d858222299d125ad55484
                                              • Opcode Fuzzy Hash: 415e93333473be2cb66b3393ba5d9bec06e73d3f96a57f876a576f9eb42d3704
                                              • Instruction Fuzzy Hash: 3E319176A00288AFDB10EFA4DC41AEE736CEF58304F54402FFD599B291E7789A448764
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00415C03: BeginPaint.USER32(?,?,0040E335,?), ref: 00415C0A
                                              • GetSysColor.USER32(00000010), ref: 0040E356
                                              • GetSysColor.USER32(00000014), ref: 0040E35D
                                              • CreatePen.GDI32(00000000,00000001,?), ref: 0040E36E
                                              • CreatePen.GDI32(00000000,00000001,?), ref: 0040E379
                                              • MoveToEx.GDI32(00000000,00000000,00000000,?), ref: 0040E38B
                                              • SelectObject.GDI32(00000000,?), ref: 0040E397
                                              • LineTo.GDI32(?,?,00000000), ref: 0040E3A6
                                              • MoveToEx.GDI32(?,00000000,00000001,?), ref: 0040E3B3
                                              • SelectObject.GDI32(?,?), ref: 0040E3BB
                                              • LineTo.GDI32(?,?,00000001), ref: 0040E3C5
                                              • DeleteObject.GDI32(?), ref: 0040E3D0
                                              • DeleteObject.GDI32(?), ref: 0040E3D5
                                                • Part of subcall function 00415C13: EndPaint.USER32(?,?,0040E3E3,?), ref: 00415C1A
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Object$ColorCreateDeleteLineMovePaintSelect$Begin
                                              • String ID:
                                              • API String ID: 2747204081-0
                                              • Opcode ID: 769fc2e1a8e532cafcab813daa9ed0db4e996e37d837c650897d718b940cc50d
                                              • Instruction ID: 1bda1526633ffd57c555558cd39f921402516851c9ca309d33523bf4e3c67b5d
                                              • Opcode Fuzzy Hash: 769fc2e1a8e532cafcab813daa9ed0db4e996e37d837c650897d718b940cc50d
                                              • Instruction Fuzzy Hash: A1312672D0021CABCF10AFE1CC85EDEBFB9EF44754F10402AE601AB2A0D6759D51DB94
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __freea__isleadbyte_l_malloc
                                              • String ID: a/p$am/pm
                                              • API String ID: 492057358-3206640213
                                              • Opcode ID: d076fde6d79bff5998b2b1e99bf42f05b8b3836e61084e1cce3c1ff4a737ef3b
                                              • Instruction ID: c06648ec2df87d3f9755f19862614db967e6e2924eaf2ba111375ef0bfa371d8
                                              • Opcode Fuzzy Hash: d076fde6d79bff5998b2b1e99bf42f05b8b3836e61084e1cce3c1ff4a737ef3b
                                              • Instruction Fuzzy Hash: B6D1C1345082059EDF298F14C8907BB7BB1EF1E344F28609BDAA18B351D7398D42DBDA
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • _malloc.LIBCMT ref: 00429491
                                                • Part of subcall function 00437FAD: __FF_MSGBANNER.LIBCMT ref: 00437FD0
                                                • Part of subcall function 00437FAD: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00442DC2,?,00000001,?,0044340E,00000018,00469F50,0000000C,0044349D,?), ref: 00438025
                                              • _strlen.LIBCMT ref: 004294D6
                                              • _malloc.LIBCMT ref: 004294DD
                                              • _strcat.LIBCMT ref: 004294F1
                                              • _malloc.LIBCMT ref: 00429574
                                              • _malloc.LIBCMT ref: 004295B0
                                              • __fdopen.LIBCMT ref: 004295DC
                                              • _fprintf.LIBCMT ref: 0042960C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _malloc$AllocateHeap__fdopen_fprintf_strcat_strlen
                                              • String ID: %c%c%c%c%c%c%c%c%c%c$1.0.4
                                              • API String ID: 174800823-189505174
                                              • Opcode ID: bcb0521328be24d6e9f446f42fe0468d9aa99def583a3c18220fcef2694097a6
                                              • Instruction ID: 9d04da9b304321160a4d7647142ad34b8149eafb8638443fdb79ab1d6998144b
                                              • Opcode Fuzzy Hash: bcb0521328be24d6e9f446f42fe0468d9aa99def583a3c18220fcef2694097a6
                                              • Instruction Fuzzy Hash: 2F51D3B1F04764AFDB219FAAD88165AFBF4BF08314F90492FE08997641D7789C84CB19
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strlen$H_prolog3_strncmp
                                              • String ID: %USERHOME%$%USERNAME%$DGE$FILENAME::ExpandShellString %s -> %s
                                              • API String ID: 1841588316-127495382
                                              • Opcode ID: 3e6e8c5f3b901f4d09b4140e4618f9ecf97f689ab1579352517491a9d1abca57
                                              • Instruction ID: 556a20ff7024b2b6cd7b5ad0acc6de5e5a6c7788052721ed7342607b56b61250
                                              • Opcode Fuzzy Hash: 3e6e8c5f3b901f4d09b4140e4618f9ecf97f689ab1579352517491a9d1abca57
                                              • Instruction Fuzzy Hash: 4C51D170600358BADB15B7A5CC46BEEB6A9AF58708F14003FF905B72D2DF7C0A49865E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _fprintf$_fgets
                                              • String ID: %s: stored in VMS format. Extract anyway? (y/n) $ skipping: %-22s encrypted (not supported)$(&$C:/Program Files (x86)/ZOC5/zocdll.dll$VMS
                                              • API String ID: 4006501350-2717224965
                                              • Opcode ID: 598af358ae02eab5cb7da3e37c21c9574b43255995b58bcbc25ce5f9ec899a3a
                                              • Instruction ID: da242376bab145d7c3bd0a626eef410ed50c736103f9d9687401d1bb4f3ecb44
                                              • Opcode Fuzzy Hash: 598af358ae02eab5cb7da3e37c21c9574b43255995b58bcbc25ce5f9ec899a3a
                                              • Instruction Fuzzy Hash: 7C41C271A412109EF718EB29EC5BF773760EB08304F00546FE5528A2A2E2ADD851876F
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00420A4C
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strlen
                                              • String ID: <unknown>$BASEIO$BASEIO::BAD-REQUEST$CALLERID$DEVICENAME$LASTERROR$LASTERRORSTRING$ONLINE$OWNID
                                              • API String ID: 3239654323-2358369944
                                              • Opcode ID: c40c9371524dd8232afdca3e74319779e81037b0da2b67b8b27be965057f2276
                                              • Instruction ID: 1a65b85c4663441170d6784e3db8de27ce0342eb686ef7d6ca12c2b288a1c963
                                              • Opcode Fuzzy Hash: c40c9371524dd8232afdca3e74319779e81037b0da2b67b8b27be965057f2276
                                              • Instruction Fuzzy Hash: F831AD31A00209BADF10AAA2DC42FEE7A74AF2435DF54003BFC05721A3E67D4E4DD659
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • _memset.LIBCMT ref: 0041B01E
                                              • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 0041B02E
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041B057
                                              • DeleteDC.GDI32(00000000), ref: 0041B061
                                              • MulDiv.KERNEL32(?,?,00000048), ref: 0041B06F
                                              • _strcat.LIBCMT ref: 0041B0BF
                                              • CreateFontIndirectA.GDI32(?), ref: 0041B0CB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Create_memset$CapsDeleteDeviceErrorFontH_prolog3IndirectLast__snprintf_strcat
                                              • String ID: .\windraw_win32.cpp$DISPLAY$hdc
                                              • API String ID: 1084519280-2949516874
                                              • Opcode ID: 56b7d0ece9860fe47d8047d3085101eba143a1b4ac7e2b4abb393d78590d06b6
                                              • Instruction ID: a3765a3db79e5a8282e74dd4254c2ce8f835302a7dca666de221b3c0deda6830
                                              • Opcode Fuzzy Hash: 56b7d0ece9860fe47d8047d3085101eba143a1b4ac7e2b4abb393d78590d06b6
                                              • Instruction Fuzzy Hash: F021A372E4134CAFDB00DFB4DC829DE7BB8EB59746F14006AFA01A7242D6389954CB79
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              • TCPIPIO::DropCall shutdown(%d) done, err= %d, xrefs: 004222B0
                                              • <unknown>, xrefs: 0042230B
                                              • TCPIPIO::DropCall socket= %d, xrefs: 00422263
                                              • TCPIPIO::DropCall before soclose(%d), xrefs: 004222C3
                                              • TCPIPIO::~DropCall, xrefs: 00422318
                                              • TCPIPIO::~TCPIPIO after FreeAcceptSocket(), xrefs: 00422288
                                              • TCPIPIO::DropCall soclose(%d) done, rc= %d, xrefs: 004222D9
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strcatclosesocketshutdown
                                              • String ID: <unknown>$TCPIPIO::DropCall before soclose(%d)$TCPIPIO::DropCall shutdown(%d) done, err= %d$TCPIPIO::DropCall socket= %d$TCPIPIO::DropCall soclose(%d) done, rc= %d$TCPIPIO::~DropCall$TCPIPIO::~TCPIPIO after FreeAcceptSocket()
                                              • API String ID: 4051905913-975053631
                                              • Opcode ID: 58fb3795322d03de0181d5c40aa51ec4aced0d66aeb35e865f902a01f98318f7
                                              • Instruction ID: ef4f04642ff086329ce46780216c2b13630e77d8746af5374dc71511fd71bfcc
                                              • Opcode Fuzzy Hash: 58fb3795322d03de0181d5c40aa51ec4aced0d66aeb35e865f902a01f98318f7
                                              • Instruction Fuzzy Hash: F611D531344300BFD620AB66AC46FAB73A8DF56729F60051FF91597182DBA8245487AE
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00413B91: GetCurrentThreadId.KERNEL32 ref: 00413B9A
                                              • EndPagePrinter.WINSPOOL.DRV(?,000000FF), ref: 0041A6A0
                                              • EndDocPrinter.WINSPOOL.DRV(?,?,000000FF), ref: 0041A6A8
                                              • ClosePrinter.WINSPOOL.DRV(?,?,?,000000FF), ref: 0041A6B0
                                              • EndPage.GDI32(?), ref: 0041A6DF
                                              • EndDoc.GDI32(?), ref: 0041A6E8
                                              • DeleteDC.GDI32(?), ref: 0041A6F1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Printer.$Page$CloseCurrentDeleteThread
                                              • String ID: .\printer_win32.cpp$PRINTER::EndDoc done$PRINTER::EndDoc hdc= %08x, hdirect= %08x$this->hDC
                                              • API String ID: 3694048318-4266346644
                                              • Opcode ID: ae2d0abcdabf44a0e9956289a6e073695dcff82329e4ef5cb86c5d39b9be1b9d
                                              • Instruction ID: ea8f2cb6735c046bb2a91d672e3147787fb64bdd7c73785d5d9e560b15c90d5a
                                              • Opcode Fuzzy Hash: ae2d0abcdabf44a0e9956289a6e073695dcff82329e4ef5cb86c5d39b9be1b9d
                                              • Instruction Fuzzy Hash: 8A019631240700AFC7313F52ED47F5A77A1EF40B2AF104A1EF996544E3CB69A4589B5E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0040DB5C
                                                • Part of subcall function 00415A9E: __EH_prolog3.LIBCMT ref: 00415AA5
                                                • Part of subcall function 00415A9E: GetWindowTextLengthA.USER32(?), ref: 00415AB7
                                                • Part of subcall function 00415A9E: GetWindowTextA.USER32(?,00000000,00000001), ref: 00415AEC
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                                • Part of subcall function 00411530: __EH_prolog3.LIBCMT ref: 00411537
                                                • Part of subcall function 00411530: _memset.LIBCMT ref: 00411552
                                                • Part of subcall function 00411530: _strlen.LIBCMT ref: 00411589
                                                • Part of subcall function 004116AF: __EH_prolog3.LIBCMT ref: 004116BA
                                                • Part of subcall function 004116AF: _memset.LIBCMT ref: 004116D5
                                                • Part of subcall function 004116AF: _strlen.LIBCMT ref: 004116EA
                                                • Part of subcall function 004116AF: _strlen.LIBCMT ref: 004116FF
                                                • Part of subcall function 00402F64: __EH_prolog3.LIBCMT ref: 00402F6B
                                                • Part of subcall function 00410E95: __EH_prolog3.LIBCMT ref: 00410E9C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strlen$TextWindow_memset$Length
                                              • String ID: admin.ini$admin.ini.bak$options$phonebk$standard.cfg$standard.zfg$standard.zoc$zoc.exe
                                              • API String ID: 773487468-73120917
                                              • Opcode ID: e7b5d3b4dda13e03a5968835890ebe51c9afa41a662b4be1e395f7e3a175c351
                                              • Instruction ID: 20f30cc6d7fd27bbb89533f943aee0a7516e562c4144c5042a5ee53fe9f067c6
                                              • Opcode Fuzzy Hash: e7b5d3b4dda13e03a5968835890ebe51c9afa41a662b4be1e395f7e3a175c351
                                              • Instruction Fuzzy Hash: D1517130804299EADF15EBA5D945BDD7B74AF14308F1080AFE909722C2EB7C5B48DB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004235AE
                                                • Part of subcall function 00422DF3: __EH_prolog3.LIBCMT ref: 00422DFD
                                                • Part of subcall function 00422DF3: select.WS2_32(?,?,?,?,?), ref: 00422EA0
                                                • Part of subcall function 00422DF3: __WSAFDIsSet.WS2_32(?,?), ref: 00422EC2
                                                • Part of subcall function 00422DF3: __WSAFDIsSet.WS2_32(?,?), ref: 00422F5E
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              • WSAGetLastError.WS2_32 ref: 004236E9
                                                • Part of subcall function 00421E54: __EH_prolog3.LIBCMT ref: 00421E73
                                                • Part of subcall function 00421E54: WSAGetLastError.WS2_32(00000020), ref: 00421E94
                                                • Part of subcall function 00421E54: _memset.LIBCMT ref: 00421EB9
                                                • Part of subcall function 00421E54: _memset.LIBCMT ref: 00421EC9
                                                • Part of subcall function 00421E54: FormatMessageA.KERNEL32(00001000,00000000,?,00000000,00000000,00000100,00000000,?,?,?,?,?,00000020), ref: 00421EDF
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421EE9
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421EFB
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421F0B
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421F1B
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421F27
                                                • Part of subcall function 00422258: shutdown.WS2_32(?,00000002), ref: 004222A8
                                                • Part of subcall function 00422258: closesocket.WS2_32(?), ref: 004222D1
                                                • Part of subcall function 00422258: _strcat.LIBCMT ref: 00422311
                                              Strings
                                              • TCPIPIO::DevRead %d, xrefs: 004235BD
                                              • TCPIPIO::DevRead done ok=%d rrc= %d, *plen=%d, xrefs: 0042375C
                                              • TCPIPIO::DevRead read error rc=%d, lasterror= %d, xrefs: 00423734
                                              • TCPIPIO::DevRead read disconnect rc=%d, lasterror= %d, xrefs: 004236C9
                                              • .\tcpio.cpp, xrefs: 0042361F
                                              • doread, xrefs: 00423624
                                              • TCPIPIO::DevRead done ok=%d *plen=%d, xrefs: 00423674
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strlen$H_prolog3$ErrorLast_memset$FormatMessage__snprintf_strcatclosesocketselectshutdown
                                              • String ID: .\tcpio.cpp$TCPIPIO::DevRead %d$TCPIPIO::DevRead done ok=%d *plen=%d$TCPIPIO::DevRead done ok=%d rrc= %d, *plen=%d$TCPIPIO::DevRead read disconnect rc=%d, lasterror= %d$TCPIPIO::DevRead read error rc=%d, lasterror= %d$doread
                                              • API String ID: 2072069893-2129108995
                                              • Opcode ID: 6a322f221a32ebd8919a4c7f39ed3630de4ff791a117ca2823b6d493d2942393
                                              • Instruction ID: e16d6f93271745ee3d6cd6963e445fc48a7ac062d45ff6983ebe2e7597fdf135
                                              • Opcode Fuzzy Hash: 6a322f221a32ebd8919a4c7f39ed3630de4ff791a117ca2823b6d493d2942393
                                              • Instruction Fuzzy Hash: 5341F7B0600309AFDB14EFA5DC82AEE77B4FF04318F50412FF85996292E7781A54CB99
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset_sprintf_strlen
                                              • String ID: %s [%s]$%02x $TCPIPIO::%s :
                                              • API String ID: 751656446-752829268
                                              • Opcode ID: 2da868f8938a46a3308d894ca186cb11c00404a1736e82e2e51635f63156394a
                                              • Instruction ID: f124084641171623be8d86c8d2460e68d63ea26aca29cc284387b4fa8c9a978b
                                              • Opcode Fuzzy Hash: 2da868f8938a46a3308d894ca186cb11c00404a1736e82e2e51635f63156394a
                                              • Instruction Fuzzy Hash: E941EF72A4020D6ACF10EF65EC82DDF77ACEF18358F60042BF914D3252D66CE5498799
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00420E48
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                                • Part of subcall function 00413098: WaitForSingleObject.KERNEL32(E5C332AE,?), ref: 004130B9
                                                • Part of subcall function 00413098: _sprintf.LIBCMT ref: 004130EB
                                                • Part of subcall function 00413C0D: GetCurrentThread.KERNEL32 ref: 00413C10
                                                • Part of subcall function 00413C0D: GetThreadPriority.KERNEL32(00000000), ref: 00413C20
                                              • _sprintf.LIBCMT ref: 00420EC5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3Thread_sprintf$CurrentErrorLastObjectPrioritySingleWait__snprintf_memset
                                              • String ID: !this->IsDead$.\ios.cpp$BASEIO::Daemon (this= %08x)$BASEIO::Daemon about to Sleep(100)$BASEIO::~Daemon$FALSE$magic1= %08x, magic2= %08x
                                              • API String ID: 3292472660-2181216402
                                              • Opcode ID: 90180ef1b7079f3b7ed8c5c020d0729c4b47ea92dd34e71e3b6d623b2496287a
                                              • Instruction ID: 85f2dfe2ca25aa8783283625fba1264ab4347a2c71354f70704d5ea7e3f95f8c
                                              • Opcode Fuzzy Hash: 90180ef1b7079f3b7ed8c5c020d0729c4b47ea92dd34e71e3b6d623b2496287a
                                              • Instruction Fuzzy Hash: 4A21C831644308ABD724EB76DC43FEF7794EB08719F10062FF926961C2EB685A48865D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004207AF
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$ErrorLast__snprintf_memset_strlen
                                              • String ID: $ %02x$!this->IsDead$%s$.\ios.cpp$BASEIO::Feed data=$BASEIO::Feed len %d$BASEIO::~Feed ok %d
                                              • API String ID: 2512185904-4265594780
                                              • Opcode ID: 7d566d1170c025a29f31be4e725f69dbf0ca0561f08cf181b3c1b745a3b02fdd
                                              • Instruction ID: 551d1bb755b84123e0e954fa6ab98520cf87f68eadcad301d3d09bc6cde5a9af
                                              • Opcode Fuzzy Hash: 7d566d1170c025a29f31be4e725f69dbf0ca0561f08cf181b3c1b745a3b02fdd
                                              • Instruction Fuzzy Hash: 6B21E831640218BBDB14AFB2CC82ADE7760AB04724F54413BF965A51C3D6BCD654C69D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL,00469E28,0000000C,0043FA58,00000000,00000000,?,00000000,004380B0,00439D1B,00000001,0043F765,?,00000000), ref: 0043F958
                                              • GetProcAddress.KERNEL32(?,EncodePointer), ref: 0043F98C
                                              • GetProcAddress.KERNEL32(?,DecodePointer), ref: 0043F99C
                                              • InterlockedIncrement.KERNEL32(0046E8A0), ref: 0043F9BE
                                              • __lock.LIBCMT ref: 0043F9C6
                                              • ___addlocaleref.LIBCMT ref: 0043F9E5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: AddressProc$HandleIncrementInterlockedModule___addlocaleref__lock
                                              • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                              • API String ID: 1036688887-2843748187
                                              • Opcode ID: ce8f174fc9a4322f6a7232fbe284a4214e82b5540bace2b922ce6c4fb0c55d5d
                                              • Instruction ID: 33096796ed65fa54f6b934e2a121b5f7861bbe927cc51505edfdec1f91a84da7
                                              • Opcode Fuzzy Hash: ce8f174fc9a4322f6a7232fbe284a4214e82b5540bace2b922ce6c4fb0c55d5d
                                              • Instruction Fuzzy Hash: 8F1142B1900701AFE7209F7AD805B5ABBE0AF44318F20452FE49597291DBB8D944CF1E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetForegroundWindow.USER32(00000001), ref: 0041596D
                                              • GetCurrentThreadId.KERNEL32 ref: 00415989
                                              • GetForegroundWindow.USER32(00000000,00000000,?,?,00000000,?,?,0041600E,00000000,00000001,?,0000002C,00417178,?), ref: 00415994
                                              • GetWindowThreadProcessId.USER32(00000000), ref: 0041599D
                                              • AttachThreadInput.USER32(00000000,?,?,00000000,?,?,0041600E,00000000,00000001,?,0000002C,00417178,?), ref: 004159A6
                                              • SetForegroundWindow.USER32(00000001), ref: 004159AF
                                              • GetCurrentThreadId.KERNEL32 ref: 004159BB
                                              • GetForegroundWindow.USER32(00000000,00000000,?,?,00000000,?,?,0041600E,00000000,00000001,?,0000002C,00417178,?), ref: 004159C0
                                              • GetWindowThreadProcessId.USER32(00000000), ref: 004159C3
                                              • AttachThreadInput.USER32(00000000,?,?,00000000,?,?,0041600E,00000000,00000001,?,0000002C,00417178,?), ref: 004159C6
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ThreadWindow$Foreground$AttachCurrentInputProcess
                                              • String ID:
                                              • API String ID: 1971790674-0
                                              • Opcode ID: 62356c74175886d4f04bc80cab1443880e56142eddc45ca1e8b2bb302ed8aae3
                                              • Instruction ID: 1172986a0c92354f0a0383d5c0c09ac73fa91b6c9556e687dc9a40ca9781f067
                                              • Opcode Fuzzy Hash: 62356c74175886d4f04bc80cab1443880e56142eddc45ca1e8b2bb302ed8aae3
                                              • Instruction Fuzzy Hash: 720136B2605304AFD700AFA5EC49F5BBBECEBC4716F11442AF64487161CA75DC408B75
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0040C60F
                                                • Part of subcall function 00413D44: __EH_prolog3.LIBCMT ref: 00413D4B
                                              • RemoveDirectoryA.KERNEL32(80000002,00000000), ref: 0040C9D6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$DirectoryRemove
                                              • String ID: UninstallPath$UninstallStartmenu$ZOC$ZOC4$ZOC5$ZOC6
                                              • API String ID: 2811140049-2283524626
                                              • Opcode ID: f6ce44ba933d90936cf064a007bed44aebeb1d3171b6d857f1350a827835f39c
                                              • Instruction ID: 4863c0861e3aef4ff3be06286b39e8ef0fae45a4ecf9ddfadc2506b962a8dfff
                                              • Opcode Fuzzy Hash: f6ce44ba933d90936cf064a007bed44aebeb1d3171b6d857f1350a827835f39c
                                              • Instruction Fuzzy Hash: 73E16132500149DADB14EFA5DD82BDE77A8AF15305F10416BF805B3182EB789B88CBA9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00406F99
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 00415A9E: __EH_prolog3.LIBCMT ref: 00415AA5
                                                • Part of subcall function 00415A9E: GetWindowTextLengthA.USER32(?), ref: 00415AB7
                                                • Part of subcall function 00415A9E: GetWindowTextA.USER32(?,00000000,00000001), ref: 00415AEC
                                                • Part of subcall function 00413D81: __EH_prolog3.LIBCMT ref: 00413D88
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$TextWindow$Length_strlen
                                              • String ID: uninstall$0.00$Software\Microsoft\Windows\CurrentVersion\Uninstall\$UninstallEmail$Version$anonymous@$uninstall@emtec.com;orders.emtec.com
                                              • API String ID: 1630847524-670958330
                                              • Opcode ID: 19fd6bc7c3a8bfa85375112d28bc1f4c75d3a407ae6492a41c5d8d6eecfd3e80
                                              • Instruction ID: 0a9f061b3b7801285e14011e8789780a35f272f20b4b8f625014a4804ef4ee14
                                              • Opcode Fuzzy Hash: 19fd6bc7c3a8bfa85375112d28bc1f4c75d3a407ae6492a41c5d8d6eecfd3e80
                                              • Instruction Fuzzy Hash: 23C1533180018DEEDB15EBA5CD55BDDBBB8AF14308F1040AAE509B31C2EB785B88DB65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: tcp$udp
                                              • API String ID: 0-3725065008
                                              • Opcode ID: e42ce25fe41dedb1ef83b0384d12aa6c1f801a3c5e7adf4f8a28f92981129ea9
                                              • Instruction ID: 076fe7531d302dc757b6ca6d0f4ddc34560ebd5d284594a609661b48880c7880
                                              • Opcode Fuzzy Hash: e42ce25fe41dedb1ef83b0384d12aa6c1f801a3c5e7adf4f8a28f92981129ea9
                                              • Instruction Fuzzy Hash: 79817071E00229EBCF21DF95D8406AEBBB5EF64340F6441ABE455E7270D3788E80DB99
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID: .\strings.cpp$STRING::Make STRINGFLAG_DYNABLOCK new blocksize %d$STRING::Make Upgrade String to STRINGFLAG_DYNABLOCK$buffer$this->BufLen>=(l+extra)
                                              • API String ID: 2102423945-1773549806
                                              • Opcode ID: b35d98c22497a3c18bfdf6dbf81edbe61c7cd9457114518d95d700c722140612
                                              • Instruction ID: 929abcded76d76040ceff49755cd942fa70b0bf47cb8d45abb9ac302d0e777f4
                                              • Opcode Fuzzy Hash: b35d98c22497a3c18bfdf6dbf81edbe61c7cd9457114518d95d700c722140612
                                              • Instruction Fuzzy Hash: 0B51C2716047019BD7349A26C881F27B3D5EB84719F10883FF49AE7AD1D7BCE8498B4A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041A522
                                                • Part of subcall function 00413B91: GetCurrentThreadId.KERNEL32 ref: 00413B9A
                                              • StartDocPrinterA.WINSPOOL.DRV(?,00000001,?), ref: 0041A572
                                              • StartDocA.GDI32(000000FF,00000014), ref: 0041A650
                                              Strings
                                              • PRINTER::StartDoc %s hdc= %08x, hdirect= %08x, xrefs: 0041A533
                                              • PRINTER::StartDoc raw, StartDocPrinter returned %d, xrefs: 0041A57A
                                              • this->hDC, xrefs: 0041A59C
                                              • PRINTER::StartDoc done, xrefs: 0041A660
                                              • .\printer_win32.cpp, xrefs: 0041A597
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Start$CurrentH_prolog3PrinterThread
                                              • String ID: .\printer_win32.cpp$PRINTER::StartDoc %s hdc= %08x, hdirect= %08x$PRINTER::StartDoc done$PRINTER::StartDoc raw, StartDocPrinter returned %d$this->hDC
                                              • API String ID: 2667174340-3282340599
                                              • Opcode ID: 91dc11db86ff40feb7c921ee950b3d3284e410f19103914b62523dcf15913b80
                                              • Instruction ID: 32f8bf562a9c4475e1763614a84d376440e3152d4b9c7856f9be2439491d5ac6
                                              • Opcode Fuzzy Hash: 91dc11db86ff40feb7c921ee950b3d3284e410f19103914b62523dcf15913b80
                                              • Instruction Fuzzy Hash: 48419271800608EFCB14EFD5C8469DEBBB4EF44724F10452FF556A61D2EB385A88CB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004189C8
                                                • Part of subcall function 00415EEF: GetWindowRect.USER32(?,?), ref: 00415F12
                                                • Part of subcall function 00415EEF: GetWindow.USER32(?,00000004), ref: 00415F34
                                                • Part of subcall function 00415EEF: ScreenToClient.USER32(?,?), ref: 00415F4A
                                                • Part of subcall function 00415EEF: ScreenToClient.USER32(?,?), ref: 00415F51
                                              • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00418A4E
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                                • Part of subcall function 004159D4: SetWindowPos.USER32(?,?,00000000,00000000,00000000,00000000,0000001B), ref: 00415A22
                                                • Part of subcall function 00415812: KiUserCallbackDispatcher.NTDLL(?,?,00415D56,?,?,?,?,?,0040E288,?), ref: 0041F1C3
                                                • Part of subcall function 00418658: GetDlgItem.USER32(?,?), ref: 00418670
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5CA
                                                • Part of subcall function 0041B3FE: _sprintf.LIBCMT ref: 0041B5F1
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B646
                                                • Part of subcall function 0041B3FE: _fprintf.LIBCMT ref: 0041B66F
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                              • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00418AE8
                                              • SendMessageA.USER32(00000001,00000030,00000000,00000000), ref: 00418AF7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Window$H_prolog3$ClientMessageScreenSend_fprintf_sprintf$CallbackCreateDispatcherErrorItemLastRectUser__snprintf_memset
                                              • String ID: .\wincontrols_win32.cpp$CONTROL(hwndparent, id).Hwnd()==this->hWnd$CONTROL::CONTROL %08x, %d, %s, %s, %x, %x$this->hWnd
                                              • API String ID: 173105395-186428202
                                              • Opcode ID: ee9e364f9341b7cd29f64c0492e8f84529f13d9bfbb0312bf19226ceea8fb501
                                              • Instruction ID: 094167d3c78b62b1ce06d6326ad267db43d52c574eba6f1ad3ce88181bfd5a30
                                              • Opcode Fuzzy Hash: ee9e364f9341b7cd29f64c0492e8f84529f13d9bfbb0312bf19226ceea8fb501
                                              • Instruction Fuzzy Hash: 57414971900209FFDF11EF90CC42FDE7B75EF18704F14800AFA146A292C7799A549B58
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00422100
                                                • Part of subcall function 00420FBF: __EH_prolog3.LIBCMT ref: 00420FC6
                                                • Part of subcall function 00412ECD: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 00412EE0
                                                • Part of subcall function 00413129: CreateMutexA.KERNEL32(00000000,00000000,?,?,0041B1B5,00000000,00000000,E5C332AE,?,000001FF,00000000), ref: 00413140
                                              • gethostname.WS2_32(?,00000100), ref: 00422212
                                              • _strcat.LIBCMT ref: 00422224
                                                • Part of subcall function 004107B9: __EH_prolog3.LIBCMT ref: 004107C0
                                                • Part of subcall function 004107B9: _strpbrk.LIBCMT ref: 00410829
                                                • Part of subcall function 004107B9: _strlen.LIBCMT ref: 00410835
                                                • Part of subcall function 004107B9: _strpbrk.LIBCMT ref: 00410809
                                                • Part of subcall function 00410409: __vsnprintf.LIBCMT ref: 00410452
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$Create_strpbrk$EventMutex__vsnprintf_strcat_strlengethostname
                                              • String ID: %s[%s]$<unknown>$DKE$TCPIPIO::TCPIPIO done$TCPIPIO::TCPIPIO this= %08x, this->OurId= %s
                                              • API String ID: 1136008407-361888069
                                              • Opcode ID: 8d86aad5a97714fc72610bc1698dfb88f6efa62be5773afb921cba41e25623c9
                                              • Instruction ID: 519a777b719541d0a4a49327ef70de0bf5cd6a4ba9a459c4272e1d6f0faaaf6d
                                              • Opcode Fuzzy Hash: 8d86aad5a97714fc72610bc1698dfb88f6efa62be5773afb921cba41e25623c9
                                              • Instruction Fuzzy Hash: 4931AE70400704EEDB21EF66C941BDEBBF8AF55708F50041FF59A92182DBB86648CB29
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0042A7B4
                                                • Part of subcall function 00413B91: GetCurrentThreadId.KERNEL32 ref: 00413B9A
                                              Strings
                                              • main.cpp, xrefs: 0042A7F2
                                              • RINGBUFFER::Write Buffer full -- waiting ..., xrefs: 0042A7E1
                                              • Ringbuffer Write waits more than 2 Sec, xrefs: 0042A805
                                              • RINGBUFFER::~Write %d (%d, %d), xrefs: 0042A8C2
                                              • RINGBUFFER::Write %d, xrefs: 0042A7BF
                                              • !FILENAME("main.cpp").Exists(), xrefs: 0042A814
                                              • .\ringbuffers.cpp, xrefs: 0042A80F
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CurrentH_prolog3Thread
                                              • String ID: !FILENAME("main.cpp").Exists()$.\ringbuffers.cpp$RINGBUFFER::Write %d$RINGBUFFER::Write Buffer full -- waiting ...$RINGBUFFER::~Write %d (%d, %d)$Ringbuffer Write waits more than 2 Sec$main.cpp
                                              • API String ID: 2223909941-3633728353
                                              • Opcode ID: cbd3437a72ac400b3621c994c2260a7018c650683a2b46ccdfc071104b4eb576
                                              • Instruction ID: 4e2f32306867b750c1189e1ec0e41423a7b7d0009d22e4cd73e10d37439764a8
                                              • Opcode Fuzzy Hash: cbd3437a72ac400b3621c994c2260a7018c650683a2b46ccdfc071104b4eb576
                                              • Instruction Fuzzy Hash: E13124306407049FCB24AF65DC42A6E7370EF10718F200A1FF992561C3DB78A955C79A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 0041292F: _memset.LIBCMT ref: 0041294F
                                                • Part of subcall function 0041292F: GetVersionExA.KERNEL32(?), ref: 00412962
                                              • CoInitialize.OLE32(00000000), ref: 0041BE85
                                              • CoCreateInstance.OLE32(0045C830,00000000,00000001,0045C840,?), ref: 0041BE9C
                                              Strings
                                              • FIREWALL::Constructor() WinOS < WinXP detected, constructor aborted, xrefs: 0041BE78
                                              • FIREWALL::Constructor() get_LocalPolicy failed: 0x%08lx, xrefs: 0041BEC0
                                              • FIREWALL::Constructor() CoCreateInstance failed: 0x%08lx, xrefs: 0041BEA7
                                              • FIREWALL::~Constructor(), xrefs: 0041BF04
                                              • FIREWALL::Constructor() get_CurrentProfile failed: 0x%08lx, xrefs: 0041BED6
                                              • FIREWALL::Constructor(), xrefs: 0041BE59
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CreateInitializeInstanceVersion_memset
                                              • String ID: FIREWALL::Constructor()$FIREWALL::Constructor() CoCreateInstance failed: 0x%08lx$FIREWALL::Constructor() WinOS < WinXP detected, constructor aborted$FIREWALL::Constructor() get_CurrentProfile failed: 0x%08lx$FIREWALL::Constructor() get_LocalPolicy failed: 0x%08lx$FIREWALL::~Constructor()
                                              • API String ID: 3383046407-3241608711
                                              • Opcode ID: e523b7d3c871f38c281b9073dcd9fd0054e2c5984c3b4fd78ea936865489f135
                                              • Instruction ID: 47e316b6b6b42297f19a697f542a9cefe1305b5889f8809344da5b33385c60d9
                                              • Opcode Fuzzy Hash: e523b7d3c871f38c281b9073dcd9fd0054e2c5984c3b4fd78ea936865489f135
                                              • Instruction Fuzzy Hash: BE214C71640308AF9B009B96CCC5EFE77ADEB85719B30044BF901DB142D7B999C2CBA9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00413B91: GetCurrentThreadId.KERNEL32 ref: 00413B9A
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              • GetDeviceCaps.GDI32(?,00000058), ref: 0041A493
                                              • GetDeviceCaps.GDI32(?,0000005A), ref: 0041A49D
                                              • GetDeviceCaps.GDI32(?,00000008), ref: 0041A4CE
                                              • GetDeviceCaps.GDI32(?,0000000A), ref: 0041A4E9
                                              Strings
                                              • PRINTER::SetMargins done, xrefs: 0041A50B
                                              • this->hDC, xrefs: 0041A478
                                              • PRINTER::SetMargins hdc= %08x, hdirect= %08x, xrefs: 0041A441
                                              • .\printer_win32.cpp, xrefs: 0041A473
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CapsDevice$CurrentErrorH_prolog3LastThread__snprintf_memset
                                              • String ID: .\printer_win32.cpp$PRINTER::SetMargins done$PRINTER::SetMargins hdc= %08x, hdirect= %08x$this->hDC
                                              • API String ID: 2060520178-1212465177
                                              • Opcode ID: 685b0a3494027d1c87a8b2ef84604e74bf3110dd91a024cddbd8ecd8b07b4d04
                                              • Instruction ID: 9e70e2f091503b3af5d7220d5a2e4d31455ff875f505ac3bf0db5694c7ec7e52
                                              • Opcode Fuzzy Hash: 685b0a3494027d1c87a8b2ef84604e74bf3110dd91a024cddbd8ecd8b07b4d04
                                              • Instruction Fuzzy Hash: 7921F871700708AFCB24EF69DE82F4ABBF5EBA4701F10452EF501EA1D1D674EA148B55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00413B91: GetCurrentThreadId.KERNEL32 ref: 00413B9A
                                              • shutdown.WS2_32(00000000,00000002), ref: 00421B2A
                                              • closesocket.WS2_32(00000000), ref: 00421B44
                                              Strings
                                              • TCPIPIO::FreeAcceptSocket will close skt=%d (i= %d) now, xrefs: 00421B18
                                              • TCPIPIO::FreeAcceptSocket skt=%d, i= %d, InUse= %d now, xrefs: 00421AF1
                                              • TCPIPIO::FreeAcceptSocket soclose(%d), err= %d, xrefs: 00421B4E
                                              • TCPIPIO::FreeAcceptSocket done, xrefs: 00421B73
                                              • TCPIPIO::FreeAcceptSocket shutdown(%d), err= %d, xrefs: 00421B34
                                              • TCPIPIO::FreeAcceptSocket skt= %d, hard= %d, this= %08x, xrefs: 00421AC1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CurrentThreadclosesocketshutdown
                                              • String ID: TCPIPIO::FreeAcceptSocket done$TCPIPIO::FreeAcceptSocket shutdown(%d), err= %d$TCPIPIO::FreeAcceptSocket skt= %d, hard= %d, this= %08x$TCPIPIO::FreeAcceptSocket skt=%d, i= %d, InUse= %d now$TCPIPIO::FreeAcceptSocket soclose(%d), err= %d$TCPIPIO::FreeAcceptSocket will close skt=%d (i= %d) now
                                              • API String ID: 94276566-4120259822
                                              • Opcode ID: 363bfa947b9a8afb9a544a88664f8ce5dbae5725e0c896289f616977c2cc95cc
                                              • Instruction ID: 9ffc481203dd4e59d8c341d7e1e4a74bc2bee9cd4f6e184a9c67668ae9ca171b
                                              • Opcode Fuzzy Hash: 363bfa947b9a8afb9a544a88664f8ce5dbae5725e0c896289f616977c2cc95cc
                                              • Instruction Fuzzy Hash: 1F116572600704FBDB202F46DC06F9B3B65EB51736F10852FFC69411A2E7396894CB6A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0042311C
                                              • WSACleanup.WS2_32 ref: 004231CB
                                                • Part of subcall function 00422258: shutdown.WS2_32(?,00000002), ref: 004222A8
                                                • Part of subcall function 00422258: closesocket.WS2_32(?), ref: 004222D1
                                                • Part of subcall function 00422258: _strcat.LIBCMT ref: 00422311
                                              Strings
                                              • TCPIPIO::~TCPIPIO after semAcceptDone.Wait(), xrefs: 004231C0
                                              • !this->DevIsConnected(), xrefs: 0042318E
                                              • TCPIPIO::~TCPIPIO this= %08x, xrefs: 0042312D
                                              • .\tcpio.cpp, xrefs: 00423189
                                              • TCPIPIO::~TCPIPIO after FreeAcceptSocket(), xrefs: 00423175
                                              • TCPIPIO::~TCPIPIO after DropCall(), xrefs: 00423150
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CleanupH_prolog3_strcatclosesocketshutdown
                                              • String ID: !this->DevIsConnected()$.\tcpio.cpp$TCPIPIO::~TCPIPIO after DropCall()$TCPIPIO::~TCPIPIO after FreeAcceptSocket()$TCPIPIO::~TCPIPIO after semAcceptDone.Wait()$TCPIPIO::~TCPIPIO this= %08x
                                              • API String ID: 3400137420-3359572512
                                              • Opcode ID: 5cf28e2f1cb8e39be454ba2cf6b0a1b969ed48bb0737199a58412385a3978022
                                              • Instruction ID: 2bf020f5649d9aa7167d65e463d9016f1a960db907fd53f50a2b16f195cb1cff
                                              • Opcode Fuzzy Hash: 5cf28e2f1cb8e39be454ba2cf6b0a1b969ed48bb0737199a58412385a3978022
                                              • Instruction Fuzzy Hash: BA110A30380714A6D714BB7658037AD66554F50729FA0024FFC25661D3DFAC175E465E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetStartupInfoA.KERNEL32(?), ref: 00443E8E
                                              • __calloc_crt.LIBCMT ref: 00443EA1
                                                • Part of subcall function 00442DF5: __calloc_impl.LIBCMT ref: 00442E03
                                                • Part of subcall function 00442DF5: Sleep.KERNEL32(00000000), ref: 00442E1A
                                              • __calloc_crt.LIBCMT ref: 00443F24
                                              • GetFileType.KERNEL32(00000038), ref: 00443FA4
                                              • ___crtInitCritSecAndSpinCount.LIBCMT ref: 00443FD8
                                              • GetStdHandle.KERNEL32(-000000F6), ref: 0044402E
                                              • GetFileType.KERNEL32(00000000), ref: 00444040
                                              • ___crtInitCritSecAndSpinCount.LIBCMT ref: 0044406E
                                              • SetHandleCount.KERNEL32 ref: 00444098
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Count$CritFileHandleInitSpinType___crt__calloc_crt$InfoSleepStartup__calloc_impl
                                              • String ID:
                                              • API String ID: 1318386821-0
                                              • Opcode ID: 63f6e8e06acdf0055f429840710d37bb9433b0ad5aa91382c0a4b4afc305cbb2
                                              • Instruction ID: 6999f6a16b54679f314561d9007aab3dec184515632c0e187c42b9555fe63f8e
                                              • Opcode Fuzzy Hash: 63f6e8e06acdf0055f429840710d37bb9433b0ad5aa91382c0a4b4afc305cbb2
                                              • Instruction Fuzzy Hash: F56167318047418FEB24CF28D944716BBF0AF52735F29436BE5629B2E1C778D80ACB19
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004172BF
                                                • Part of subcall function 00415BEA: IsWindow.USER32(?), ref: 00415BF2
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$ErrorLastWindow__snprintf_memset
                                              • String ID: .\datadialogs.cpp$Button$Edit$FALSE$ListBox$cdepend.IsValid()
                                              • API String ID: 726385935-1427461352
                                              • Opcode ID: 7015655d2cad5781f80c21fec7e0aa119446ec5ab9bae5a0b636e9bca7fe2ca1
                                              • Instruction ID: e503535e2e617347480a61af1fa58a1fe9d08d6da5bc1ca6d0bf11b7668df4e3
                                              • Opcode Fuzzy Hash: 7015655d2cad5781f80c21fec7e0aa119446ec5ab9bae5a0b636e9bca7fe2ca1
                                              • Instruction Fuzzy Hash: 39C1E831A48218EBCB14DBA9CC42BEE77B4AF14314F24026FE515B61D2EB7C5EC4C699
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0040A2EA
                                                • Part of subcall function 00413D44: __EH_prolog3.LIBCMT ref: 00413D4B
                                                • Part of subcall function 00411500: __EH_prolog3.LIBCMT ref: 00411507
                                                • Part of subcall function 00410A1E: _strerror.LIBCMT ref: 00410A39
                                                • Part of subcall function 00410ED1: __EH_prolog3.LIBCMT ref: 00410ED8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strerror
                                              • String ID: $DIR$$PROGRAM$%ZOCFILES%$Software\EmTec$ZOC$ZOC5
                                              • API String ID: 3094183856-1215133591
                                              • Opcode ID: 6342ea278712bd1621e844bb2ac57a199d22d5092e42c1ffd3618b15dd1a3553
                                              • Instruction ID: 31f00c463a37ddbbfba70e7a30d23953268d8750e48afef9c5f6c967342a5b54
                                              • Opcode Fuzzy Hash: 6342ea278712bd1621e844bb2ac57a199d22d5092e42c1ffd3618b15dd1a3553
                                              • Instruction Fuzzy Hash: C4717271800288EADB11EF65CC45BDD7BB4AF15318F1441AEF849A31D2EB785B48CBA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0040CAC3
                                                • Part of subcall function 00413D44: __EH_prolog3.LIBCMT ref: 00413D4B
                                                • Part of subcall function 00411500: __EH_prolog3.LIBCMT ref: 00411507
                                                • Part of subcall function 00410A1E: _strerror.LIBCMT ref: 00410A39
                                                • Part of subcall function 00410ED1: __EH_prolog3.LIBCMT ref: 00410ED8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strerror
                                              • String ID: $DIR$$PROGRAM$%ZOCFILES%$Software\EmTec$ZOC$ZOC6
                                              • API String ID: 3094183856-3513001517
                                              • Opcode ID: ac3596d289cef1e51580c47283807979b4401bae332f44f2a8c71b20e8231fc3
                                              • Instruction ID: c509b77a52403199abc11a3b21c738b7fd7a645ecde9d56d0c20be4b738aaf22
                                              • Opcode Fuzzy Hash: ac3596d289cef1e51580c47283807979b4401bae332f44f2a8c71b20e8231fc3
                                              • Instruction Fuzzy Hash: 2F718371800288EADB11EF65CC85BDD7BB4AF15318F1441AEF849B31D2EB785B48CBA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3
                                              • String ID: .\strings.cpp$<NULL>$FALSE$isxdigit(xdigit[0])$isxdigit(xdigit[1])
                                              • API String ID: 431132790-2099139090
                                              • Opcode ID: 9e9ff284e5610fe18e7b66ed8c83e1aa913da33d467b81d511564582ed4a67b3
                                              • Instruction ID: 56b7c19bb3c4fd6f3bcb3852a22283f7fbb2ad5c2bc44a8fd832f72b91477286
                                              • Opcode Fuzzy Hash: 9e9ff284e5610fe18e7b66ed8c83e1aa913da33d467b81d511564582ed4a67b3
                                              • Instruction Fuzzy Hash: 8551F830D042889FDB21DFA89441BFEBFB8AB59305F14806FD44577283C7BC5A88876A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041503B
                                                • Part of subcall function 0041036C: __EH_prolog3.LIBCMT ref: 00410373
                                                • Part of subcall function 0041036C: _strlen.LIBCMT ref: 004103B5
                                                • Part of subcall function 0041036C: _strlen.LIBCMT ref: 004103E2
                                                • Part of subcall function 00411500: __EH_prolog3.LIBCMT ref: 00411507
                                                • Part of subcall function 00410A1E: _strerror.LIBCMT ref: 00410A39
                                                • Part of subcall function 00401A26: __EH_prolog3.LIBCMT ref: 00401A2D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strlen$_strerror
                                              • String ID: \..\approot.cpp$\..\main.cpp$\Debug$\Debug2$\Release$\Release2
                                              • API String ID: 2497294980-1857618801
                                              • Opcode ID: cb20fe3143dc46bc3821143fc4100c22fc0077c98868a2e38462abe5d865526f
                                              • Instruction ID: 5afbb1781faf8a5292670a928b98c71d69ce5cb78a951168abcb29959865bc49
                                              • Opcode Fuzzy Hash: cb20fe3143dc46bc3821143fc4100c22fc0077c98868a2e38462abe5d865526f
                                              • Instruction Fuzzy Hash: 42515132914288EACB11EFA4C846BDD77A4AF14358F14416AFC15A32C2EB7C9A8C8795
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041C474
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 00419A87: _strncpy.LIBCMT ref: 00419AA6
                                                • Part of subcall function 00418F66: _memset.LIBCMT ref: 00418FAD
                                                • Part of subcall function 00418F66: _sprintf.LIBCMT ref: 00418FCA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_memset_sprintf_strlen_strncpy
                                              • String ID: .com$EMAIL::Receiver %s$EMAIL::Sender %s$EMAIL::SmtpHost %s$EMAIL::Subject %s$anonymous@
                                              • API String ID: 165982434-1665083234
                                              • Opcode ID: 8af7be721da2cc9c296706e07c1b9310c9574688be6eac2ff942fb813ad83f8c
                                              • Instruction ID: 69d2969e739ce943c7cbb8132b45b483c0e57ceb9c9670e5cc93f1bad8b9dca9
                                              • Opcode Fuzzy Hash: 8af7be721da2cc9c296706e07c1b9310c9574688be6eac2ff942fb813ad83f8c
                                              • Instruction Fuzzy Hash: EA51C230500389EEDB11EBB6C846BDE7BA5AF54308F14446EF849631C2DB7C6B48D76A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID: UNICODE::UNICODE$UNICODE::UNICODE done$UNICODE::UNICODE init done$UNICODE::UNICODE init tables
                                              • API String ID: 2102423945-1718955495
                                              • Opcode ID: 80b53a0a5b67439f8051c3c0c700a054a5c61f43f6f332825775ae98fdaa2567
                                              • Instruction ID: 28e0c7ad7e069d4f1db24a7f3f3baafc716b824d464fc0dbe919e2535a258d5e
                                              • Opcode Fuzzy Hash: 80b53a0a5b67439f8051c3c0c700a054a5c61f43f6f332825775ae98fdaa2567
                                              • Instruction Fuzzy Hash: 6B3126712007049BD7299F2AC852ABAB2ADEF41748F50046FE95ACF241EB78BD81C758
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00423014
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 0040F93F: _strlen.LIBCMT ref: 0040F95F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3_strlen
                                              • String ID: ******$IMAP$LOGIN$PASS $TCP::WriteCmd %s$TCP::WriteCmd returned %s
                                              • API String ID: 782648989-1627918896
                                              • Opcode ID: 1702b3819fee0a067c95d98b212d351507563709cff1767492ca9baddf3db522
                                              • Instruction ID: 3f335f3d6886c161aae273e551e3119ec035c3b465d8d9693783b5ec972d7650
                                              • Opcode Fuzzy Hash: 1702b3819fee0a067c95d98b212d351507563709cff1767492ca9baddf3db522
                                              • Instruction Fuzzy Hash: 9B314172900259BBCF15EF91CC429EE7B78EF18358F94003BF80572192DB385A59CA69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strlen$H_prolog3_memset
                                              • String ID: DGE$FILENAME::FILENAME returns %s$\.\
                                              • API String ID: 1544512054-2511429333
                                              • Opcode ID: 92d73c30fa42c47c7d13a9f96a1b96025e8fe64660b94f3bf67e95454d8925d7
                                              • Instruction ID: 54661771440509633bf18104852cf503b3abf31adc7d9e390e8fac20b7d34041
                                              • Opcode Fuzzy Hash: 92d73c30fa42c47c7d13a9f96a1b96025e8fe64660b94f3bf67e95454d8925d7
                                              • Instruction Fuzzy Hash: F3210631600288ABCB15EF958846BDE77B4DF95708F10402FFD0597382EBBD5A4C9759
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • PeekMessageA.USER32(00000001,00000000,00000000,00000000,00000001), ref: 004158C9
                                              • TranslateMessage.USER32(?), ref: 004158E6
                                              • DispatchMessageA.USER32(?), ref: 004158F0
                                              • MsgWaitForMultipleObjects.USER32(00000001,000001FF,00000000,?,000000FF), ref: 00415906
                                              Strings
                                              • WINDOWS::WinWaitForSingleObject dispatch msg= %04x, xrefs: 004158D6
                                              • WINDOWS::WinWaitForSingleObject finished, xrefs: 0041590F
                                              • .\windows_win32.cpp, xrefs: 00415932
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Message$DispatchMultipleObjectsPeekTranslateWait
                                              • String ID: .\windows_win32.cpp$WINDOWS::WinWaitForSingleObject dispatch msg= %04x$WINDOWS::WinWaitForSingleObject finished
                                              • API String ID: 2231909638-791906260
                                              • Opcode ID: f1833bad4ce4b670fbf2eef20d80b446d15b7c4106f0c2f5ec303141c9f92142
                                              • Instruction ID: b0e3dc20ce9c05df7aa32daaff5ee327c47403bced5f2ea3d0d0dc2180bf99cc
                                              • Opcode Fuzzy Hash: f1833bad4ce4b670fbf2eef20d80b446d15b7c4106f0c2f5ec303141c9f92142
                                              • Instruction Fuzzy Hash: 2D11987264030DFEEB105BD58C8AFDF376CEB44715F10402BFD0166091D6B8D98486A9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041F896
                                              • CoInitialize.OLE32(00000000), ref: 0041F8D2
                                              • _memset.LIBCMT ref: 0041F8E5
                                                • Part of subcall function 004157DA: __EH_prolog3.LIBCMT ref: 004157E1
                                                • Part of subcall function 0041EFC4: __EH_prolog3.LIBCMT ref: 0041EFCB
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                              • SHBrowseForFolderA.SHELL32(?,?), ref: 0041F92E
                                              • SHGetPathFromIDListA.SHELL32(00000000,00000000), ref: 0041F93F
                                              • SHGetMalloc.SHELL32(?), ref: 0041F949
                                              • _strlen.LIBCMT ref: 0041F961
                                              • _strlen.LIBCMT ref: 0041F971
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strlen$BrowseFolderFromInitializeListMallocPath_memset
                                              • String ID:
                                              • API String ID: 3582332183-0
                                              • Opcode ID: 556a8f202b3d51e1948a0f6de1742f1189e9fe77361264dabb6abaf46adcf4ac
                                              • Instruction ID: 901c0e7140ad745ee44d131ca0ca1699b1811a331fe78104dff1d50718531f15
                                              • Opcode Fuzzy Hash: 556a8f202b3d51e1948a0f6de1742f1189e9fe77361264dabb6abaf46adcf4ac
                                              • Instruction Fuzzy Hash: BD4151B5D0024DEFCB10EFA5D845AEEB7B4FF48308F00442AF915AB291D7789645CB54
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00407570
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 00413D81: __EH_prolog3.LIBCMT ref: 00413D88
                                                • Part of subcall function 004114D2: __EH_prolog3.LIBCMT ref: 004114D9
                                                • Part of subcall function 00411793: __EH_prolog3.LIBCMT ref: 0041179A
                                              • _strlen.LIBCMT ref: 0040763C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strlen
                                              • String ID: $DIR$$PROGRAM$CEAppMgr.exe$Software\Microsoft\Windows\CurrentVersion\App Paths\
                                              • API String ID: 3239654323-2088391398
                                              • Opcode ID: 0c953ea9c3368ddde8cd06a6f3ba37432a80e3e118f51092911e09648d62274f
                                              • Instruction ID: 0fefd57b033297214be7ae376459f3a28dabd28274a92ff8aafe567996a6cf8a
                                              • Opcode Fuzzy Hash: 0c953ea9c3368ddde8cd06a6f3ba37432a80e3e118f51092911e09648d62274f
                                              • Instruction Fuzzy Hash: 6191E970904248FEDB14EFA5CC46BDD7BA49F14318F10416EF905A72C2E7789B88C799
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • getSystemCP.LIBCMT ref: 004402D5
                                                • Part of subcall function 00440242: _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0044024F
                                                • Part of subcall function 00440242: GetOEMCP.KERNEL32(00000000), ref: 00440269
                                              • setSBCS.LIBCMT ref: 004402E7
                                                • Part of subcall function 0043FFBF: _memset.LIBCMT ref: 0043FFD2
                                              • IsValidCodePage.KERNEL32(-00000030), ref: 0044032D
                                              • GetCPInfo.KERNEL32(00000000,?), ref: 00440340
                                              • _memset.LIBCMT ref: 00440358
                                              • setSBUpLow.LIBCMT ref: 0044042B
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Locale_memset$CodeInfoPageSystemUpdateUpdate::_Valid
                                              • String ID:
                                              • API String ID: 2658552758-0
                                              • Opcode ID: 03b476c277a962630d0066a87d17d6987b9a127d535cf155bebddf148b768a7a
                                              • Instruction ID: 2b5736ddb7c6a9cd153bfb9935971c8d1e10e9e0193cf67bd285b0e14bd8f473
                                              • Opcode Fuzzy Hash: 03b476c277a962630d0066a87d17d6987b9a127d535cf155bebddf148b768a7a
                                              • Instruction Fuzzy Hash: DB5113319042158BEB21DF65C8842BEBBE4EF05305F1484ABEA859F242D67CC952CBD9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00409375
                                                • Part of subcall function 00415A9E: __EH_prolog3.LIBCMT ref: 00415AA5
                                                • Part of subcall function 00415A9E: GetWindowTextLengthA.USER32(?), ref: 00415AB7
                                                • Part of subcall function 00415A9E: GetWindowTextA.USER32(?,00000000,00000001), ref: 00415AEC
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                                • Part of subcall function 00411530: __EH_prolog3.LIBCMT ref: 00411537
                                                • Part of subcall function 00411530: _memset.LIBCMT ref: 00411552
                                                • Part of subcall function 00411530: _strlen.LIBCMT ref: 00411589
                                                • Part of subcall function 00402F64: __EH_prolog3.LIBCMT ref: 00402F6B
                                              • _strlen.LIBCMT ref: 0040942A
                                              • _sprintf.LIBCMT ref: 004094BA
                                              • GetParent.USER32 ref: 004094F0
                                                • Part of subcall function 00411500: __EH_prolog3.LIBCMT ref: 00411507
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$TextWindow_strlen$LengthParent_memset_sprintf
                                              • String ID: phonebk$zoc.exe
                                              • API String ID: 325083663-1788341587
                                              • Opcode ID: 9319a5fd62f1c7dd8ad9d2158fccda98ff41b736834064bc91b1e6fbb7f70222
                                              • Instruction ID: f2270802b09cf7d0114e5a39e79aecb6f3167cccece6095d76e5b2e4842081db
                                              • Opcode Fuzzy Hash: 9319a5fd62f1c7dd8ad9d2158fccda98ff41b736834064bc91b1e6fbb7f70222
                                              • Instruction Fuzzy Hash: 0551B371904248AEDB15EBA5DD06BDDB7B4AF14318F10807EE509B22D2EB785B48CB19
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __mtinitlocknum.LIBCMT ref: 00446303
                                                • Part of subcall function 004433C1: __FF_MSGBANNER.LIBCMT ref: 004433DD
                                              • __lock.LIBCMT ref: 00446317
                                              • __lock.LIBCMT ref: 00446360
                                              • ___crtInitCritSecAndSpinCount.LIBCMT ref: 0044637B
                                              • EnterCriticalSection.KERNEL32(00000115,00469FD0,00000018,0043DADD,00000109,00000000,00000000), ref: 004463A1
                                              • LeaveCriticalSection.KERNEL32(00000115), ref: 004463AE
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CriticalSection__lock$CountCritEnterInitLeaveSpin___crt__mtinitlocknum
                                              • String ID:
                                              • API String ID: 2236623020-0
                                              • Opcode ID: 5eeb4f1003d0238ea5a3daf38dd849c340203a7cd40c80704053902742844812
                                              • Instruction ID: 196cd0b24b68a955476ac231691ea59e614d387b85dafb4239c54dd630f69f12
                                              • Opcode Fuzzy Hash: 5eeb4f1003d0238ea5a3daf38dd849c340203a7cd40c80704053902742844812
                                              • Instruction Fuzzy Hash: B5415D319007418BFB249F68D90536E7BF0AF12325F26821FE4669A2D1CBBC8941CB1E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00420FC6
                                                • Part of subcall function 0042A56C: __EH_prolog3.LIBCMT ref: 0042A573
                                                • Part of subcall function 0042A56C: _malloc.LIBCMT ref: 0042A5AE
                                                • Part of subcall function 00412ECD: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 00412EE0
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 00419BAA: __EH_prolog3.LIBCMT ref: 00419BB1
                                                • Part of subcall function 00419BAA: _strncpy.LIBCMT ref: 00419BFF
                                                • Part of subcall function 00419BAA: _strncpy.LIBCMT ref: 00419C0F
                                              Strings
                                              • <unknown>, xrefs: 0042107A
                                              • BASEIO::BASEIO ConstructorDoneHandle= %08x, xrefs: 004210F0
                                              • BASEIO::BASEIO done, xrefs: 0042110A
                                              • BASEIO::BASEIO semKillThreadHandle= %08x, xrefs: 004210E4
                                              • BASEIO::BASEIO this= %08x, ourid= %s, calltype= %s, parm= %s, xrefs: 004210BF
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strncpy$CreateEvent_malloc_strlen
                                              • String ID: <unknown>$BASEIO::BASEIO ConstructorDoneHandle= %08x$BASEIO::BASEIO done$BASEIO::BASEIO semKillThreadHandle= %08x$BASEIO::BASEIO this= %08x, ourid= %s, calltype= %s, parm= %s
                                              • API String ID: 2317793957-2465247092
                                              • Opcode ID: 6ec3266579b3c3cf94ce5f22f1ee2b90e796090d389d262421c158e1aca4b9e4
                                              • Instruction ID: 3bcd102ed439458aa2328305b4ce3425ab384b8966ca00be2a54539d322ca78c
                                              • Opcode Fuzzy Hash: 6ec3266579b3c3cf94ce5f22f1ee2b90e796090d389d262421c158e1aca4b9e4
                                              • Instruction Fuzzy Hash: 4F419134504784EECB21DF76C941BDBBBE0AF59708F10490EF89A23292DBB96254CB19
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strlen$H_prolog3_strcat
                                              • String ID: <self>
                                              • API String ID: 1214488146-3288012949
                                              • Opcode ID: 4bf1c7a333f22114bef45732c39cd10e6bf7f4994ca7dd478a71559da8702369
                                              • Instruction ID: 90a018e4806f5f9647f84efa4d98bd17fbc1052c98603d666a48d31e6f50e3a3
                                              • Opcode Fuzzy Hash: 4bf1c7a333f22114bef45732c39cd10e6bf7f4994ca7dd478a71559da8702369
                                              • Instruction Fuzzy Hash: 81213A711083916EEB15AF2ACC01BDE3B94AF86324F14106FF881972D2DB7C9C82875D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00413774
                                              • WaitForSingleObject.KERNEL32(?,?), ref: 004137BA
                                                • Part of subcall function 00412A8A: __EH_prolog3.LIBCMT ref: 00412AA9
                                                • Part of subcall function 00412A8A: GetLastError.KERNEL32(00000008), ref: 00412ACB
                                                • Part of subcall function 00412A8A: _memset.LIBCMT ref: 00412AED
                                                • Part of subcall function 00412A8A: FormatMessageA.KERNEL32(00001000,00000000,FFFFED99,00000000,00000000,00000100,00000000,?,?,00000008), ref: 00412B0C
                                              Strings
                                              • OSYS::WaitThread hthread=%08x timeout= %d failed %s, xrefs: 004137EE
                                              • .\osys_win32.cpp, xrefs: 004137A5
                                              • OSYS::WaitThread hthread=%08x, timeout= %d, xrefs: 00413785
                                              • hthread!=NULL, xrefs: 004137AA
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$ErrorFormatLastMessageObjectSingleWait_memset
                                              • String ID: .\osys_win32.cpp$OSYS::WaitThread hthread=%08x timeout= %d failed %s$OSYS::WaitThread hthread=%08x, timeout= %d$hthread!=NULL
                                              • API String ID: 142547358-3696753234
                                              • Opcode ID: cd288f7f9e4150dc3f66f2f54bdb41815c415a6411b398f237795d0551f6d9a4
                                              • Instruction ID: f619b219c6c6daaa42870c36af6675fa2eb567c62fd4f625241cd1b0a8813aa5
                                              • Opcode Fuzzy Hash: cd288f7f9e4150dc3f66f2f54bdb41815c415a6411b398f237795d0551f6d9a4
                                              • Instruction Fuzzy Hash: FA014971541314B7C7107B624C4BFDF2A249F41B1AF54411FBC047B1C3DB6C9A6882E9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • WaitForSingleObject.KERNEL32(E5C332AE,?), ref: 004130B9
                                              • _sprintf.LIBCMT ref: 004130EB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ObjectSingleWait_sprintf
                                              • String ID: .\osys_win32.cpp$EVENTSEM::Wait %08x rc=%d$handle= %08x$rc!=WAIT_FAILED
                                              • API String ID: 3570847061-2891030087
                                              • Opcode ID: 1be6c3aa699451e8eba74bf40ce803ead6a38d97a7d9f04f9f2eb04ebcd968e5
                                              • Instruction ID: 0f27f2789e1d13210565270c1e4ed5318751c44e56aff20ad8054a18177050e3
                                              • Opcode Fuzzy Hash: 1be6c3aa699451e8eba74bf40ce803ead6a38d97a7d9f04f9f2eb04ebcd968e5
                                              • Instruction Fuzzy Hash: 71014C316002087ADB109F79DC03F9A77E8AF48B29F10076BFE55D31C2EA788A50875A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _getenv
                                              • String ID: .\strings.cpp$<NULL>$<none>$EMTECFAILONNULL$p!=NULL
                                              • API String ID: 3834326495-3058051619
                                              • Opcode ID: 0b71fc663b2add86da0fcc721852ee57e987063ebc593aaeb22fdfe86fac87de
                                              • Instruction ID: 40fd6c6ddc18c04048565f2e429f2af0f0bf4d1033f0e546ecdc9007074cc206
                                              • Opcode Fuzzy Hash: 0b71fc663b2add86da0fcc721852ee57e987063ebc593aaeb22fdfe86fac87de
                                              • Instruction Fuzzy Hash: CBF0F035B0021057EB209675AC23B5723888B00B55F05A43FFC44FB2C3D76CDC48429C
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              • DeleteObject.GDI32(?), ref: 0041A746
                                              • CreateFontIndirectA.GDI32(?), ref: 0041A754
                                              • SelectObject.GDI32(?,?), ref: 0041A77A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Object$CreateDeleteErrorFontH_prolog3IndirectLastSelect__snprintf_memset
                                              • String ID: .\printer_win32.cpp$this->hDC$this->hFont
                                              • API String ID: 4085316585-2624105127
                                              • Opcode ID: b2e4c608f40e23ea4f4fce3a8e13abefeb364bf7baeb0169104fe828d29003f1
                                              • Instruction ID: 6ab158ebc43fe64ff5be0a275118b8951eb661639f0bdfc588b036db918ba3a1
                                              • Opcode Fuzzy Hash: b2e4c608f40e23ea4f4fce3a8e13abefeb364bf7baeb0169104fe828d29003f1
                                              • Instruction Fuzzy Hash: AEF0A471540700AFD7305B56DC4AF4777B8EB84B2AF10052EF615951E2C379E8948BAD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • LoadLibraryW.KERNEL32(kernel32), ref: 00414B5D
                                              • GetProcAddress.KERNEL32(00000000,HeapSetInformation), ref: 00414B70
                                              • GetProcessHeap.KERNEL32(00000000,?,00000004), ref: 00414B8A
                                              • FreeLibrary.KERNEL32(00000000), ref: 00414B96
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Library$AddressFreeHeapLoadProcProcess
                                              • String ID: HeapSetInformation$kernel32
                                              • API String ID: 2919563809-1954744524
                                              • Opcode ID: 691bfc8bd2fcaedfd429b81094c924810f278b05e5e70aaeb058ed37c7ff659a
                                              • Instruction ID: eb774b62ccc9eacdfc18479868cb3dafbb33bc97a8c786af79a915ba7d3c58cb
                                              • Opcode Fuzzy Hash: 691bfc8bd2fcaedfd429b81094c924810f278b05e5e70aaeb058ed37c7ff659a
                                              • Instruction Fuzzy Hash: 11F0BB716443146FD3122BE59C8DF6F7ABCDBC4756B10013AB905D6242DAA4DC444569
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0042A573
                                                • Part of subcall function 00413129: CreateMutexA.KERNEL32(00000000,00000000,?,?,0041B1B5,00000000,00000000,E5C332AE,?,000001FF,00000000), ref: 00413140
                                                • Part of subcall function 00412ECD: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 00412EE0
                                              • _malloc.LIBCMT ref: 0042A5AE
                                                • Part of subcall function 00437FAD: __FF_MSGBANNER.LIBCMT ref: 00437FD0
                                                • Part of subcall function 00437FAD: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00442DC2,?,00000001,?,0044340E,00000018,00469F50,0000000C,0044349D,?), ref: 00438025
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              Strings
                                              • RINGBUFFER::RINGBUFFER this= %08x, xrefs: 0042A596
                                              • this->Data, xrefs: 0042A5C0
                                              • RINGBUFFER::RINGBUFFER done initsize=%d, xrefs: 0042A5CF
                                              • .\ringbuffers.cpp, xrefs: 0042A5BB
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CreateH_prolog3$AllocateErrorEventHeapLastMutex__snprintf_malloc_memset
                                              • String ID: .\ringbuffers.cpp$RINGBUFFER::RINGBUFFER done initsize=%d$RINGBUFFER::RINGBUFFER this= %08x$this->Data
                                              • API String ID: 3026233294-3410817464
                                              • Opcode ID: c16edfb47097b05c98aabe926c50eea792c003f11eb37df6f5e45664c7124d13
                                              • Instruction ID: 60276deae85f3eb243633ae50512ce527d7a1670b1042fdef742f0d234af60ce
                                              • Opcode Fuzzy Hash: c16edfb47097b05c98aabe926c50eea792c003f11eb37df6f5e45664c7124d13
                                              • Instruction Fuzzy Hash: 3BF081B4940744A6C230AF678C42E9B7AA89F99B04F10480FB95567243C7BC555487AD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • TlsGetValue.KERNEL32(00000000,0043F82B,00000000,0044B360,00000000,00000000,00000314,?,?,?,00489AB8,004437E6,00489AB8,Microsoft Visual C++ Runtime Library,00012010), ref: 0043F7C3
                                              • TlsGetValue.KERNEL32(00000005,?,?,?,00489AB8,004437E6,00489AB8,Microsoft Visual C++ Runtime Library,00012010), ref: 0043F7DA
                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,00489AB8,004437E6,00489AB8,Microsoft Visual C++ Runtime Library,00012010), ref: 0043F7EF
                                              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 0043F80A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Value$AddressHandleModuleProc
                                              • String ID: EncodePointer$KERNEL32.DLL
                                              • API String ID: 1929421221-3682587211
                                              • Opcode ID: 78f8f6979186b759a6defa01c0b65d6cbf8acc87b97e787e0ef15f2f13502b66
                                              • Instruction ID: ba63afe6550cb095e9f57bfb73578da6876e209a6e1e7319751d66ba78354eba
                                              • Opcode Fuzzy Hash: 78f8f6979186b759a6defa01c0b65d6cbf8acc87b97e787e0ef15f2f13502b66
                                              • Instruction Fuzzy Hash: D3F0F634D00613AB96156B39EC1092B7BD59F48750F045233F828D3270DB28DC86C65E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • TlsGetValue.KERNEL32(00000000,0043F8DD,?,00438E66), ref: 0043F83A
                                              • TlsGetValue.KERNEL32(00000005,?,00438E66), ref: 0043F851
                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,00438E66), ref: 0043F866
                                              • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 0043F881
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Value$AddressHandleModuleProc
                                              • String ID: DecodePointer$KERNEL32.DLL
                                              • API String ID: 1929421221-629428536
                                              • Opcode ID: 7553fde912f5b0379eddec5e5413ebeacde4f7170e61886b0f52dd37bb8aaa5d
                                              • Instruction ID: c27569a25ca594739c79439225c609bfb4d0e5bd39ee184547f580c6e6036bf2
                                              • Opcode Fuzzy Hash: 7553fde912f5b0379eddec5e5413ebeacde4f7170e61886b0f52dd37bb8aaa5d
                                              • Instruction Fuzzy Hash: ABF09634D01713AB962D7B3ADC0496F3AE5AF48754F141172F918DB271EB24CC45865E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041D9DB
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                              • _memset.LIBCMT ref: 0041DB8F
                                                • Part of subcall function 00415B53: KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 00415B5A
                                                • Part of subcall function 004107B9: __EH_prolog3.LIBCMT ref: 004107C0
                                                • Part of subcall function 004107B9: _strpbrk.LIBCMT ref: 00410829
                                                • Part of subcall function 004107B9: _strlen.LIBCMT ref: 00410835
                                                • Part of subcall function 0040F9F8: _strlen.LIBCMT ref: 0040FA08
                                                • Part of subcall function 0040F9F8: _strlen.LIBCMT ref: 0040FA13
                                                • Part of subcall function 0040F9F8: _strncpy.LIBCMT ref: 0040FAA9
                                                • Part of subcall function 004107B9: _strpbrk.LIBCMT ref: 00410809
                                                • Part of subcall function 0041036C: __EH_prolog3.LIBCMT ref: 00410373
                                                • Part of subcall function 0041036C: _strlen.LIBCMT ref: 004103B5
                                                • Part of subcall function 0041036C: _strlen.LIBCMT ref: 004103E2
                                                • Part of subcall function 00415A8E: SetWindowTextA.USER32(?,00000000), ref: 00415A95
                                                • Part of subcall function 004157DA: __EH_prolog3.LIBCMT ref: 004157E1
                                                • Part of subcall function 00415A9E: __EH_prolog3.LIBCMT ref: 00415AA5
                                                • Part of subcall function 00415A9E: GetWindowTextLengthA.USER32(?), ref: 00415AB7
                                                • Part of subcall function 00415A9E: GetWindowTextA.USER32(?,00000000,00000001), ref: 00415AEC
                                                • Part of subcall function 00413EF6: __EH_prolog3.LIBCMT ref: 00413EFD
                                                • Part of subcall function 00413EF6: MessageBoxA.USER32(?,?,?,00010010), ref: 00413F9E
                                              Strings
                                              • Internet Connection|Please press OK when an Internet connection is available|Sending mail ...|Your mail has been sent. Thank you!|Error: |An error occurred ($error)!Please try the send button again or use fax/mail or your own email program to send the text.|, xrefs: 0041DA00
                                              • Internet Verbindung|Bitte klicken Sie auf OK, wenn Sie eine Internetverbindung hergestellt haben.|Sende eMail ...|Die eMail wurde verschickt. Vielen Dank!|Fehler: |Es ist ein Fehler aufgetreten ($error).Bitte versuchen Sie es noch einmal oder schicken Sie de, xrefs: 0041D9F9, 0041DA0A
                                              • $error, xrefs: 0041DCE4
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strlen$TextWindow$_strpbrk$CallbackDispatcherLengthMessageUser_memset_strncpy
                                              • String ID: $error$Internet Connection|Please press OK when an Internet connection is available|Sending mail ...|Your mail has been sent. Thank you!|Error: |An error occurred ($error)!Please try the send button again or use fax/mail or your own email program to send the text.|$Internet Verbindung|Bitte klicken Sie auf OK, wenn Sie eine Internetverbindung hergestellt haben.|Sende eMail ...|Die eMail wurde verschickt. Vielen Dank!|Fehler: |Es ist ein Fehler aufgetreten ($error).Bitte versuchen Sie es noch einmal oder schicken Sie de
                                              • API String ID: 1921037477-3312823702
                                              • Opcode ID: 201e55647b85cbe85f011bd561868eb8c9cd43ba809ca8e9309975d83fd8c0ed
                                              • Instruction ID: 9c34e24e1fafd2b7af548349b6014d16ffe58b465e0a3a1266d0b7652947e573
                                              • Opcode Fuzzy Hash: 201e55647b85cbe85f011bd561868eb8c9cd43ba809ca8e9309975d83fd8c0ed
                                              • Instruction Fuzzy Hash: D3E18270C0428CEEDB15EBA5D855BDDBBB4AF24308F14409EE505B32C2EB781B88DB65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0040B69F
                                                • Part of subcall function 00411530: __EH_prolog3.LIBCMT ref: 00411537
                                                • Part of subcall function 00411530: _memset.LIBCMT ref: 00411552
                                                • Part of subcall function 00411530: _strlen.LIBCMT ref: 00411589
                                                • Part of subcall function 00410A1E: _strerror.LIBCMT ref: 00410A39
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 004136A5: __EH_prolog3_GS.LIBCMT ref: 004136AF
                                                • Part of subcall function 004136A5: LoadStringA.USER32(?,?,?,00000100), ref: 00413706
                                                • Part of subcall function 00419AB4: __EH_prolog3.LIBCMT ref: 00419ABB
                                                • Part of subcall function 00419AB4: _strncpy.LIBCMT ref: 00419AF9
                                                • Part of subcall function 00435AB2: _malloc.LIBCMT ref: 00435ACA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strlen$H_prolog3_LoadString_malloc_memset_strerror_strncpy
                                              • String ID: 11#$12#$21#$admin.ini
                                              • API String ID: 3746180839-1320473499
                                              • Opcode ID: 3bf0b471778d8687ad661272e2520b19e3744863ce132c1550439dda0792a882
                                              • Instruction ID: afe8ec872672cff4f518f5bafc6e6aba2a9f1333596383b5dc3460346b58a39e
                                              • Opcode Fuzzy Hash: 3bf0b471778d8687ad661272e2520b19e3744863ce132c1550439dda0792a882
                                              • Instruction Fuzzy Hash: 42C18470604288EEDB14EBA5C855BEE77A49F15308F1040BFF549A72C2EB7C9A48CB5D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • _fprintf.LIBCMT ref: 0042E44A
                                              • _fprintf.LIBCMT ref: 0042E483
                                                • Part of subcall function 0042DE0E: _fprintf.LIBCMT ref: 0042DE40
                                                • Part of subcall function 0042DE0E: _fprintf.LIBCMT ref: 0042DE4B
                                              Strings
                                              • error: -fn or any combination of -c, -l, -p, -t, -u and -v options invalid, xrefs: 0042E43C
                                              • caution: both -n and -o specified; ignoring -o, xrefs: 0042E475
                                              • WB, xrefs: 0042E0B9, 0042E0C0
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _fprintf
                                              • String ID: WB$caution: both -n and -o specified; ignoring -o$error: -fn or any combination of -c, -l, -p, -t, -u and -v options invalid
                                              • API String ID: 1654120334-1152980988
                                              • Opcode ID: a61096ebf6b061a8d51918fe0e82c37f1b67eea1da549e3ddd192fc206473ec9
                                              • Instruction ID: 096d3f3f7106010d2c9ebe244c24dfb0a2d57159b6a5b43e4e1092aab57de0bb
                                              • Opcode Fuzzy Hash: a61096ebf6b061a8d51918fe0e82c37f1b67eea1da549e3ddd192fc206473ec9
                                              • Instruction Fuzzy Hash: 95A1297070D230CB8725DF26BDA413D7A62B644B197B84C7FE81286361D278E991CF9E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • _memset.LIBCMT ref: 0041E9EC
                                                • Part of subcall function 0041E587: GetKeyState.USER32(00000010), ref: 0041E5F9
                                              • _fprintf.LIBCMT ref: 0041EA6A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: State_fprintf_memset
                                              • String ID: FIXME: %s$WM_KEY msg= %04x, mp1= %08x, mp2= %08x, scan= %02x, ext= %d$handle WM_UNICHAR under Windows
                                              • API String ID: 3675406223-1317379654
                                              • Opcode ID: d74aadd1e4d733080e14daebd2956328a1731977608f07d8d27f6a322403b6e4
                                              • Instruction ID: e768970d106e4c91be72cf9dbf2adc9a8afe70aa6acd721e4b63331690f8f0b1
                                              • Opcode Fuzzy Hash: d74aadd1e4d733080e14daebd2956328a1731977608f07d8d27f6a322403b6e4
                                              • Instruction Fuzzy Hash: 2D81E675A047059BDB248FAAC8856EBB7E1EF44314F08492FEDA2C7341D778E980C758
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004177CC
                                              • GetWindowLongA.USER32(?,000000EC), ref: 0041795A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3LongWindow
                                              • String ID: 0$0$Button
                                              • API String ID: 92005281-1714651067
                                              • Opcode ID: 30daf967e5d3ec3f327cc8d3b2a585c5c54cf4bdd992573385112d33685956c8
                                              • Instruction ID: f9eef8677aa6aa962eaef2c3239c1eb1329c90a0634d631a65af765570889981
                                              • Opcode Fuzzy Hash: 30daf967e5d3ec3f327cc8d3b2a585c5c54cf4bdd992573385112d33685956c8
                                              • Instruction Fuzzy Hash: 1C61A070904209DFDF14DFA9C984AEEB7B1FF08314F14852EE815AB281DB38A984CF58
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00416B55
                                                • Part of subcall function 004157DA: __EH_prolog3.LIBCMT ref: 004157E1
                                                • Part of subcall function 00415EEF: GetWindowRect.USER32(?,?), ref: 00415F12
                                                • Part of subcall function 00415EEF: GetWindow.USER32(?,00000004), ref: 00415F34
                                                • Part of subcall function 00415EEF: ScreenToClient.USER32(?,?), ref: 00415F4A
                                                • Part of subcall function 00415EEF: ScreenToClient.USER32(?,?), ref: 00415F51
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                              • IsWindowVisible.USER32(?), ref: 00416B96
                                              • IsChild.USER32(?,?), ref: 00416BC3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3Window$ClientScreen$ChildRectVisible
                                              • String ID: !is_child$.\windows_win32.cpp
                                              • API String ID: 2713898942-2306415184
                                              • Opcode ID: ec3dcbdab865bd89314bd79e2644ad3db03272f4c4a0ffe8748b2caef552ab92
                                              • Instruction ID: dc47cee0c42234229bcebdcca75c876e037ab9719c15de2778af4e1199d92ca4
                                              • Opcode Fuzzy Hash: ec3dcbdab865bd89314bd79e2644ad3db03272f4c4a0ffe8748b2caef552ab92
                                              • Instruction Fuzzy Hash: 59515B72D0060ADFCF04DFE9C9859EEBBB5EF94304F14412AE415B7250EB789A45CB94
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_memset_strlen
                                              • String ID: DGE$FILENAME::FILENAME returns %s
                                              • API String ID: 345007730-4005537505
                                              • Opcode ID: 917cf2e3414a9278fa0a61da6fa83426ae03fb43cd2244fe44389f72d7384a27
                                              • Instruction ID: 8a1c50ba78706162bb1faec0069ee038fe14a2aceba1f2b9f5775c9c42657627
                                              • Opcode Fuzzy Hash: 917cf2e3414a9278fa0a61da6fa83426ae03fb43cd2244fe44389f72d7384a27
                                              • Instruction Fuzzy Hash: FD418E71800148EACF15EBA1C846ADDBB74AF14318F54406FF549B3192EF785BC9CB69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041F221
                                                • Part of subcall function 00415786: __EH_prolog3_GS.LIBCMT ref: 0041578D
                                                • Part of subcall function 00415786: _sprintf.LIBCMT ref: 004157B5
                                                • Part of subcall function 00415786: _strlen.LIBCMT ref: 004157C2
                                              • _memset.LIBCMT ref: 0041F2D4
                                              • _sprintf.LIBCMT ref: 0041F2E9
                                              • WinHelpA.USER32(?,?,00000001,00000000), ref: 0041F316
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _sprintf$H_prolog3H_prolog3_Help_memset_strlen
                                              • String ID: %s::html/topic-%s.html
                                              • API String ID: 678899315-893373604
                                              • Opcode ID: 6076742ef0bce9f93ff25775f843d21866f177776743bbd7d3c63eab635160ec
                                              • Instruction ID: 13c53edef6d89de701011545681f6c86154e37ded6a0936ee3eaa759288994f8
                                              • Opcode Fuzzy Hash: 6076742ef0bce9f93ff25775f843d21866f177776743bbd7d3c63eab635160ec
                                              • Instruction Fuzzy Hash: 9B41D476900209AFDB10DFA5DC419EEB7B5FF48304F10453FE855A2291EB78AA498B28
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041422C
                                                • Part of subcall function 00418F66: _memset.LIBCMT ref: 00418FAD
                                                • Part of subcall function 00418F66: _sprintf.LIBCMT ref: 00418FCA
                                              • _strlen.LIBCMT ref: 00414279
                                              • _strlen.LIBCMT ref: 004142B3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strlen$H_prolog3_memset_sprintf
                                              • String ID: <NULL>$GetArgValue("%s", %d) returned %s
                                              • API String ID: 72350670-3048475594
                                              • Opcode ID: db69bd9e8413aac07baaf68d363d272f648e7f104341835dbe2dd64d189e1c36
                                              • Instruction ID: 12fdf931854cdf2e9cce4993750bc04e3f1011e5d6afc1ed80f165252957f54a
                                              • Opcode Fuzzy Hash: db69bd9e8413aac07baaf68d363d272f648e7f104341835dbe2dd64d189e1c36
                                              • Instruction Fuzzy Hash: FD31D570900209AFDF04EF95C841AEE7765AF48348F50816BFC55AB242DB3C9EC19759
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3_memset
                                              • String ID: pLock$this->ppItems$w:\zaphod\dynarray.cpp
                                              • API String ID: 2828583354-3357673720
                                              • Opcode ID: 874585fc2eeb194273d5a969465b740e2ffdf8a2a84b04535de2d7f5012e0887
                                              • Instruction ID: e45ba8112b30d06d6859e6e2839f0ba14e51f78c3b463013e6655bd95b9ecfd8
                                              • Opcode Fuzzy Hash: 874585fc2eeb194273d5a969465b740e2ffdf8a2a84b04535de2d7f5012e0887
                                              • Instruction Fuzzy Hash: B6219570600704ABC720EF3A8C46A5BB7F4EF88714F105A1FB996CB6D2DB78A5408B58
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00409576
                                                • Part of subcall function 004091AF: __EH_prolog3.LIBCMT ref: 004091BD
                                                • Part of subcall function 004091AF: CopyFileA.KERNEL32(?,?,00000000), ref: 004092E6
                                                • Part of subcall function 004091AF: RegCreateKeyA.ADVAPI32(80000001,Software\Enterprise Alternatives\REXX\ExecOptions,?), ref: 0040931A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$CopyCreateFile
                                              • String ID: HomePath$SETUP::NewSetupHookZOC %d %d %08x$Software\EmTec$ZOC4
                                              • API String ID: 622284977-544688503
                                              • Opcode ID: ae13c6f652ef42a490c4ed59e44451ede347059b3135657b1d8e280f5ccf8e67
                                              • Instruction ID: f9f5c1ad60773d94c24eaa760446d61a0429618ae0601ae725dc4a31e7a649eb
                                              • Opcode Fuzzy Hash: ae13c6f652ef42a490c4ed59e44451ede347059b3135657b1d8e280f5ccf8e67
                                              • Instruction Fuzzy Hash: B9219371901148EADB10EBA5C846BDEB7A4AF15309F10803BE855B72D3DB7D4E48CB6D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID: .\zocsetuphook5.cpp$steps[idadv].idstep==STEPADV$steps[idend+1].idstep==STEPFINISH
                                              • API String ID: 2102423945-464871554
                                              • Opcode ID: dbcc74edadbb90bcfeb9bed0d2a11cbc74ed60c68fb40292e4cbd60504a41472
                                              • Instruction ID: 2fff76e6eb05731a4d913eeede60c4a985dcf8d79a56dd537ca24bd789a56fe2
                                              • Opcode Fuzzy Hash: dbcc74edadbb90bcfeb9bed0d2a11cbc74ed60c68fb40292e4cbd60504a41472
                                              • Instruction Fuzzy Hash: 3221F571600718ABD3305E65CC46F177AE8EB41B48F11852EE495AF1C2E7BCF5098AAD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID: .\zocsetuphook6.cpp$steps[idadv].idstep==STEPADV$steps[idend+1].idstep==STEPFINISH
                                              • API String ID: 2102423945-3035875556
                                              • Opcode ID: ceb3b327a207077c8f717154f6d33d783095b824123a93caad11fd906f66a196
                                              • Instruction ID: 596ec1e4c295d165a17bd61f421f2f054214d22db711b1db528d0d2b92fabb35
                                              • Opcode Fuzzy Hash: ceb3b327a207077c8f717154f6d33d783095b824123a93caad11fd906f66a196
                                              • Instruction Fuzzy Hash: 3B212575600B19ABD3305F66CD46F13BAE8EB41B48F01452EF1859F1D2EBBCF5098A98
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3
                                              • String ID: .\unicode.cpp$@$codepage :$idx!=-1
                                              • API String ID: 431132790-1150001723
                                              • Opcode ID: 56bdca53509f6e34d620b277ddba94b591fb3deccf621d714dca7b8e49d317e5
                                              • Instruction ID: 8cec4bd3716cc5d9eb3ca108cecf5f9cfcb4a181d9e27e57d8822f5923dd7029
                                              • Opcode Fuzzy Hash: 56bdca53509f6e34d620b277ddba94b591fb3deccf621d714dca7b8e49d317e5
                                              • Instruction Fuzzy Hash: 1C214C75C04248EADB14DB66CC41AEEBA74AF15310F14412FFC2AA72C2D77C4A85C76D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00417B02
                                                • Part of subcall function 00435AB2: _malloc.LIBCMT ref: 00435ACA
                                              • GetWindowLongA.USER32(000000FF,000000F0), ref: 00417B7C
                                              • SendMessageA.USER32(?,00000111,000000FF,000000FF), ref: 00417BD0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3LongMessageSendWindow_malloc
                                              • String ID: .\datadialogitems.cpp$this->pEntry->IsValid()
                                              • API String ID: 3467418004-2355480350
                                              • Opcode ID: f9e2483cd78ed716e27f7cfbb380491c142fd5672d1f132d75a3353a0d0584de
                                              • Instruction ID: 6f574082869952781a5ebb455b2776b6e9d8d2c047dbf4dc4cb87feecc712ef9
                                              • Opcode Fuzzy Hash: f9e2483cd78ed716e27f7cfbb380491c142fd5672d1f132d75a3353a0d0584de
                                              • Instruction Fuzzy Hash: E721A030600604EFDB14EB60CE52FAAB7B0FF08714F10451EF5925A5E1DB74B940CB48
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __calloc_crt
                                              • String ID: `+I$`F$pF
                                              • API String ID: 3494438863-3061008820
                                              • Opcode ID: da54c212f999bbabac67be0ea5351d6c4e463e170d3d41e0d366f442cd082f33
                                              • Instruction ID: 0c4de7b76ce9f95e08e11255aaa9d935cf6f43754d59ace7ea60784fce0d15fc
                                              • Opcode Fuzzy Hash: da54c212f999bbabac67be0ea5351d6c4e463e170d3d41e0d366f442cd082f33
                                              • Instruction Fuzzy Hash: 2D11E7317041105BE7248E1EAC9176623C1EB9D338F24153BE711CB3E6F778984146CE
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __snprintf_memset
                                              • String ID: .\strings.cpp$i= %d, len= %d, buf= %s$i>=0 && i<=this->StrLen
                                              • API String ID: 2657849664-1422967550
                                              • Opcode ID: 8995b4493cbd3003b91dd34e560aabe20de90ec6b5e57a1ce0a540261ff56208
                                              • Instruction ID: 512fea7eed35b026762aeb55c2721cb033d8d4dd096ce83e814955ebc844d963
                                              • Opcode Fuzzy Hash: 8995b4493cbd3003b91dd34e560aabe20de90ec6b5e57a1ce0a540261ff56208
                                              • Instruction Fuzzy Hash: 6C110A72600204ABC730DB59CC83F9BB3A9DB94705F1004BFEA85A31C1E6B8BA48875D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __snprintf_memset
                                              • String ID: .\strings.cpp$i= %d, len= %d, buf= %s$i>=0 && i<this->StrLen
                                              • API String ID: 2657849664-3622733328
                                              • Opcode ID: 4164cf76af41d6e61835b7333bf3cad46faa4ae67cd5518c8cb18aa7027611e3
                                              • Instruction ID: c1c4717ba1deb29c4ccdcd318fe5fa69b1e8226971ef9499636f007e14e3c859
                                              • Opcode Fuzzy Hash: 4164cf76af41d6e61835b7333bf3cad46faa4ae67cd5518c8cb18aa7027611e3
                                              • Instruction Fuzzy Hash: 69110D72600245BBC720DB56CC46F9B77E9DBA4704F10047FF645A31C1E6B8B954875D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004206C7
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                                • Part of subcall function 00412F1B: CloseHandle.KERNEL32 ref: 00412F39
                                                • Part of subcall function 00412F1B: _sprintf.LIBCMT ref: 00412F64
                                                • Part of subcall function 00419FDE: __EH_prolog3.LIBCMT ref: 00419FE5
                                                • Part of subcall function 0042A5E6: __EH_prolog3.LIBCMT ref: 0042A5ED
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$CloseErrorHandleLast__snprintf_memset_sprintf
                                              • String ID: !this->hThread$.\ios.cpp$BASEIO::~BASEIO done$BASEIO::~BASEIO this= %08x
                                              • API String ID: 3159177082-818480339
                                              • Opcode ID: b2d58e171299f4ba82b23e623e3030569a0da8622aa21eb34cf327dfcbfc110d
                                              • Instruction ID: 6340c3160d59d35780094ffaf8aba297117d6b39cd3fe46aeaec5f60510ce277
                                              • Opcode Fuzzy Hash: b2d58e171299f4ba82b23e623e3030569a0da8622aa21eb34cf327dfcbfc110d
                                              • Instruction Fuzzy Hash: 7F215634405784EED714EBB2C6067DDBBE05F15308F50445FA89A636C3EBBC6708CA5A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00413B91: GetCurrentThreadId.KERNEL32 ref: 00413B9A
                                              • _memset.LIBCMT ref: 00418FAD
                                              • _sprintf.LIBCMT ref: 00418FCA
                                              Strings
                                              • i= %d, max= %d, count= %d, type= %s, this= %08x, xrefs: 00418FC4
                                              • w:\zaphod\dynarray.cpp, xrefs: 00418FDD
                                              • FALSE, xrefs: 00418FE2
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CurrentThread_memset_sprintf
                                              • String ID: FALSE$i= %d, max= %d, count= %d, type= %s, this= %08x$w:\zaphod\dynarray.cpp
                                              • API String ID: 2028706086-1356527501
                                              • Opcode ID: 4db7cc12cfe11d69bf3cf7f8c89acb9cbc980ed4722278d66bcd8959bfa80975
                                              • Instruction ID: f20ba1270379a6e6c0a5119e00d6c0cb058937d857dc91138b6bffa832d9d98a
                                              • Opcode Fuzzy Hash: 4db7cc12cfe11d69bf3cf7f8c89acb9cbc980ed4722278d66bcd8959bfa80975
                                              • Instruction Fuzzy Hash: 58110A71600704AFCB20DB56CC42FEAB3F9EF48704F00055EFA4AA31C1DAB4BA858B59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00410373
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 0040F07D: _getenv.LIBCMT ref: 0040F08B
                                              • _strlen.LIBCMT ref: 004103B5
                                                • Part of subcall function 0040F5EB: _memset.LIBCMT ref: 0040F666
                                              • _strlen.LIBCMT ref: 004103E2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strlen$H_prolog3$_getenv_memset
                                              • String ID: STR::op1||$STR::op2||
                                              • API String ID: 1485478962-2685297015
                                              • Opcode ID: ef72367aec2ff0931805c4fe9819b16540aee9fcba578dfe8262c56365018785
                                              • Instruction ID: 60dabbe90debc945d5002b5635343102b0137e0b0f789cc8c210a9595fb263d8
                                              • Opcode Fuzzy Hash: ef72367aec2ff0931805c4fe9819b16540aee9fcba578dfe8262c56365018785
                                              • Instruction Fuzzy Hash: 4411C4B5500645EFDB14EF65CC42E9DB7A4FF08304F10442EF954A7292CBB9A920CB58
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: EventReset_sprintf
                                              • String ID: .\osys_win32.cpp$EVENTSEM::Reset %08x$handle= %08x
                                              • API String ID: 4082095451-2018138586
                                              • Opcode ID: 76ef0f45cb23bcddd2f1792fed8b0a90b259dbf5bad63ba02035bb6336ffc56c
                                              • Instruction ID: d94c7ed7f6fdf0f5d96fd897d5af5ce770cd9b9c87e73ddb0f3d6059af4f65f0
                                              • Opcode Fuzzy Hash: 76ef0f45cb23bcddd2f1792fed8b0a90b259dbf5bad63ba02035bb6336ffc56c
                                              • Instruction Fuzzy Hash: 5CF0AE71600208B7DB209F659C42F9777F8EB4CB09F20056FFD45D2142EA7D9B948659
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CloseHandle.KERNEL32 ref: 00412F39
                                              • _sprintf.LIBCMT ref: 00412F64
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CloseErrorH_prolog3HandleLast__snprintf_memset_sprintf
                                              • String ID: .\osys_win32.cpp$EVENTSEM::~EVENTSEM deleted %08x, ok= %d$handle= %08x
                                              • API String ID: 1014848641-3216442996
                                              • Opcode ID: 70edb8e33dd6908fa364538e4e2620180a931327247fdfe45b5c17bd1d6fd15a
                                              • Instruction ID: c2d99f177c426646260f820fd7e19b2ab95558c2383cbdb9ef046ea5d3bd55af
                                              • Opcode Fuzzy Hash: 70edb8e33dd6908fa364538e4e2620180a931327247fdfe45b5c17bd1d6fd15a
                                              • Instruction Fuzzy Hash: B4F0A971600209BBD710AB659D83FA6B3ECEB48709F10056FFE45A2143FAB89E544B59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Event_sprintf
                                              • String ID: .\osys_win32.cpp$EVENTSEM::Set %08x$handle= %08x
                                              • API String ID: 353398720-69362834
                                              • Opcode ID: 32c500ccc66fdc2c287ac44424d8c74011421b9fc8b017024c568fb597c5c4a2
                                              • Instruction ID: 3b2b1698dbbb60b6f3c7793db131bfab74fc0f16789d933d2feed75ab0e2c44e
                                              • Opcode Fuzzy Hash: 32c500ccc66fdc2c287ac44424d8c74011421b9fc8b017024c568fb597c5c4a2
                                              • Instruction Fuzzy Hash: FBF0FE31600208B7DB109F259D03E9677F8EB48709F20056FFD45D3141EA789A55865A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              • _strlen.LIBCMT ref: 00420596
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ErrorH_prolog3Last__snprintf_memset_strlen
                                              • String ID: !this->IsDead$.\ios.cpp$BASEIO::Write len %d$BASEIO::~Write ok %d
                                              • API String ID: 675196462-3145454701
                                              • Opcode ID: 192d3d0272a63c8116819c15512a63b16ced424929c6cf483f2043762602a862
                                              • Instruction ID: 8137e6a62985864a26a4c95a0edfc0201d3bcdc743f6102979146f9cd836a11b
                                              • Opcode Fuzzy Hash: 192d3d0272a63c8116819c15512a63b16ced424929c6cf483f2043762602a862
                                              • Instruction Fuzzy Hash: 4AF0FC72B003143BD21496769C86F4BE6DCEB88B65F20451BF958D31D2C6AC8D944669
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 00413B9A
                                              • WaitForSingleObject.KERNEL32(80000000,?,?,?,0041B208,000000FF,E5C332AE,?,000001FF,00000000), ref: 00413BBD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CurrentObjectSingleThreadWait
                                              • String ID: .\osys_win32.cpp$MUTEXSEM::Obtain %08x rc= %d$rc!=WAIT_FAILED
                                              • API String ID: 1728940165-2940198759
                                              • Opcode ID: f04b02d4c04b9a46c8138a4f4e63251a19cbb49995f4667f0e053d7091ea9efa
                                              • Instruction ID: 7ac1601291d1e4ea4763dc4eaad7b8eb027d721fc41f4ef636dffd389fdaf4bc
                                              • Opcode Fuzzy Hash: f04b02d4c04b9a46c8138a4f4e63251a19cbb49995f4667f0e053d7091ea9efa
                                              • Instruction Fuzzy Hash: 45F0F4326443006AD6302A298C03F9732508B80F2BF24471BFD65521C3EABD95D4819E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00415853
                                              • TranslateMessage.USER32(?), ref: 00415870
                                              • DispatchMessageA.USER32(?), ref: 0041587A
                                              Strings
                                              • WINDOWS::WinProcessMessages dispatch msg= %04x, xrefs: 00415860
                                              • WINDOWS::WinProcessMessages done after n=%d messages, xrefs: 00415886
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Message$DispatchPeekTranslate
                                              • String ID: WINDOWS::WinProcessMessages dispatch msg= %04x$WINDOWS::WinProcessMessages done after n=%d messages
                                              • API String ID: 4217535847-3848425184
                                              • Opcode ID: 75b936ab9cbf9d5dbbf55122d6970ff454331e3a75ada69a46ba9dd1428f51bc
                                              • Instruction ID: db428cbbdce8c7a0b98c2122dd6aa2bb695b4eddca7431ea60fdd30af90fbf80
                                              • Opcode Fuzzy Hash: 75b936ab9cbf9d5dbbf55122d6970ff454331e3a75ada69a46ba9dd1428f51bc
                                              • Instruction Fuzzy Hash: D9F068327403086BCA1476D6AC0AFDB7B6CDBC0755F100127B914E61A1DA64D58586A8
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • ReleaseMutex.KERNEL32(?,00000000,00001FE0), ref: 00413247
                                              • _sprintf.LIBCMT ref: 00413273
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ErrorH_prolog3LastMutexRelease__snprintf_memset_sprintf
                                              • String ID: .\osys_win32.cpp$MUTEXSEM::Release %08x rc= %d$handle= %08x
                                              • API String ID: 121452875-1120723028
                                              • Opcode ID: 86bc1b1238403b08553dc040db612b85cb2d97c30f2673519885556a0f36e85a
                                              • Instruction ID: dcf0f8e720bd79b986d49e3e671890e01b75ad3c3035fe7ecbbb76d7c3fb7d18
                                              • Opcode Fuzzy Hash: 86bc1b1238403b08553dc040db612b85cb2d97c30f2673519885556a0f36e85a
                                              • Instruction Fuzzy Hash: 7DF04231500208BBDB10AF51DC03E6BB7B8FF44709F10056FFE4592142FEB85A548B55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetFileAttributesA.KERNEL32(00000003,C:/Program Files (x86)/ZOC5/zocdll.dll,0042F26C,C:/Program Files (x86)/ZOC5/zocdll.dll,00000180,00454616,004303E5,0048A840,00000000,?,-001FD774,00000003,00430F6C,0028A470,0048A840,00000000), ref: 0043E1FB
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0042EA9E), ref: 0043E206
                                              • __dosmaperr.LIBCMT ref: 0043E20D
                                              • SetFileAttributesA.KERNEL32(00000080,00000000), ref: 0043E229
                                              Strings
                                              • C:/Program Files (x86)/ZOC5/zocdll.dll, xrefs: 0043E1CA
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: AttributesFile$ErrorLast__dosmaperr
                                              • String ID: C:/Program Files (x86)/ZOC5/zocdll.dll
                                              • API String ID: 2189404394-1882927899
                                              • Opcode ID: 17bae2e7bd6b3667ced451c9fe3d9d534616a6418ca68a633bd979166d18d44c
                                              • Instruction ID: 173b44f6716a8a2978bcdeb479b11bc5747f3e7daf29264a7a62d54c1b5c922a
                                              • Opcode Fuzzy Hash: 17bae2e7bd6b3667ced451c9fe3d9d534616a6418ca68a633bd979166d18d44c
                                              • Instruction Fuzzy Hash: 27F0BB314157105ECB212776FC0815F7AA8AF49335F11579FF435841E1CB38C8C296AE
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strncpy$H_prolog3
                                              • String ID: HASH-KEYS$HASH-VALUES
                                              • API String ID: 2076106944-2114310471
                                              • Opcode ID: 9c149313f87c8ba310c89138958283295bede09598bab8939ddd6361fc600b67
                                              • Instruction ID: 1e3c385917c56e74a531bfb229d19b29238aff9c444daa2f81cb25a009ebf6d1
                                              • Opcode Fuzzy Hash: 9c149313f87c8ba310c89138958283295bede09598bab8939ddd6361fc600b67
                                              • Instruction Fuzzy Hash: EDF0F4715407449BD720FB61C802BAAB3A0AF0470AF50880EE686660C3D7BCA108CB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset_strlen$H_prolog3
                                              • String ID:
                                              • API String ID: 3537525069-0
                                              • Opcode ID: 9707db327c407fd8aff655006c3a27eb1da4d3f1c48d96ab2dff22b2726f873f
                                              • Instruction ID: db9023b8bfcef898495b4e3cf7bb46ad9aafd18f9c9a7240826ecdb89e0d5caf
                                              • Opcode Fuzzy Hash: 9707db327c407fd8aff655006c3a27eb1da4d3f1c48d96ab2dff22b2726f873f
                                              • Instruction Fuzzy Hash: 6B51317190029DAADB20EFA5DC45FEE77B8AF08304F50442AF909AB182D7789748CB65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __lock.LIBCMT ref: 00445E4A
                                                • Part of subcall function 00443484: __mtinitlocknum.LIBCMT ref: 00443498
                                                • Part of subcall function 00443484: __amsg_exit.LIBCMT ref: 004434A4
                                                • Part of subcall function 00443484: EnterCriticalSection.KERNEL32(?,?,?,004388FB,00000004,004699E0,0000000C,00442E08,?,?,00000000,00000000,00000000,0043FA2F,00000001,00000214), ref: 004434AC
                                              • __mtinitlocknum.LIBCMT ref: 00445E8A
                                              • __malloc_crt.LIBCMT ref: 00445ECB
                                              • ___crtInitCritSecAndSpinCount.LIBCMT ref: 00445EF0
                                              • EnterCriticalSection.KERNEL32(01FB2108,00469F90,00000010,00437E52,00469960,0000000C,00437ECC,?,?,00000040,0041B616,assert.log,0045C394,*** ASSERTION FAILED: %s,?,Unexpected condition encountered!Please contact us via our web site and provide the following information (logged in assert.log file in the program's installation folder):%sDo you want to try to continue with the program?), ref: 00445F1A
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CriticalEnterSection__mtinitlocknum$CountCritInitSpin___crt__amsg_exit__lock__malloc_crt
                                              • String ID:
                                              • API String ID: 1486408876-0
                                              • Opcode ID: bc8077ca95eaaa6f2c25051dcd9f2ea0f087460fda62efb6ac1d49e15f4b54c3
                                              • Instruction ID: 9c732738d116a989652b71597d48b03d2f16e568c0a6f9448c0ef6d3a46295b0
                                              • Opcode Fuzzy Hash: bc8077ca95eaaa6f2c25051dcd9f2ea0f087460fda62efb6ac1d49e15f4b54c3
                                              • Instruction Fuzzy Hash: 7531A171504B019FEB21DF69E881A1AF3E4BF09324750452FF955872A2CB78A9428B4D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetWindowRect.USER32(?,?), ref: 00415F12
                                                • Part of subcall function 00415E95: GetParent.USER32(?), ref: 00415EA0
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                              • GetWindow.USER32(?,00000004), ref: 00415F34
                                              • ScreenToClient.USER32(?,?), ref: 00415F4A
                                              • ScreenToClient.USER32(?,?), ref: 00415F51
                                              • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00415F5A
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ClientScreenWindow$H_prolog3InfoParametersParentRectSystem
                                              • String ID:
                                              • API String ID: 1335048515-0
                                              • Opcode ID: f4e0342161b60231acd6b83092e2c4be86f57d33f61e5678952547996925d7eb
                                              • Instruction ID: 5455eaf42f18e1f9b49a892e85e58348147bfc2376e2858456f2031899c03375
                                              • Opcode Fuzzy Hash: f4e0342161b60231acd6b83092e2c4be86f57d33f61e5678952547996925d7eb
                                              • Instruction Fuzzy Hash: F101F572200608AFD7159B68DC85DEFB7BCDBC8708705402AF605EB211D624ED4587B9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041901C
                                                • Part of subcall function 00413B91: GetCurrentThreadId.KERNEL32 ref: 00413B9A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CurrentH_prolog3Thread
                                              • String ID: pos>=0 && pos<=this->ItemCount$this->ItemCount<this->MaxItems$w:\zaphod\dynarray.cpp
                                              • API String ID: 2223909941-4203086300
                                              • Opcode ID: d0aada92f25d1444811cfb56568ca1ed085c66a3f8101c3109fcfc46cb2a557d
                                              • Instruction ID: 1cb47968d92c78fe2e31f2b3a52565716a9d1a003986b1c1890f9c4a4c8226e1
                                              • Opcode Fuzzy Hash: d0aada92f25d1444811cfb56568ca1ed085c66a3f8101c3109fcfc46cb2a557d
                                              • Instruction Fuzzy Hash: D751E730500205AFD714EF65C886AAEB7F0FF08304F20452FE456E7692DB78AE85CB55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • _memset.LIBCMT ref: 00416A02
                                              • GetDlgItem.USER32(?,00000320), ref: 00416A13
                                              • GetWindowTextA.USER32(00000000,?,0000007F), ref: 00416A2B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ItemTextWindow_memset
                                              • String ID: WM_INITDIALOG:RC=0
                                              • API String ID: 1363805667-2401051034
                                              • Opcode ID: 2b785b797a8f37fa97065fcc1de2d3d0c8b3fec044c29b22c57c681ec9b29369
                                              • Instruction ID: c8b58b8b5102f19a692cd0a486ce20b0e4178b46591b197dab5dac179df2cd82
                                              • Opcode Fuzzy Hash: 2b785b797a8f37fa97065fcc1de2d3d0c8b3fec044c29b22c57c681ec9b29369
                                              • Instruction Fuzzy Hash: 564122B36202095BDF389E588C89BFF7696EB45B00F26442BE221D6291D53CCDC9CA0D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00411EF5
                                              • _strlen.LIBCMT ref: 00411F04
                                                • Part of subcall function 00418F66: _memset.LIBCMT ref: 00418FAD
                                                • Part of subcall function 00418F66: _sprintf.LIBCMT ref: 00418FCA
                                                • Part of subcall function 00411500: __EH_prolog3.LIBCMT ref: 00411507
                                                • Part of subcall function 00410E95: __EH_prolog3.LIBCMT ref: 00410E9C
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 0041036C: __EH_prolog3.LIBCMT ref: 00410373
                                                • Part of subcall function 0041036C: _strlen.LIBCMT ref: 004103B5
                                                • Part of subcall function 0041036C: _strlen.LIBCMT ref: 004103E2
                                                • Part of subcall function 004019E1: __EH_prolog3.LIBCMT ref: 004019E8
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                                • Part of subcall function 0040F975: _strlen.LIBCMT ref: 0040F9B5
                                                • Part of subcall function 0040F975: _strncpy.LIBCMT ref: 0040F9D2
                                                • Part of subcall function 00411ADC: __EH_prolog3.LIBCMT ref: 00411AEA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strlen$_memset$ErrorLast__snprintf_sprintf_strncpy
                                              • String ID: .\osysfile.cpp$source.Left(fromlen)==from
                                              • API String ID: 3319712024-763396992
                                              • Opcode ID: 975b5b7f618a4d456863e3ca30a9e8fe2a1f437e46541f599718c75d07f70dea
                                              • Instruction ID: 1e792a1f96d9ab4f687e47c8366de282afc3d2aa82305f71b1ce3f4b34665ec3
                                              • Opcode Fuzzy Hash: 975b5b7f618a4d456863e3ca30a9e8fe2a1f437e46541f599718c75d07f70dea
                                              • Instruction Fuzzy Hash: 3A418431800249EEDF15EFA1C946BDE7BA5AF14348F10416FF90563193EB785B48CBA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00410D00
                                                • Part of subcall function 00410F78: __EH_prolog3.LIBCMT ref: 00410F7F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3
                                              • String ID: .\osysfile.cpp$FILENAME::ShellStringSet %s %s$didit
                                              • API String ID: 431132790-2648371487
                                              • Opcode ID: 8bc42fe564b22c69223e1d338c17d1f9c8a543a87803c586f7ff65a632d636b3
                                              • Instruction ID: ba5503cb38dfe5d2f6f0bededccc95f52136ba64af3c53dbee7a9e2fd101c2a5
                                              • Opcode Fuzzy Hash: 8bc42fe564b22c69223e1d338c17d1f9c8a543a87803c586f7ff65a632d636b3
                                              • Instruction Fuzzy Hash: FA419771600208ABDB14EBA6CC42ADEB6B5AF44314F20053FF456B31D2DBBC5AC9C759
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00417E44
                                                • Part of subcall function 00417A18: GetWindowLongA.USER32(?,000000F0), ref: 00417A3B
                                                • Part of subcall function 00417A18: GetWindowLongA.USER32(?,000000F0), ref: 00417A48
                                                • Part of subcall function 00435AB2: _malloc.LIBCMT ref: 00435ACA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: LongWindow$H_prolog3_malloc
                                              • String ID: .\datadialogitems.cpp$ListBox$this->pList->IsValid()
                                              • API String ID: 221057671-1743863370
                                              • Opcode ID: 2a5e1e03d2ef0f66874af27a0a66c7633635564500062f813ebc17176bf81cb5
                                              • Instruction ID: d7895bcde7722e29f28ffb1b1c5dd2d1bd61eaebb61629c3795b0e663168bae7
                                              • Opcode Fuzzy Hash: 2a5e1e03d2ef0f66874af27a0a66c7633635564500062f813ebc17176bf81cb5
                                              • Instruction Fuzzy Hash: B541E330608204AECB14EBB9CC41AEE77B0AF18314F20416FF516A76D2DB3C9A85D769
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 0040F07D: _getenv.LIBCMT ref: 0040F08B
                                              • _strlen.LIBCMT ref: 0040F425
                                                • Part of subcall function 004369E5: __toupper_l.LIBCMT ref: 00436A04
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __toupper_l_getenv_strlen
                                              • String ID: %USERNAME%$iPos Buffer$iPos str
                                              • API String ID: 2032322048-3991586315
                                              • Opcode ID: 4bf9638bbbbe553eb3a1b8a53cb95518eab31f556f84655ac918c438c413b15f
                                              • Instruction ID: 27283b48981efd32da4e3b289e51195b2f486fdd3a1dcee4b84c718cac17d9d2
                                              • Opcode Fuzzy Hash: 4bf9638bbbbe553eb3a1b8a53cb95518eab31f556f84655ac918c438c413b15f
                                              • Instruction Fuzzy Hash: 92218171A00109AFCF20DF68C58199EBBB1FF54324F20857BE855F7682D738AA44CB54
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041D338
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 00418F66: _memset.LIBCMT ref: 00418FAD
                                                • Part of subcall function 00418F66: _sprintf.LIBCMT ref: 00418FCA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_memset_sprintf_strlen
                                              • String ID: ----=_EmTec_Mime_Part_08154711$.\email.cpp$boundary.Length()<64
                                              • API String ID: 3947979386-3782865599
                                              • Opcode ID: 216c7ae42998637fe8d90ea5a664fae2314f6f41a3996f6987fe43d959325b73
                                              • Instruction ID: faa6354a6514748a2dc19b1108b49036890b4fdf2f50bd8ef1c9de574b2836ec
                                              • Opcode Fuzzy Hash: 216c7ae42998637fe8d90ea5a664fae2314f6f41a3996f6987fe43d959325b73
                                              • Instruction Fuzzy Hash: 641196B1E002059BDB24EF658C82ABEB671BF44708F20052FE961A73C2DB7C5D81875E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetProcAddress.KERNEL32(?,0000000E), ref: 004290BF
                                                • Part of subcall function 00428FE5: RegOpenKeyExA.ADVAPI32(80000000,CLSID\{ADB880A6-D8FF-11CF-9377-00AA003B7A11}\InprocServer32,00000000,00020019,00000000,?,?,?,?,0042907E,?,01FB17F8,?,00000000), ref: 00429003
                                                • Part of subcall function 00428FE5: RegQueryValueExA.ADVAPI32(00000000,00454616,00000000,00000000,?,?,?,?,?,?,0042907E,?,01FB17F8), ref: 00429025
                                                • Part of subcall function 00428FE5: RegCloseKey.ADVAPI32(00000000,?,?,?,?,0042907E,?,01FB17F8), ref: 00429033
                                              • LoadLibraryA.KERNEL32(?,?,01FB17F8,?,00000000), ref: 0042908F
                                              • LoadLibraryA.KERNEL32(hhctrl.ocx,?,01FB17F8,?,00000000), ref: 004290A5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: LibraryLoad$AddressCloseOpenProcQueryValue
                                              • String ID: hhctrl.ocx
                                              • API String ID: 2110907290-2298675154
                                              • Opcode ID: a351756529105b623ff328528e45442de7c0c2cddde672f4765a57b5e024f3f3
                                              • Instruction ID: 319ce1da8821ab995ddbd19d358a6f5d6e5ed4cab0e942da13d22db831bd0afe
                                              • Opcode Fuzzy Hash: a351756529105b623ff328528e45442de7c0c2cddde672f4765a57b5e024f3f3
                                              • Instruction Fuzzy Hash: 22118F31701629EBDB24DFA6FD40BAA37A9AB48348F41043EF509D3250D774DD848B1D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              • _strlen.LIBCMT ref: 0040F9B5
                                              • _strncpy.LIBCMT ref: 0040F9D2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ErrorH_prolog3Last__snprintf_memset_strlen_strncpy
                                              • String ID: .\strings.cpp$text!=this->Buffer
                                              • API String ID: 2216859557-2403493425
                                              • Opcode ID: 0eac6bb082760f5d75d4be2b300fff33711d02aab9600bd6b9ffd71bd6826dee
                                              • Instruction ID: 12cfd48f513139f35c5ab6c5cf0cc6d9e5957849fec24ccd0294442a626d2b11
                                              • Opcode Fuzzy Hash: 0eac6bb082760f5d75d4be2b300fff33711d02aab9600bd6b9ffd71bd6826dee
                                              • Instruction Fuzzy Hash: D401D8717002047BCA30AA1DCC83F6F779DDB54B68B21403BF844A76C1D979AC5841AD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0040EF6F
                                                • Part of subcall function 00435AB2: _malloc.LIBCMT ref: 00435ACA
                                                • Part of subcall function 004132A6: InitializeCriticalSection.KERNEL32(00000000), ref: 004132D6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CriticalH_prolog3InitializeSection_malloc
                                              • String ID: .\strings.cpp$`$ptr
                                              • API String ID: 2485071247-1621485878
                                              • Opcode ID: b17eb2f8e68a3daa4dca1ef5ba68091ee4a806a02c1ee5935cf98e5827c96907
                                              • Instruction ID: 3efbe52c56baf48c142b39493c266c7f3d585c3c446189c2a14d801f480e847e
                                              • Opcode Fuzzy Hash: b17eb2f8e68a3daa4dca1ef5ba68091ee4a806a02c1ee5935cf98e5827c96907
                                              • Instruction Fuzzy Hash: 6B11C630A05205EBDB24EF6AEC0375936606F04715F10413FF949E66D2E7BC5D94968E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 004136AF
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              • LoadStringA.USER32(?,?,?,00000100), ref: 00413706
                                              Strings
                                              • <STR-ERR>, xrefs: 004136CB
                                              • OSYS::GetStringFromResource %d returns %s, xrefs: 00413754
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3H_prolog3_LoadString_strlen
                                              • String ID: <STR-ERR>$OSYS::GetStringFromResource %d returns %s
                                              • API String ID: 2876014114-1297072308
                                              • Opcode ID: baa0a4025dc2a5afa5cebf218e8bad1baf91d111ab54926854e6141722792f96
                                              • Instruction ID: 59c0b00241dd6836bcb8c111c6265f8c4a65d36418bfc3aa835c453a7897d52f
                                              • Opcode Fuzzy Hash: baa0a4025dc2a5afa5cebf218e8bad1baf91d111ab54926854e6141722792f96
                                              • Instruction Fuzzy Hash: 6811907190025CABDB21EF55CC42BDD77B4AB08715F1040AAE918AB2C2C7785BD4CB95
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004198DA
                                              • _memset.LIBCMT ref: 004198FF
                                                • Part of subcall function 00435AB2: _malloc.LIBCMT ref: 00435ACA
                                                • Part of subcall function 00413129: CreateMutexA.KERNEL32(00000000,00000000,?,?,0041B1B5,00000000,00000000,E5C332AE,?,000001FF,00000000), ref: 00413140
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CreateH_prolog3Mutex_malloc_memset
                                              • String ID: pLock$w:\zaphod\dynarray.cpp
                                              • API String ID: 751747294-842621046
                                              • Opcode ID: 96a6325d884e84ccb3851b4f365a11d4018b44ba5269601b0d12f23f86539830
                                              • Instruction ID: 30bfbe26023880e224e8a183f2d4ab454c56c5aaa16f3ac83a28bff0a0c4cb51
                                              • Opcode Fuzzy Hash: 96a6325d884e84ccb3851b4f365a11d4018b44ba5269601b0d12f23f86539830
                                              • Instruction Fuzzy Hash: 2D0175B0A41700ABC724AF268C02A5FFAF4EF94B00F10550FE88596692D7B85545CB9D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ComputerName_memset_strcat
                                              • String ID: <N/A>
                                              • API String ID: 3562001399-3257593766
                                              • Opcode ID: c316880304473c87ac16a7df409c61df735c9dbf13321bf1887a3273db3810d5
                                              • Instruction ID: 8d13de928fd386db7ab2cb5f95b6420dbe7c188502a6b01c17b29f028a82ca50
                                              • Opcode Fuzzy Hash: c316880304473c87ac16a7df409c61df735c9dbf13321bf1887a3273db3810d5
                                              • Instruction Fuzzy Hash: F9011E71A0020C9EDB30DFA9DC46BEE77F8BB08708F50442EE554E7182EF7896488B55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0040E400
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              • DeleteObject.GDI32(?), ref: 0040E450
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                                • Part of subcall function 004170C9: __EH_prolog3.LIBCMT ref: 004170D0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$DeleteErrorLastObject__snprintf_memset
                                              • String ID: !this->pSubDlg$.\setupdialog.cpp
                                              • API String ID: 2131507689-3910525131
                                              • Opcode ID: b754f7b1afe4d5fff652c02f5d4ad9fcb14f0cc6b29cdadf510e888e469aaef3
                                              • Instruction ID: 58a74604958a419a2c73ea9266e721eaff005e9548d3ee7229a2fb2fdbfc2532
                                              • Opcode Fuzzy Hash: b754f7b1afe4d5fff652c02f5d4ad9fcb14f0cc6b29cdadf510e888e469aaef3
                                              • Instruction Fuzzy Hash: 0A01AD30500740DAE715EF74C406BDD7BA0AB44309F20499EE8A96B2C2CBBC2A48DB49
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • RegOpenKeyExA.ADVAPI32(80000000,CLSID\{ADB880A6-D8FF-11CF-9377-00AA003B7A11}\InprocServer32,00000000,00020019,00000000,?,?,?,?,0042907E,?,01FB17F8,?,00000000), ref: 00429003
                                              • RegQueryValueExA.ADVAPI32(00000000,00454616,00000000,00000000,?,?,?,?,?,?,0042907E,?,01FB17F8), ref: 00429025
                                              • RegCloseKey.ADVAPI32(00000000,?,?,?,?,0042907E,?,01FB17F8), ref: 00429033
                                              Strings
                                              • CLSID\{ADB880A6-D8FF-11CF-9377-00AA003B7A11}\InprocServer32, xrefs: 00428FF9
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CloseOpenQueryValue
                                              • String ID: CLSID\{ADB880A6-D8FF-11CF-9377-00AA003B7A11}\InprocServer32
                                              • API String ID: 3677997916-4062393554
                                              • Opcode ID: 4d1e4b6f62673b9e6d8a3050924ba574841f9122015293f43233fdc879bc60ce
                                              • Instruction ID: a106159c587ecfc7f5480a0ea6aed982b5135283b9fbc9d36b812563cf9cebfb
                                              • Opcode Fuzzy Hash: 4d1e4b6f62673b9e6d8a3050924ba574841f9122015293f43233fdc879bc60ce
                                              • Instruction Fuzzy Hash: CFF05471604228BBDB109B91EC09F9FBF6CEB45799F600021BA05D1151D6748E50D6A8
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetCurrentThread.KERNEL32 ref: 00413C10
                                              • GetThreadPriority.KERNEL32(00000000), ref: 00413C20
                                              Strings
                                              • RAISETHREADPRIORITY::RAISETHREADPRIORITY done, ok= %d, origclass= %d, xrefs: 00413C58
                                              • RAISETHREADPRIORITY::RAISETHREADPRIORITY prio= %d, xrefs: 00413C34
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Thread$CurrentPriority
                                              • String ID: RAISETHREADPRIORITY::RAISETHREADPRIORITY done, ok= %d, origclass= %d$RAISETHREADPRIORITY::RAISETHREADPRIORITY prio= %d
                                              • API String ID: 1343868529-137569971
                                              • Opcode ID: 20a841e96d38022cfe151c757030e8cc82663a0af5f5bbe56962cb0588a43f77
                                              • Instruction ID: efb3014f95e50cd89260efb16189b2541cff87b73894c1be405937946bf9c54e
                                              • Opcode Fuzzy Hash: 20a841e96d38022cfe151c757030e8cc82663a0af5f5bbe56962cb0588a43f77
                                              • Instruction Fuzzy Hash: 24F0E971500701ABC7106F60DC05656BBE0EB50726F10C91EF8A596292E779D8D0CB8D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3__memset_sprintf_strlen
                                              • String ID: %I64u
                                              • API String ID: 2605747077-2461839288
                                              • Opcode ID: 32743642ae132433f4c7839e7f7f9e7d43d646708b26635aa066f554936bfcb6
                                              • Instruction ID: be72286bfe77f5254359bdfd51ca533117808e62584b2cb4902966541b8496ec
                                              • Opcode Fuzzy Hash: 32743642ae132433f4c7839e7f7f9e7d43d646708b26635aa066f554936bfcb6
                                              • Instruction Fuzzy Hash: 64F0A0B0500618AADB15FBA5CC06B9D3368AB04708F50501FF800AA182DBBC5A18875D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3__memset_sprintf_strlen
                                              • String ID: %lu
                                              • API String ID: 2605747077-685833217
                                              • Opcode ID: c39049e5983a3c68bd6278fe70eb77c3bb90c23ad180e116ea01f0ce21073f1c
                                              • Instruction ID: 261013310a142e66cc3d71d418a317e64c593f69e2ba9f409e76454bd6e431be
                                              • Opcode Fuzzy Hash: c39049e5983a3c68bd6278fe70eb77c3bb90c23ad180e116ea01f0ce21073f1c
                                              • Instruction Fuzzy Hash: 35E092B1500A187FEB15FB55DC07F9D7268AF04B09F10502FF840AA182DBBC5A1987AD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 00412EE0
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CreateErrorEventH_prolog3Last__snprintf_memset
                                              • String ID: .\osys_win32.cpp$EVENTSEM::EVENTSEM created %08x$this->hev
                                              • API String ID: 2778411974-720648830
                                              • Opcode ID: 4df4b6bff3fb457099eee1737879bde713be250c51afd066d9a225ffd31e5c53
                                              • Instruction ID: 66219d1b3602a9562bbd33bcf4f925a34529c58183ce84193b48f5dbbb9ce0c4
                                              • Opcode Fuzzy Hash: 4df4b6bff3fb457099eee1737879bde713be250c51afd066d9a225ffd31e5c53
                                              • Instruction Fuzzy Hash: 54E04F71B84314BAE6102A20AC07F666584DB54F0BF20482BBF44AE0C2E5E95EA0A79D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              • %s: write error (disk full?). Continue? (y/n/^C) , xrefs: 0042F391
                                              • C:/Program Files (x86)/ZOC5/zocdll.dll, xrefs: 0042F38C
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _fgets_flsall_fprintf
                                              • String ID: %s: write error (disk full?). Continue? (y/n/^C) $C:/Program Files (x86)/ZOC5/zocdll.dll
                                              • API String ID: 1414668839-2313624047
                                              • Opcode ID: e6be8e14398e156eaae43d346b84985728f1922432e30c8a7255303f33080600
                                              • Instruction ID: 23e610ca35e3185e9d9e84695188762529d3f83bddfbcf28fa5770756a6bd726
                                              • Opcode Fuzzy Hash: e6be8e14398e156eaae43d346b84985728f1922432e30c8a7255303f33080600
                                              • Instruction Fuzzy Hash: 37E0ECE6E84240BDF71073B25C0BB1D21589F19748F19186FB941E51C3EBEE952146BF
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __lock.LIBCMT ref: 0043B76F
                                                • Part of subcall function 00443484: __mtinitlocknum.LIBCMT ref: 00443498
                                                • Part of subcall function 00443484: __amsg_exit.LIBCMT ref: 004434A4
                                                • Part of subcall function 00443484: EnterCriticalSection.KERNEL32(?,?,?,004388FB,00000004,004699E0,0000000C,00442E08,?,?,00000000,00000000,00000000,0043FA2F,00000001,00000214), ref: 004434AC
                                              • EnterCriticalSection.KERNEL32(?,00000000,0043A970,00000000,00469AE0,0000000C,0041B64B,00000000,--- %s --- %s %s ---,?,?,?,?,?), ref: 0043B782
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CriticalEnterSection$__amsg_exit__lock__mtinitlocknum
                                              • String ID: PF$`+I
                                              • API String ID: 3996875869-2005272330
                                              • Opcode ID: 4e729ae5cc253d2cdb8db0ebaa818d907a1b2b1031fda9b7e22b913c60933bbd
                                              • Instruction ID: 64bef7e4c0735b079b50d6d082ba14e83359f1743853db2e9c01e43c7744a6bc
                                              • Opcode Fuzzy Hash: 4e729ae5cc253d2cdb8db0ebaa818d907a1b2b1031fda9b7e22b913c60933bbd
                                              • Instruction Fuzzy Hash: 33D0CD36504630479B38257974462DD66C4D784365707851FEC8656295EB1C6CC146DD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleA.KERNEL32(KERNEL32,004359F6), ref: 00441DCF
                                              • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00441DDF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: IsProcessorFeaturePresent$KERNEL32
                                              • API String ID: 1646373207-3105848591
                                              • Opcode ID: 4125ec5f0a93d337c35e85b09e9356fa572a5dc7b3432d7806293d7c917db351
                                              • Instruction ID: 521b3db9ba47a0542f254904a132ba421714c44e83b3f974d4de633d5f5cc0ce
                                              • Opcode Fuzzy Hash: 4125ec5f0a93d337c35e85b09e9356fa572a5dc7b3432d7806293d7c917db351
                                              • Instruction Fuzzy Hash: 9BC080F0B41B0173FA501BF14D49B1A21555B40F43F140412B009D41F0DE9CD0C0553F
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0044874E
                                              • __isleadbyte_l.LIBCMT ref: 00448782
                                              • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,A045FF98,?,00000000,?,?,?,0043E3F8,?,?,00000002), ref: 004487B3
                                              • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,00000001,?,00000000,?,?,?,0043E3F8,?,?,00000002), ref: 00448821
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                              • String ID:
                                              • API String ID: 3058430110-0
                                              • Opcode ID: 574be55ea80289ad97a648f34956f09942adb5887e5252e8ff0f1c56923b7230
                                              • Instruction ID: 6891d52d590f7db683be07597c962f2d2a7b44dcfd5f9c75feed70fffc638e14
                                              • Opcode Fuzzy Hash: 574be55ea80289ad97a648f34956f09942adb5887e5252e8ff0f1c56923b7230
                                              • Instruction Fuzzy Hash: 5831CE31A00245EFEB21DFA4CCA1AAE7BB5FF01311F2585AEE4609B291DB34D940DB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00418BEC
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              • SendMessageA.USER32(00000000,-00000148,000000FF,00000000), ref: 00418C4E
                                              • _memset.LIBCMT ref: 00418C70
                                              • SendMessageA.USER32(00000000,-00000147,000000FF,?), ref: 00418C91
                                                • Part of subcall function 00418882: GetWindowLongA.USER32(?,000000F0), ref: 0041889F
                                                • Part of subcall function 00418882: _memset.LIBCMT ref: 004188BE
                                                • Part of subcall function 00418882: SendMessageA.USER32(?,00000191,00000100,?), ref: 004188DA
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: MessageSend$H_prolog3_memset$LongWindow_strlen
                                              • String ID:
                                              • API String ID: 3756785551-0
                                              • Opcode ID: 6cb10f6f2420b98aaa8f00fe1c32737d96ef3c9ab20b135bb251574bda0e68fc
                                              • Instruction ID: 33e6a19bbdbe917c115e46ec5f273e58ffe3f3ea38b717740bd4dfd809022b5c
                                              • Opcode Fuzzy Hash: 6cb10f6f2420b98aaa8f00fe1c32737d96ef3c9ab20b135bb251574bda0e68fc
                                              • Instruction Fuzzy Hash: 51318D71900249AFCF10EFA5CC42BEEBBB5BF54314F10412AF415AB2E2DB789A44CB64
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004107C0
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              • _strpbrk.LIBCMT ref: 00410809
                                              • _strpbrk.LIBCMT ref: 00410829
                                              • _strlen.LIBCMT ref: 00410835
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3_strlen_strpbrk
                                              • String ID:
                                              • API String ID: 3807024718-0
                                              • Opcode ID: 25131238df51efb2c353e089bca8e8ea39752e08eece798bfed96eff12751f84
                                              • Instruction ID: d78d265c9941551010bf5e6648e046f795813b74b9424fd2c5b5fc7d73f2b581
                                              • Opcode Fuzzy Hash: 25131238df51efb2c353e089bca8e8ea39752e08eece798bfed96eff12751f84
                                              • Instruction Fuzzy Hash: 54217F32905629ABDB14EF65C8017DE37A4AF08714F15502FF945AB281CBBC9E80CBD8
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00415C4E
                                              • GetKeyState.USER32(00000011), ref: 00415C74
                                              • TranslateMessage.USER32(?), ref: 00415CB2
                                              • DispatchMessageA.USER32(?), ref: 00415CBC
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Message$DispatchStateTranslate
                                              • String ID:
                                              • API String ID: 2198823524-0
                                              • Opcode ID: d50473020ee42d4d7b451db6bb5962838227d26b601a3ae5fb9b9495a5bf61a9
                                              • Instruction ID: ce34a5c6026321f4203271987b39ae88fcdae02846de6c42b688981c74fe0349
                                              • Opcode Fuzzy Hash: d50473020ee42d4d7b451db6bb5962838227d26b601a3ae5fb9b9495a5bf61a9
                                              • Instruction Fuzzy Hash: 64112E71A0060ADFDF149FA4D888AEF77B8EB94305F004026E911EA255E778D985CB95
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetWindowLongA.USER32(?,000000F0), ref: 0041889F
                                              • _memset.LIBCMT ref: 004188BE
                                              • SendMessageA.USER32(?,00000191,00000100,?), ref: 004188DA
                                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00418919
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: MessageSend$LongWindow_memset
                                              • String ID:
                                              • API String ID: 830647256-0
                                              • Opcode ID: bf97cfc051919841f1061f0dd219d41ceea721925394ce2a27f571cfb9dc9800
                                              • Instruction ID: 81c85e024134700c97ee0cc63b86fa45db0137c238c0dd98694b539819ac007a
                                              • Opcode Fuzzy Hash: bf97cfc051919841f1061f0dd219d41ceea721925394ce2a27f571cfb9dc9800
                                              • Instruction Fuzzy Hash: 9D1136B0604604ABCB218E54DC84EBB7BF8EB80715F10423FF655601E0DB746981CA5A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00415C03: BeginPaint.USER32(?,?,0040E335,?), ref: 00415C0A
                                              • GetSysColor.USER32(00000010), ref: 00415D9D
                                              • CreateSolidBrush.GDI32(00000000), ref: 00415DA4
                                                • Part of subcall function 00415B81: GetClientRect.USER32(?,?), ref: 00415BC0
                                              • FillRect.USER32(?,?,00000000), ref: 00415DCF
                                              • DeleteObject.GDI32(00000000), ref: 00415DD6
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Rect$BeginBrushClientColorCreateDeleteFillObjectPaintSolid
                                              • String ID:
                                              • API String ID: 4133987377-0
                                              • Opcode ID: 22beec4c2f33b3f93eccbbacaa606663ae5a78f13cf6626cf12345a93ca82663
                                              • Instruction ID: a8506f1da99d225723d50154c66f6feb7465443551bdbd4c4298ce8e3c0456d4
                                              • Opcode Fuzzy Hash: 22beec4c2f33b3f93eccbbacaa606663ae5a78f13cf6626cf12345a93ca82663
                                              • Instruction Fuzzy Hash: C2010471E00708DBCB10EFE5D9859DFB7BDEF48705B104426E901DB151EA74D5458B54
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                              • String ID:
                                              • API String ID: 3016257755-0
                                              • Opcode ID: 7ea3a893bf3bd11cad7cd0372379ff1f7e327c259811a7a92178e9d3a0fb71f7
                                              • Instruction ID: 4da3a88d60d05af007c7c615a80076e6816e294a9d2e6ff66e9dc03216251c59
                                              • Opcode Fuzzy Hash: 7ea3a893bf3bd11cad7cd0372379ff1f7e327c259811a7a92178e9d3a0fb71f7
                                              • Instruction Fuzzy Hash: DA018CB244014EBBEF125E84CC41CEE3F26BB08384B08841AFE1958130D33AD9B1AB89
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 0043FA7D: __amsg_exit.LIBCMT ref: 0043FA8B
                                              • __amsg_exit.LIBCMT ref: 004401CA
                                              • __lock.LIBCMT ref: 004401DA
                                              • InterlockedDecrement.KERNEL32(?), ref: 004401F7
                                              • InterlockedIncrement.KERNEL32(01FB15B0), ref: 00440222
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__lock
                                              • String ID:
                                              • API String ID: 4129207761-0
                                              • Opcode ID: fb60f4c20ff68262a23f112b42508f3e16c7015c66805dd5013c99d3f7732d5b
                                              • Instruction ID: 4c7e3a61f7c93872aa5d7e12a6fe737d0e4376926029d51477b1ff318733d866
                                              • Opcode Fuzzy Hash: fb60f4c20ff68262a23f112b42508f3e16c7015c66805dd5013c99d3f7732d5b
                                              • Instruction Fuzzy Hash: 1201E1329017259BE720AB66940974A77A0BF04B15F00005BE900673C1DBBCACA1DB9E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041AA86
                                                • Part of subcall function 00413129: CreateMutexA.KERNEL32(00000000,00000000,?,?,0041B1B5,00000000,00000000,E5C332AE,?,000001FF,00000000), ref: 00413140
                                              • _memset.LIBCMT ref: 0041AAE2
                                              • _memset.LIBCMT ref: 0041AAEE
                                              • _memset.LIBCMT ref: 0041AAFA
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset$CreateH_prolog3Mutex
                                              • String ID:
                                              • API String ID: 4052416266-0
                                              • Opcode ID: d113514f1a947cef13f150bc19935a3c6a81df50b002d8cde661d5cb03f29fc9
                                              • Instruction ID: 76e824976e4cae1b974cf41b17cf410e77d47f4b830d9d53d031e2059ac20752
                                              • Opcode Fuzzy Hash: d113514f1a947cef13f150bc19935a3c6a81df50b002d8cde661d5cb03f29fc9
                                              • Instruction Fuzzy Hash: 2B115EB4800B449AC730EF67C545A5BFBF8BF94704F40895FA58693691DBB8F208CB65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetLastError.KERNEL32(?,00000000,004380B0,00439D1B,00000001,0043F765,?,00000000,?,?,?,?,0043F877,?,00438E66), ref: 0043FA08
                                                • Part of subcall function 0043F8BF: TlsGetValue.KERNEL32(?,00438E66), ref: 0043F8C6
                                                • Part of subcall function 0043F8BF: TlsSetValue.KERNEL32(00000000,00438E66), ref: 0043F8E7
                                              • __calloc_crt.LIBCMT ref: 0043FA2A
                                                • Part of subcall function 00442DF5: __calloc_impl.LIBCMT ref: 00442E03
                                                • Part of subcall function 00442DF5: Sleep.KERNEL32(00000000), ref: 00442E1A
                                                • Part of subcall function 0043F82D: TlsGetValue.KERNEL32(00000000,0043F8DD,?,00438E66), ref: 0043F83A
                                                • Part of subcall function 0043F82D: TlsGetValue.KERNEL32(00000005,?,00438E66), ref: 0043F851
                                                • Part of subcall function 0043F947: GetModuleHandleA.KERNEL32(KERNEL32.DLL,00469E28,0000000C,0043FA58,00000000,00000000,?,00000000,004380B0,00439D1B,00000001,0043F765,?,00000000), ref: 0043F958
                                                • Part of subcall function 0043F947: GetProcAddress.KERNEL32(?,EncodePointer), ref: 0043F98C
                                                • Part of subcall function 0043F947: GetProcAddress.KERNEL32(?,DecodePointer), ref: 0043F99C
                                                • Part of subcall function 0043F947: InterlockedIncrement.KERNEL32(0046E8A0), ref: 0043F9BE
                                                • Part of subcall function 0043F947: __lock.LIBCMT ref: 0043F9C6
                                                • Part of subcall function 0043F947: ___addlocaleref.LIBCMT ref: 0043F9E5
                                              • GetCurrentThreadId.KERNEL32 ref: 0043FA5A
                                              • SetLastError.KERNEL32(00000000,?,00000000,004380B0,00439D1B,00000001,0043F765,?,00000000,?,?,?,?,0043F877,?,00438E66), ref: 0043FA72
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Value$AddressErrorLastProc$CurrentHandleIncrementInterlockedModuleSleepThread___addlocaleref__calloc_crt__calloc_impl__lock
                                              • String ID:
                                              • API String ID: 1081334783-0
                                              • Opcode ID: 665cdc278f2ca1f571ac1dd62def958e1c17f441b7b913911f199f87106772f0
                                              • Instruction ID: 9c716f8cbfd9dd3cb594fade53f0237feb3ef9b52a7276cb9f65ab3f9c19f359
                                              • Opcode Fuzzy Hash: 665cdc278f2ca1f571ac1dd62def958e1c17f441b7b913911f199f87106772f0
                                              • Instruction Fuzzy Hash: 23F02837C00B216BD6363BB57C0AA6A3AD09F48775F14113FF118961D1DF28C845979E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3
                                              • String ID: !this->LockTable$.\stringarray.cpp
                                              • API String ID: 431132790-1223753495
                                              • Opcode ID: ad893b43b0f032e529bd8dfcbcde562f7bb13d2a2dee1b2130629311042bf5ce
                                              • Instruction ID: 03c9696987a61be85b28c6dc939ea0eb467565b1c8e446fadb9d71edddbe9c44
                                              • Opcode Fuzzy Hash: ad893b43b0f032e529bd8dfcbcde562f7bb13d2a2dee1b2130629311042bf5ce
                                              • Instruction Fuzzy Hash: 05313C3090020AAFCF14EFA1C892CEEBB71FF14328F10452FE525661D2DB395A85DB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041A181
                                                • Part of subcall function 0040FD54: __fread_nolock.LIBCMT ref: 0040FE13
                                                • Part of subcall function 00419C1F: __EH_prolog3.LIBCMT ref: 00419C38
                                                • Part of subcall function 00419C1F: _strncpy.LIBCMT ref: 00419C91
                                                • Part of subcall function 00419C1F: _strncpy.LIBCMT ref: 00419CA1
                                                • Part of subcall function 00419C1F: _strncmp.LIBCMT ref: 00419D40
                                                • Part of subcall function 00419C1F: _strncmp.LIBCMT ref: 00419D5A
                                                • Part of subcall function 004192B9: __EH_prolog3.LIBCMT ref: 004192C0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$_strncmp_strncpy$__fread_nolock
                                              • String ID: HASH::Load %s$HASH::Load returns %d, %s
                                              • API String ID: 696004964-3413410379
                                              • Opcode ID: af69396a7f28fb629e8e82052852c02c14364484a6cd251a8543d8b22e6f783e
                                              • Instruction ID: 1f270ec2d327e18d400dfaccdf762e0be3196fbbbe648a01c9d3d5192157ce9d
                                              • Opcode Fuzzy Hash: af69396a7f28fb629e8e82052852c02c14364484a6cd251a8543d8b22e6f783e
                                              • Instruction Fuzzy Hash: 8421B671900248EFCB14EFA6CC52ADDB7B4FF14314F10406FE805A7292EB785A49CB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __vsnprintf.LIBCMT ref: 00410452
                                                • Part of subcall function 004374EC: __vsnprintf_l.LIBCMT ref: 004374FE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __vsnprintf__vsnprintf_l
                                              • String ID: .\strings.cpp$rc>=0 && rc<sizeof(buf)-1
                                              • API String ID: 551395303-4078348570
                                              • Opcode ID: 8d05d94f4fe82000e837aa5717c2c4756f6e07583376fdc0330b6388e5fb9533
                                              • Instruction ID: a54efeb6777b40a5a881d7d65751aea843e8aff3436298cc8f91758ba07a7326
                                              • Opcode Fuzzy Hash: 8d05d94f4fe82000e837aa5717c2c4756f6e07583376fdc0330b6388e5fb9533
                                              • Instruction Fuzzy Hash: 4C21D731A00308ABDB10DB95CC46FEE77A8EB08724F00057BE919D21C2E7789A88CA58
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00413FD7
                                                • Part of subcall function 004157DA: __EH_prolog3.LIBCMT ref: 004157E1
                                                • Part of subcall function 0041EFC4: __EH_prolog3.LIBCMT ref: 0041EFCB
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 0041EC86: __EH_prolog3.LIBCMT ref: 0041EC8D
                                              • MessageBoxA.USER32(00000001,?,?,00010024), ref: 00414077
                                              Strings
                                              • WINEMTEC::YesNoMsgBox title=%s text=%s, xrefs: 00413FE7
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$Message_strlen
                                              • String ID: WINEMTEC::YesNoMsgBox title=%s text=%s
                                              • API String ID: 1800839913-3931902097
                                              • Opcode ID: 348eb571901f588d9def187d89df814ff02673dec700d929449333a9be4778c1
                                              • Instruction ID: 25353f285da8633147f83ef20acb78569ee83de1482532523c4ec33e5bcb14f4
                                              • Opcode Fuzzy Hash: 348eb571901f588d9def187d89df814ff02673dec700d929449333a9be4778c1
                                              • Instruction Fuzzy Hash: 45219F31D00248EBCF15EBA6CC06ADD7BB0AF04318F10811AF8157B2D2DB795B58CB95
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __lock.LIBCMT ref: 00439DE7
                                                • Part of subcall function 00443484: __mtinitlocknum.LIBCMT ref: 00443498
                                                • Part of subcall function 00443484: __amsg_exit.LIBCMT ref: 004434A4
                                                • Part of subcall function 00443484: EnterCriticalSection.KERNEL32(?,?,?,004388FB,00000004,004699E0,0000000C,00442E08,?,?,00000000,00000000,00000000,0043FA2F,00000001,00000214), ref: 004434AC
                                                • Part of subcall function 0043F82D: TlsGetValue.KERNEL32(00000000,0043F8DD,?,00438E66), ref: 0043F83A
                                                • Part of subcall function 0043F82D: TlsGetValue.KERNEL32(00000005,?,00438E66), ref: 0043F851
                                                • Part of subcall function 0043F82D: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,00438E66), ref: 0043F866
                                                • Part of subcall function 0043F82D: GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 0043F881
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Value$AddressCriticalEnterHandleModuleProcSection__amsg_exit__lock__mtinitlocknum
                                              • String ID: PEE$dEE
                                              • API String ID: 669183598-2584293349
                                              • Opcode ID: 0daeae4d4c9bce63dca62b2266ef1b3f1340e8f8d6bfe49240f3ab37208e4b9b
                                              • Instruction ID: 0a30179a0872946eb7ed52370392db1e19f21f242f3eb06a512034ef37093f5a
                                              • Opcode Fuzzy Hash: 0daeae4d4c9bce63dca62b2266ef1b3f1340e8f8d6bfe49240f3ab37208e4b9b
                                              • Instruction Fuzzy Hash: 5C110232800205AEDF15BFA6D84226E77B0AB88719F24603FF528162D2DBBC4C85CF5C
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00413E23
                                                • Part of subcall function 004157DA: __EH_prolog3.LIBCMT ref: 004157E1
                                                • Part of subcall function 0041EFC4: __EH_prolog3.LIBCMT ref: 0041EFCB
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 0041EC86: __EH_prolog3.LIBCMT ref: 0041EC8D
                                              • MessageBoxA.USER32(?,?,?,00010040), ref: 00413EC4
                                              Strings
                                              • WINEMTEC::InfoMsgBox title=%s text=%s, xrefs: 00413E32
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$Message_strlen
                                              • String ID: WINEMTEC::InfoMsgBox title=%s text=%s
                                              • API String ID: 1800839913-4169888135
                                              • Opcode ID: e891ab521b35136c01f33f39011e38b1eae0763d05bcd308752dce9b2636d4cc
                                              • Instruction ID: b4315d52063f6a56511490986b07f04759e0c5b3bf20f3f68e5e15060cc25508
                                              • Opcode Fuzzy Hash: e891ab521b35136c01f33f39011e38b1eae0763d05bcd308752dce9b2636d4cc
                                              • Instruction Fuzzy Hash: 46216D31900248EBDF05EFA2CC4ABDD7B74AF00318F10811AF8156A1E2DB795B98CB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00413EFD
                                                • Part of subcall function 004157DA: __EH_prolog3.LIBCMT ref: 004157E1
                                                • Part of subcall function 0041EFC4: __EH_prolog3.LIBCMT ref: 0041EFCB
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                                • Part of subcall function 0041EC86: __EH_prolog3.LIBCMT ref: 0041EC8D
                                              • MessageBoxA.USER32(?,?,?,00010010), ref: 00413F9E
                                              Strings
                                              • WINEMTEC::ErrorMsgBox title=%s text=%s, xrefs: 00413F0C
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$Message_strlen
                                              • String ID: WINEMTEC::ErrorMsgBox title=%s text=%s
                                              • API String ID: 1800839913-2787015471
                                              • Opcode ID: 4d1a455e6010c8c2ae397faed0235bce5f0789ae83254442533ffcfc0ac7b289
                                              • Instruction ID: 0118156ae2dd9b2bca935c45d9f451068516aaa0ca8d7629a3792e205e206227
                                              • Opcode Fuzzy Hash: 4d1a455e6010c8c2ae397faed0235bce5f0789ae83254442533ffcfc0ac7b289
                                              • Instruction Fuzzy Hash: 4B217A31800248EBDF05EBE1CC0ABDDBB70AF00318F10811AF8152A1E2DBB95B98CB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00402464
                                                • Part of subcall function 0041AA7F: __EH_prolog3.LIBCMT ref: 0041AA86
                                                • Part of subcall function 0041AA7F: _memset.LIBCMT ref: 0041AAE2
                                                • Part of subcall function 0041AA7F: _memset.LIBCMT ref: 0041AAEE
                                                • Part of subcall function 0041AA7F: _memset.LIBCMT ref: 0041AAFA
                                                • Part of subcall function 004157DA: __EH_prolog3.LIBCMT ref: 004157E1
                                                • Part of subcall function 0041A268: _memset.LIBCMT ref: 0041A2CB
                                                • Part of subcall function 0041A268: _memset.LIBCMT ref: 0041A2DB
                                                • Part of subcall function 0041A268: PrintDlgA.COMDLG32(00000042), ref: 0041A36F
                                                • Part of subcall function 0041A268: GlobalFree.KERNEL32(00000000), ref: 0041A388
                                                • Part of subcall function 00415D0E: __EH_prolog3.LIBCMT ref: 00415D15
                                                • Part of subcall function 0041AEDD: _memset.LIBCMT ref: 0041AF01
                                                • Part of subcall function 0041AEDD: GetDeviceCaps.GDI32(?,0000005A), ref: 0041AF0E
                                                • Part of subcall function 0041AEDD: _strcat.LIBCMT ref: 0041AF63
                                                • Part of subcall function 0041A432: GetDeviceCaps.GDI32(?,00000058), ref: 0041A493
                                                • Part of subcall function 0041A432: GetDeviceCaps.GDI32(?,0000005A), ref: 0041A49D
                                                • Part of subcall function 0041A432: GetDeviceCaps.GDI32(?,00000008), ref: 0041A4CE
                                                • Part of subcall function 0041A432: GetDeviceCaps.GDI32(?,0000000A), ref: 0041A4E9
                                                • Part of subcall function 0041A51B: __EH_prolog3.LIBCMT ref: 0041A522
                                                • Part of subcall function 0041A51B: StartDocPrinterA.WINSPOOL.DRV(?,00000001,?), ref: 0041A572
                                                • Part of subcall function 0041AB78: StartPagePrinter.WINSPOOL.DRV(?,?,?,?,?,?,000000FF), ref: 0041ABCB
                                                • Part of subcall function 0041ACB7: _strlen.LIBCMT ref: 0041ACEC
                                                • Part of subcall function 0041ACB7: WritePrinter.WINSPOOL.DRV(000000FF,?,000000FF,?,000000FF), ref: 0041AD07
                                                • Part of subcall function 0041A675: EndPagePrinter.WINSPOOL.DRV(?,000000FF), ref: 0041A6A0
                                                • Part of subcall function 0041A675: EndDocPrinter.WINSPOOL.DRV(?,?,000000FF), ref: 0041A6A8
                                                • Part of subcall function 0041A675: ClosePrinter.WINSPOOL.DRV(?,?,?,000000FF), ref: 0041A6B0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _memset$CapsDeviceH_prolog3Printer.$PageStart$CloseFreeGlobalPrintPrinterWrite_strcat_strlen
                                              • String ID: Courier New$ORDER
                                              • API String ID: 96007522-1630563337
                                              • Opcode ID: 0975b2180fa661f8f38b32f166078d3c77377ffb58770cebc575f6da87250f94
                                              • Instruction ID: 944bc64b594721010ff1418a7dd7c26029c26104eb1219e0cea4be5427035578
                                              • Opcode Fuzzy Hash: 0975b2180fa661f8f38b32f166078d3c77377ffb58770cebc575f6da87250f94
                                              • Instruction Fuzzy Hash: 1F117F7050121CAEDB14EBA4CD92FEE7379AF14358F50029EB215361D3DB781F98CA2A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetKeyState.USER32(00000010), ref: 0041E5F9
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ErrorH_prolog3LastState__snprintf_memset
                                              • String ID: .\winkeys.cpp$FALSE
                                              • API String ID: 3460975504-329848690
                                              • Opcode ID: a6ce9f611d231a984cbd61556a0dc96780ec360481755dbc48b2f8227b98113a
                                              • Instruction ID: b35a87f53374bb8c5dcdb4049c4cd2210721251e1d4f99a7d6d5c649dffdfe32
                                              • Opcode Fuzzy Hash: a6ce9f611d231a984cbd61556a0dc96780ec360481755dbc48b2f8227b98113a
                                              • Instruction Fuzzy Hash: AC01D63E68857671E22005EB9C06FF74502A381B9CF684123BD56D61C1FC9CCDC3A1AE
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              • .\datadialogs.cpp, xrefs: 00416F87
                                              • this->DisableItemCount<ARRAYMAX(this->DisableItems), xrefs: 00416F90
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3
                                              • String ID: .\datadialogs.cpp$this->DisableItemCount<ARRAYMAX(this->DisableItems)
                                              • API String ID: 431132790-590486021
                                              • Opcode ID: 4b79528aafbce34ed52cb160d41a555108b55515cbba03c423b925bc935fe722
                                              • Instruction ID: b301b8399b890252a267bdeeb18e47c557b63cdf6c6e39a997b4c627ad7e23d7
                                              • Opcode Fuzzy Hash: 4b79528aafbce34ed52cb160d41a555108b55515cbba03c423b925bc935fe722
                                              • Instruction Fuzzy Hash: 69216D75A00209EFDB10DF29C441B89B7B0FF08314F10812AF859AB292DB74AE94CB94
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __vsnprintf.LIBCMT ref: 0040FB0B
                                                • Part of subcall function 004374EC: __vsnprintf_l.LIBCMT ref: 004374FE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: __vsnprintf__vsnprintf_l
                                              • String ID: .\strings.cpp$rc>=0 && rc<sizeof(buf)-1
                                              • API String ID: 551395303-4078348570
                                              • Opcode ID: 130fd3d088f4873e84b13ad1d8e3015ad5344508f1238de9537a70c92bf65406
                                              • Instruction ID: 7b71038c2549d294c201dd0ad9457d8ded2a99d7b20620f0ab6bdf4a693e843c
                                              • Opcode Fuzzy Hash: 130fd3d088f4873e84b13ad1d8e3015ad5344508f1238de9537a70c92bf65406
                                              • Instruction Fuzzy Hash: AA017931704208A7DB10DEA5CC46FAA77DDDB54759F10047BBA05E21C2D5B8A905865D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Version_memset
                                              • String ID: OSYS::GetOSType %d.%d
                                              • API String ID: 963298953-2180102822
                                              • Opcode ID: ee398940897960e78bb74f2ed8ab896f065eece9b0319d788404d1efd1e63b7b
                                              • Instruction ID: 2fd79b6358225d5d6a32298053784ba123d12d3b3bc4595bf4e02ba4785e938f
                                              • Opcode Fuzzy Hash: ee398940897960e78bb74f2ed8ab896f065eece9b0319d788404d1efd1e63b7b
                                              • Instruction Fuzzy Hash: E901C4B1E6020D9FDF10DFB8DD06FEEB3B1AB08304F50041AE615E5181E3AC91958B4E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00417CC5
                                                • Part of subcall function 00435AB2: _malloc.LIBCMT ref: 00435ACA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3_malloc
                                              • String ID: .\datadialogitems.cpp$this->pRadio->IsValid()
                                              • API String ID: 2346879263-359313249
                                              • Opcode ID: 1f7bd67a7d39c8e27a9bf6dc71ba1d2da328a086e26146850855dc5a6bcdbdb4
                                              • Instruction ID: 179236524b0153b96421a33e7aee4372d2d31dfa30bf0ff4c7ee53f8c8c4209e
                                              • Opcode Fuzzy Hash: 1f7bd67a7d39c8e27a9bf6dc71ba1d2da328a086e26146850855dc5a6bcdbdb4
                                              • Instruction Fuzzy Hash: 9901A530650704EFDB14FB71C903AEE76B0FF08714F10162EE956A76D1EB78A9409B58
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3_sscanf
                                              • String ID: %2x
                                              • API String ID: 2446616797-1919545446
                                              • Opcode ID: 44098dccccbdb2d6907ace13acc37666336225f8e566b1565717b9809f1fe451
                                              • Instruction ID: ee6b12e80e11d4db349cb6790b5b5a443d85a8a7b1994bb9bb0f794ef9bc3702
                                              • Opcode Fuzzy Hash: 44098dccccbdb2d6907ace13acc37666336225f8e566b1565717b9809f1fe451
                                              • Instruction Fuzzy Hash: 9001D875900209EBCB00DFE5C881BEEB7B5BB44304F10443FF944AB281C7BC9A958B99
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              • TCP::InitWinsock WSAStartup vers= %x, highvers= %x, desc= %s, status= %s, maxsocket %d, maxuppdgram= %d, xrefs: 00421D85
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Startup_memset
                                              • String ID: TCP::InitWinsock WSAStartup vers= %x, highvers= %x, desc= %s, status= %s, maxsocket %d, maxuppdgram= %d
                                              • API String ID: 3974092505-154047836
                                              • Opcode ID: 2c0165ef623e9ca9aed0379cc064173af1c2c060822319aea78e087fb6265bf1
                                              • Instruction ID: 98dfe8af709f325c5140745af2d5510f801d44bf1b5a7d051168bba32cdbf235
                                              • Opcode Fuzzy Hash: 2c0165ef623e9ca9aed0379cc064173af1c2c060822319aea78e087fb6265bf1
                                              • Instruction Fuzzy Hash: D5011E7290051C9ADB30EFA99C42BEE77ECAB08709F100556FE54D6181EBB896888765
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 004135F2
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              • _strlen.LIBCMT ref: 00413622
                                                • Part of subcall function 0040F93F: _strlen.LIBCMT ref: 0040F95F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strlen$H_prolog3
                                              • String ID: DGE
                                              • API String ID: 2883720156-828149971
                                              • Opcode ID: 8b83f7b5108dccf2c8624ef2e3304092f209c3d92199649268e0f48039f927d1
                                              • Instruction ID: 1fd9c63234a1e6c746940979f1e74ce27bf094877d5ade1c0bbc8e2aea712369
                                              • Opcode Fuzzy Hash: 8b83f7b5108dccf2c8624ef2e3304092f209c3d92199649268e0f48039f927d1
                                              • Instruction Fuzzy Hash: AF01D474904254BBCB24EF55C850EDE3B64AF05754F10422BB9541B3D2CB7C5A81C788
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __time64.LIBCMT ref: 004184A1
                                                • Part of subcall function 0043A1AD: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,00418444,?,000001FF), ref: 0043A1B6
                                                • Part of subcall function 0043A1AD: __aulldiv.LIBCMT ref: 0043A1D6
                                                • Part of subcall function 00438DC2: ___getgmtimebuf.LIBCMT ref: 00438DC3
                                              • _sprintf.LIBCMT ref: 004184C9
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Time$FileH_prolog3System___getgmtimebuf__aulldiv__time64_sprintf_strlen
                                              • String ID: %04d-%02d-%02d
                                              • API String ID: 3702444382-516894531
                                              • Opcode ID: 90efa7548fd27542b795429c316670259eb1a9f21d0f3c8b6ab15d5bbaa432b2
                                              • Instruction ID: d08fd1c20f1a915006bbafc9e5b5a4b0e17e22229d8efb7bcae4e6e90e93bcf6
                                              • Opcode Fuzzy Hash: 90efa7548fd27542b795429c316670259eb1a9f21d0f3c8b6ab15d5bbaa432b2
                                              • Instruction Fuzzy Hash: 63F04971E00208ABCB04EFA5CC46EDD77FCAB0C318F00545AF501B7252DA78EA058769
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00417D62
                                                • Part of subcall function 0041868A: SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 00418696
                                                • Part of subcall function 00406F23: __EH_prolog3_GS.LIBCMT ref: 00406F2A
                                                • Part of subcall function 00406F23: _sprintf.LIBCMT ref: 00406F52
                                                • Part of subcall function 00406F23: _strlen.LIBCMT ref: 00406F5F
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3$ErrorH_prolog3_LastMessageSend__snprintf_memset_sprintf_strlen
                                              • String ID: .\datadialogitems.cpp$this->pDataLength==4
                                              • API String ID: 1028743699-64581460
                                              • Opcode ID: 49bdbab03c376face3dc02d16bb5af6e6d01b5bc68825eee54d3de69f6e8300b
                                              • Instruction ID: 029d2413d4d507643236ade469255eaa753977d2031b58f47ef0b6cdbbdc5692
                                              • Opcode Fuzzy Hash: 49bdbab03c376face3dc02d16bb5af6e6d01b5bc68825eee54d3de69f6e8300b
                                              • Instruction Fuzzy Hash: 88018F30500704DBCB24EB71C946B9A73F0AF48719F60056EA986675D2DB7CAA54CB5C
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0041806F
                                                • Part of subcall function 00418882: GetWindowLongA.USER32(?,000000F0), ref: 0041889F
                                                • Part of subcall function 00418882: _memset.LIBCMT ref: 004188BE
                                                • Part of subcall function 00418882: SendMessageA.USER32(?,00000191,00000100,?), ref: 004188DA
                                                • Part of subcall function 00406F23: __EH_prolog3_GS.LIBCMT ref: 00406F2A
                                                • Part of subcall function 00406F23: _sprintf.LIBCMT ref: 00406F52
                                                • Part of subcall function 00406F23: _strlen.LIBCMT ref: 00406F5F
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: H_prolog3_memset$ErrorH_prolog3_LastLongMessageSendWindow__snprintf_sprintf_strlen
                                              • String ID: .\datadialogitems.cpp$this->pDataLength==4
                                              • API String ID: 2889812211-64581460
                                              • Opcode ID: 370f06c97522de02ad525c7d27b0576c0a3468336e1d26ee03b59546f4a0124c
                                              • Instruction ID: f92580b7a2071afb22947448ad08d2bec7515269430295a84ec8eb2dca150421
                                              • Opcode Fuzzy Hash: 370f06c97522de02ad525c7d27b0576c0a3468336e1d26ee03b59546f4a0124c
                                              • Instruction Fuzzy Hash: 74018B716007049BC724FBB1C847B9A73E0AB48719F60462EE44A671D2DF7CAA44CA58
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0042233A
                                              • ioctlsocket.WS2_32(?,4004667F,00000000), ref: 0042235A
                                                • Part of subcall function 00421E54: __EH_prolog3.LIBCMT ref: 00421E73
                                                • Part of subcall function 00421E54: WSAGetLastError.WS2_32(00000020), ref: 00421E94
                                                • Part of subcall function 00421E54: _memset.LIBCMT ref: 00421EB9
                                                • Part of subcall function 00421E54: _memset.LIBCMT ref: 00421EC9
                                                • Part of subcall function 00421E54: FormatMessageA.KERNEL32(00001000,00000000,?,00000000,00000000,00000100,00000000,?,?,?,?,?,00000020), ref: 00421EDF
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421EE9
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421EFB
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421F0B
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421F1B
                                                • Part of subcall function 00421E54: _strlen.LIBCMT ref: 00421F27
                                              Strings
                                              • TCPIPIO::DevGetNumAvail avail=%d , xrefs: 0042239D
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: _strlen$H_prolog3_memset$ErrorFormatLastMessageioctlsocket
                                              • String ID: TCPIPIO::DevGetNumAvail avail=%d
                                              • API String ID: 3820077274-3065623118
                                              • Opcode ID: 066bdbcf07e5f1f042e85e9f323522ae718c82b8c7c4f353e139d23a6c0b12be
                                              • Instruction ID: 9c55cad8fd4347efb23adee141c7f5374885f33503e37a31fe2e80170b2a4c08
                                              • Opcode Fuzzy Hash: 066bdbcf07e5f1f042e85e9f323522ae718c82b8c7c4f353e139d23a6c0b12be
                                              • Instruction Fuzzy Hash: 0601D631504218ABDB14EBB4CC06BDE7374BF04329F54061EF529A21D1DB7C5508CA5D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetWindowPos.USER32(?,?,00000000,00000000,00000000,00000000,0000001B), ref: 00415A22
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Window
                                              • String ID: .\windows_win32.cpp$topbottom==+1
                                              • API String ID: 2353593579-1346219657
                                              • Opcode ID: 42c6d5d0a05a065bcc0ae008af7f52b511020c5bf6d342077ff79b5f884ca581
                                              • Instruction ID: c41a39e3f9562004a88b072598c52fd6fcca45aa89e074cfecaed1fc3eb45415
                                              • Opcode Fuzzy Hash: 42c6d5d0a05a065bcc0ae008af7f52b511020c5bf6d342077ff79b5f884ca581
                                              • Instruction Fuzzy Hash: 5DF05E36651328B68F205E669C09DCB7F1CEB46BB2B10812BB92896191D6788190CBE5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __time64.LIBCMT ref: 0041843F
                                                • Part of subcall function 0043A1AD: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,00418444,?,000001FF), ref: 0043A1B6
                                                • Part of subcall function 0043A1AD: __aulldiv.LIBCMT ref: 0043A1D6
                                                • Part of subcall function 00438DC2: ___getgmtimebuf.LIBCMT ref: 00438DC3
                                              • _sprintf.LIBCMT ref: 0041845E
                                                • Part of subcall function 00401071: __EH_prolog3.LIBCMT ref: 00401078
                                                • Part of subcall function 00401071: _strlen.LIBCMT ref: 0040109F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Time$FileH_prolog3System___getgmtimebuf__aulldiv__time64_sprintf_strlen
                                              • String ID: %02d:%02d:%02d
                                              • API String ID: 3702444382-3862977440
                                              • Opcode ID: 941f87e44bbad4d9cf358531bf6b26d4601d0f94efc6f8b09a0053a84a580ff1
                                              • Instruction ID: a5c6f2f9fca763268fc17fd1cca866664d12875dae21553dbf2228803a287387
                                              • Opcode Fuzzy Hash: 941f87e44bbad4d9cf358531bf6b26d4601d0f94efc6f8b09a0053a84a580ff1
                                              • Instruction Fuzzy Hash: E8F0FF71A0010CABCF00EBA5C846ECDB7F9AB0C318F50546AF505B71A2E679EA498759
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0042A5ED
                                                • Part of subcall function 00413B91: GetCurrentThreadId.KERNEL32 ref: 00413B9A
                                                • Part of subcall function 00437ED0: __lock.LIBCMT ref: 00437EEE
                                                • Part of subcall function 00437ED0: ___sbh_find_block.LIBCMT ref: 00437EF9
                                                • Part of subcall function 00437ED0: ___sbh_free_block.LIBCMT ref: 00437F08
                                                • Part of subcall function 00437ED0: RtlFreeHeap.NTDLL(00000000,?,00469980,0000000C,00443465,00000000,00469F50,0000000C,0044349D,?,?,?,004388FB,00000004,004699E0,0000000C), ref: 00437F38
                                                • Part of subcall function 00437ED0: GetLastError.KERNEL32(?,004388FB,00000004,004699E0,0000000C,00442E08,?,?,00000000,00000000,00000000,0043FA2F,00000001,00000214,?,00000000), ref: 00437F49
                                              Strings
                                              • RINGBUFFER::~RINGBUFFER done, xrefs: 0042A62F
                                              • RINGBUFFER::~RINGBUFFER, xrefs: 0042A5F7
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: CurrentErrorFreeH_prolog3HeapLastThread___sbh_find_block___sbh_free_block__lock
                                              • String ID: RINGBUFFER::~RINGBUFFER$RINGBUFFER::~RINGBUFFER done
                                              • API String ID: 1280947857-81443724
                                              • Opcode ID: 7bd356922a1f787d0ac8099ef841de07e2818a2d3bd670d43abe4c7f8d083072
                                              • Instruction ID: aea92c171d56b7d156038a14e4c996c93eaeff3635d148a7467bda61cd6afe1d
                                              • Opcode Fuzzy Hash: 7bd356922a1f787d0ac8099ef841de07e2818a2d3bd670d43abe4c7f8d083072
                                              • Instruction Fuzzy Hash: 72F0F0306007088BDB28BB67840779E33A09F00739F20460FF8A5572C2CFBC5B84869E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00418D49
                                                • Part of subcall function 00416DC6: GetWindowLongA.USER32(?,000000F0), ref: 00416DE2
                                                • Part of subcall function 00415BEA: IsWindow.USER32(?), ref: 00415BF2
                                              Strings
                                              • this->IsDropdownList() || !this->IsValid(), xrefs: 00418D96
                                              • .\wincontrols_win32.cpp, xrefs: 00418D91
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Window$H_prolog3Long
                                              • String ID: .\wincontrols_win32.cpp$this->IsDropdownList() || !this->IsValid()
                                              • API String ID: 458961026-3203579685
                                              • Opcode ID: 4dcdfadeb93ed04314c92393cae36aa02961ea4cf1158a84b014f9d4b2ee6b41
                                              • Instruction ID: b641fae489e0106a3cf910fb7004aad829ea522fb03a9fdd729adfc7e971d139
                                              • Opcode Fuzzy Hash: 4dcdfadeb93ed04314c92393cae36aa02961ea4cf1158a84b014f9d4b2ee6b41
                                              • Instruction Fuzzy Hash: 8BF0A771B44314A7DB107B714C02BAE2554DB25B49F54441FFD45DA2C3DFBC8A5482DD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00418DB5
                                                • Part of subcall function 00416DF8: GetWindowLongA.USER32(?,000000F0), ref: 00416E14
                                                • Part of subcall function 00415BEA: IsWindow.USER32(?), ref: 00415BF2
                                              Strings
                                              • this->IsDropdownCombo() || !this->IsValid(), xrefs: 00418E02
                                              • .\wincontrols_win32.cpp, xrefs: 00418DFD
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Window$H_prolog3Long
                                              • String ID: .\wincontrols_win32.cpp$this->IsDropdownCombo() || !this->IsValid()
                                              • API String ID: 458961026-617686455
                                              • Opcode ID: f4d6ae5490a2f48b42efabb12845250461534bd0870431161a9ee71a791b1cba
                                              • Instruction ID: 887848bd20cc79c079610d29c35fc4aef1cb261a74022fb1fa0c2bb3a2794a30
                                              • Opcode Fuzzy Hash: f4d6ae5490a2f48b42efabb12845250461534bd0870431161a9ee71a791b1cba
                                              • Instruction Fuzzy Hash: 46F0A770750710A7DB107B654C03BAE2554EB14B09F10445FBD45EA2C3EBBC895587DD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 004129C0: QueryPerformanceCounter.KERNEL32(000001FF,?,?,?,?,?,0041B13D,?,?,E5C332AE,?,000001FF,00000000), ref: 004129D4
                                                • Part of subcall function 004129C0: QueryPerformanceFrequency.KERNEL32(000001FF,?,?,?,?,?,0041B13D,?,?,E5C332AE,?,000001FF,00000000), ref: 004129FC
                                              • __aulldiv.LIBCMT ref: 00418377
                                              • __aulldiv.LIBCMT ref: 00418384
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: PerformanceQuery__aulldiv$CounterFrequency
                                              • String ID: VA
                                              • API String ID: 2548561793-151723848
                                              • Opcode ID: cc000d6f4c94e8004c9742b3284f8298f2840b86cf8eb1eed813d4731a607f6b
                                              • Instruction ID: e21ceccbcfd6fcc39170a0356c29aeab73579520dc8d93c8c611a2b1e290338c
                                              • Opcode Fuzzy Hash: cc000d6f4c94e8004c9742b3284f8298f2840b86cf8eb1eed813d4731a607f6b
                                              • Instruction Fuzzy Hash: 8DF06D71800208AFDB05EBA4EC81ABD77B9EB44744F10812EF950912E0EAB165D18B8E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 0041B3FE: __EH_prolog3.LIBCMT ref: 0041B420
                                                • Part of subcall function 0041B3FE: _memset.LIBCMT ref: 0041B468
                                                • Part of subcall function 0041B3FE: GetLastError.KERNEL32 ref: 0041B519
                                                • Part of subcall function 0041B3FE: __snprintf.LIBCMT ref: 0041B550
                                              • GetClientRect.USER32(?,?), ref: 00415BC0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ClientErrorH_prolog3LastRect__snprintf_memset
                                              • String ID: .\windows_win32.cpp$this->hWnd!=HWND_DESKTOP
                                              • API String ID: 969043446-2563372510
                                              • Opcode ID: 976550b0a3e4a178ef1c4f2834ac872f2541c1ea7028aac44b7641d8eb6481bd
                                              • Instruction ID: 025481d2a7e9808e259cd60c88ddfe40909d3fcc99e14aec116c9271440f21d7
                                              • Opcode Fuzzy Hash: 976550b0a3e4a178ef1c4f2834ac872f2541c1ea7028aac44b7641d8eb6481bd
                                              • Instruction Fuzzy Hash: 01E0ED32300210BF83049EA8DC0B887B6A9EB98712300843EBE59E6122C2A4981086A9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 0041869D: GetClassNameA.USER32(?,?,00000040), ref: 004186BD
                                                • Part of subcall function 0041869D: GetWindowLongA.USER32(?,000000F0), ref: 004186E5
                                              • GetWindowLongA.USER32(?,000000F0), ref: 00417A3B
                                              • GetWindowLongA.USER32(?,000000F0), ref: 00417A48
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: LongWindow$ClassName
                                              • String ID: Static
                                              • API String ID: 2384183922-2272013587
                                              • Opcode ID: e233ce5d8f8a15394ce7ff8d99b2f9313c03dc906f251a2a23e549436ce4d05b
                                              • Instruction ID: a43ef6960d3170daf30719b739c7fc1cd119acb5474f4ea2635e9069f5724a70
                                              • Opcode Fuzzy Hash: e233ce5d8f8a15394ce7ff8d99b2f9313c03dc906f251a2a23e549436ce4d05b
                                              • Instruction Fuzzy Hash: 2AE026321AC165294D30612CAC01EDF33608EC67713710737F5B6A02F9CD08F882951C
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetThreadPriority.KERNEL32(?,?), ref: 0041332C
                                              Strings
                                              • RAISETHREADPRIORITY::~RAISETHREADPRIORITY done (rc= %d), xrefs: 00413335
                                              • RAISETHREADPRIORITY::~RAISETHREADPRIORITY (RaiseOk=%d), xrefs: 00413313
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: PriorityThread
                                              • String ID: RAISETHREADPRIORITY::~RAISETHREADPRIORITY (RaiseOk=%d)$RAISETHREADPRIORITY::~RAISETHREADPRIORITY done (rc= %d)
                                              • API String ID: 2383925036-4194352917
                                              • Opcode ID: 8c93c91d8462ae0d6a36f231989b82bfcad091c07f534b0413c7bb0265035d53
                                              • Instruction ID: b1e00254eb3f344c4727e7bd0547b4e2165bed2133df6aedb6cc0755deb3b3cf
                                              • Opcode Fuzzy Hash: 8c93c91d8462ae0d6a36f231989b82bfcad091c07f534b0413c7bb0265035d53
                                              • Instruction Fuzzy Hash: 76E026369002006AE2201B22FC06E83BEA0DBD8B26B21002BFC2C45163D5A258E48195
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SHDeleteKeyA.SHLWAPI(?,00000000,004545D8,00408597,00000000,Uninstall,Software\Microsoft\Windows\CurrentVersion\,00000000,?,?,00000000,004545D8,00000000,?,?,?), ref: 004135BC
                                              • RegDeleteKeyA.ADVAPI32(?,00000000), ref: 004135C4
                                              Strings
                                              • REGISTRY::delete key= %s, error=%d, xrefs: 004135D1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: Delete
                                              • String ID: REGISTRY::delete key= %s, error=%d
                                              • API String ID: 1035893169-3788822745
                                              • Opcode ID: 3166f8ab35b52bd929bbac0df5da9755785291853a0cbe2fcbcdf2b2169059ef
                                              • Instruction ID: bf62c594206353d555b9b3c759e3fcd7f5746d59b85c89eca69ce35448d335ba
                                              • Opcode Fuzzy Hash: 3166f8ab35b52bd929bbac0df5da9755785291853a0cbe2fcbcdf2b2169059ef
                                              • Instruction Fuzzy Hash: EAE0CD36404321BBD7113B60DC09B97BED5EF40B5EF158416F948551A1D33588E1D796
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00411530: __EH_prolog3.LIBCMT ref: 00411537
                                                • Part of subcall function 00411530: _memset.LIBCMT ref: 00411552
                                                • Part of subcall function 00411530: _strlen.LIBCMT ref: 00411589
                                              • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000005,zoc.exe), ref: 0040C5E3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3263781494.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3263763134.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263831618.0000000000454000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000046C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000475000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000477000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.0000000000487000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263855967.000000000048D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000002.00000002.3263964809.0000000000494000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_setup.jbxd
                                              Similarity
                                              • API ID: ExecuteH_prolog3Shell_memset_strlen
                                              • String ID: open$zoc.exe
                                              • API String ID: 1455039864-3129284307
                                              • Opcode ID: 8c5e15b32bf773a92d4153c84086ffc7a458631a1fc6c3ba9b0427da34bb95cd
                                              • Instruction ID: 44d4d8759259aea2219f891c50671c7f25948123ec57221989b84ec0938ff09a
                                              • Opcode Fuzzy Hash: 8c5e15b32bf773a92d4153c84086ffc7a458631a1fc6c3ba9b0427da34bb95cd
                                              • Instruction Fuzzy Hash: 31E01230590309BACF047B91EC07F8C7A75AB54B4EF540075F601361E276E4645A9B8D
                                              Uniqueness

                                              Uniqueness Score: -1.00%